Search Results for Business enterprises -- Computer networks -- Security measures SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dBusiness$002benterprises$002b--$002bComputer$002bnetworks$002b--$002bSecurity$002bmeasures$0026ps$003d300?dt=list 2024-04-24T16:11:09Z Responsive security : be ready to be secure ent://SD_ILS/0/SD_ILS:837295 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Meng-Chow Kang author<br/>Author&#160;Meng-Chow Kang author<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 K36 2014<br/>Publisher&#160;CRC Press/Taylor &amp; Francis,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466584303<br/> Information security for managers ent://SD_ILS/0/SD_ILS:808328 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Workman, Michael<br/>Author&#160;Workman, Michael,&#160;Phelps, Daniel C.,&#160;Gathegi, John N.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 W67 2013<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780763793012<br/> Pragmatic security metrics : applying metametrics to information security ent://SD_ILS/0/SD_ILS:821158 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Brotby, W. Krag<br/>Author&#160;Brotby, W. Krag,&#160;Hinson, Gary,&#160;Kabay, M.E.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B76 2013<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781439881521<br/> IT governance : an international guide to data security and ISO27001/ISO27002 ent://SD_ILS/0/SD_ILS:806404 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Calder, Alan<br/>Author&#160;Calder, Alan,&#160;Watkins, Steve<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C342 2012<br/>Edition&#160;5th ed.<br/>Publisher&#160;Kogan Page,<br/>Publication Date&#160;2012<br/>ISBN&#160;9780749464851&#160;9780749464868<br/> Threats, countermeasures, and advances in applied information security ent://SD_ILS/0/SD_ILS:808499 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Gupta, Manish, 1978-<br/>Author&#160;Gupta, Manish, 1978-,&#160;Walp, John, 1967-,&#160;Sharman, Raj<br/>Format:&#160;Books<br/>Call Number&#160;HD30.2 T47 2012 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781466609785<br/> Asset protection through security awareness ent://SD_ILS/0/SD_ILS:798633 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Speed, Tyler Justin<br/>Author&#160;Speed, Tyler Justin<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S643 2012<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781439809822<br/> Securing customer trust in e-commerce transactions ent://SD_ILS/0/SD_ILS:839067 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Muhammad Bello Mai<br/>Author&#160;Muhammad Bello Mai,&#160;Zuraini Ismail, Assoc.Prof.Dr.,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 M843 2012<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Kejuruteraan Perisian) - Universiti Teknologi Malaysia, 2012<br/> Securing customer trust in e-commerce transactions ent://SD_ILS/0/SD_ILS:839070 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Muhammad Bello Mai<br/>Author&#160;Muhammad Bello Mai<br/>Format:&#160;Books<br/>Call Number&#160;CP 034551 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Kejuruteraan Perisian) - Universiti Teknologi Malaysia, 2012<br/> Auditing cloud computing : a security and privacy guide ent://SD_ILS/0/SD_ILS:777306 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Halpert, Ben, 1986-<br/>Author&#160;Halpert, Ben, 1986-<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 A93 2011<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780470874745<br/> Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams ent://SD_ILS/0/SD_ILS:363244 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Kouns, Jake<br/>Author&#160;Kouns, Jake,&#160;Minoli, Daniel<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 K68 2010<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780471762546<br/> The art of enterprise information architecture : a systems-based approach for unlocking business insight ent://SD_ILS/0/SD_ILS:759908 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Godinez, Mario<br/>Author&#160;Godinez, Mario<br/>Format:&#160;Books<br/>Call Number&#160;HD30.2 A784 2010<br/>Publisher&#160;IBM Press, Pearson,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780137035717<br/> SAP security configuration and deployment : the IT administrator's guide to best practices ent://SD_ILS/0/SD_ILS:281401 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Wun-Young, Leslie<br/>Author&#160;Wun-Young, Leslie<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 S38 2009<br/>Publisher&#160;Syngress Publishing Inc.,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781597492843<br/> Enterprise information security and privacy ent://SD_ILS/0/SD_ILS:300373 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Axelrod, C. Warren<br/>Author&#160;Axelrod, C. Warren,&#160;Bayuk, Jennifer L.,&#160;Schutzer, Daniel, 1940-<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 E57 2009<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781596931909<br/> Information security management metrics : a definitive guide to effective security monitoring and measurement ent://SD_ILS/0/SD_ILS:282895 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Brotby, W. Krag<br/>Author&#160;Brotby, W. Krag<br/>Format:&#160;Books<br/>Call Number&#160;HD30.2 B78 2009<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781420052855<br/> Information assurance architecture ent://SD_ILS/0/SD_ILS:282892 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;WIllett, Keith D.<br/>Author&#160;WIllett, Keith D.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W54 2008<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780849380679<br/> Trust and new technologies : marketing and management on the Internet and mobile media ent://SD_ILS/0/SD_ILS:323829 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Kautonen, Teemu<br/>Author&#160;Kautonen, Teemu,&#160;Karjaluoto, Heikki<br/>Format:&#160;Books<br/>Call Number&#160;HF5415.1265 T78 2008<br/>Publisher&#160;Northampton, MA : Edward Elgar,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781847205681<br/> Advances in enterprise information technology security ent://SD_ILS/0/SD_ILS:301112 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Khadraoui, Djamel<br/>Author&#160;Khadraoui, Djamel,&#160;Herrmann, Francine<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 A38 2007<br/>Publisher&#160;IGI Global,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781599040905<br/> Information security : design, implementation, measurement and compliance ent://SD_ILS/0/SD_ILS:102187 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Layton, Timothy P.<br/>Author&#160;Layton, Timothy P.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 L39 2007<br/>Publisher&#160;Auerbach Pub.,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780849370878<br/> Trust and reputation for service-oriented environments : technologies for building business intelligence and consumer confidence ent://SD_ILS/0/SD_ILS:103089 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Chang, Elizabeth<br/>Author&#160;Chang, Elizabeth,&#160;Dillon, Tharam S., 1943-,&#160;Hussain, Farookh K.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 C424 2006<br/>Publisher&#160;John Wiley &amp; Sons Inc.,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780470015476<br/> Designing and building enterprise DMZs ent://SD_ILS/0/SD_ILS:174958 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Dubrawsky, Ido<br/>Author&#160;Dubrawsky, Ido<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 D47 2006<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781597491006<br/> IT governance : a managers guide to data security and BS 7799/ISO 17799 ent://SD_ILS/0/SD_ILS:126964 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Calder, Alan, 1957-<br/>Author&#160;Calder, Alan, 1957-,&#160;Watkins, Steve, 1970-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C346 2005<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Kogan Page,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780749446505<br/> The executive guide to information security : threats, challenges, and solutions ent://SD_ILS/0/SD_ILS:430485 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Egan, Mark<br/>Author&#160;Egan, Mark<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 E32 2005<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780321304513<br/> Advances in security and payment methods for mobile commerce ent://SD_ILS/0/SD_ILS:449069 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Hu, Wen Chen, 1960-<br/>Author&#160;Hu, Wen Chen, 1960-,&#160;Lee, Chung-Wei, 1965-,&#160;Kou, Weidong<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.34 A38 2005<br/>Publisher&#160;Idea Group Publishing,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781591403456<br/> The ethical hack : a framework for business value penetration testing ent://SD_ILS/0/SD_ILS:389382 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Tiller, James S.<br/>Author&#160;Tiller, James S.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 T54 2005<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780849316098<br/> Securing your business with CISCO ASA and PIX firewalls ent://SD_ILS/0/SD_ILS:135050 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Abelar, Greg<br/>Author&#160;Abelar, Greg<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A23 2005<br/>Publisher&#160;Cisco Press,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781587052149<br/> Control and security of e-commerce ent://SD_ILS/0/SD_ILS:394197 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Smith, Gordon E. (Gordon Edward)<br/>Author&#160;Smith, Gordon E. (Gordon Edward)<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 S64 2004<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780471180906<br/> Digital defence what you should know about protecting your company's assets ent://SD_ILS/0/SD_ILS:226637 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Parenty, Thomas J.<br/>Author&#160;Parenty, Thomas J.<br/>Format:&#160;Books<br/>Call Number&#160;HD30.38 P37<br/>Publisher&#160;Harvard Business School Press,<br/>Publication Date&#160;2003<br/>ISBN&#160;9781578517794<br/> Penerokaan bangunan persatuan pelajar secara realiti maya ent://SD_ILS/0/SD_ILS:21294 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Cik Ku Fatimah Che Ku Yen<br/>Author&#160;Cik Ku Fatimah Che Ku Yen<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 11991<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/> Securing E-business systems : a guide for managers and executives ent://SD_ILS/0/SD_ILS:370726 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Braithwaite, Timothy, 1942-<br/>Author&#160;Braithwaite, Timothy, 1942-<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 B72 2002<br/>Publisher&#160;John Wiley,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780471072980<br/> Enterprise security : solaris operating environment, security journal, solaris ent://SD_ILS/0/SD_ILS:394187 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Noordergraaf, Alex<br/>Author&#160;Noordergraaf, Alex<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 E57 2002<br/>Publisher&#160;Sun Microsystems Press,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780131000926<br/> Sistem perniagaan komputer secara atas talian ent://SD_ILS/0/SD_ILS:324468 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Mohd. Erwandi Marwan<br/>Author&#160;Mohd. Erwandi Marwan<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 M47 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/> Online computer shop ent://SD_ILS/0/SD_ILS:16071 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Chan, Kian Koon<br/>Author&#160;Chan, Kian Koon<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 11202<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/>Project Paper (Bachelor of Computer Science) - Universiti Teknologi Malaysia, 2001<br/> Security and privacy for e-commerce ent://SD_ILS/0/SD_ILS:170004 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Ghosh, Anup K.<br/>Author&#160;Ghosh, Anup K.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 G57 2001<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2001<br/>ISBN&#160;9780471384212<br/> Non-repudiation in electronic commerce ent://SD_ILS/0/SD_ILS:317073 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Zhou, Jianying<br/>Author&#160;Zhou, Jianying<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 Z49 2001<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2001<br/>ISBN&#160;9781580532471<br/> Sistem kawalan keperluan bahan di MTB Sdn. Bhd ent://SD_ILS/0/SD_ILS:16527 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Azlina Hamzah<br/>Author&#160;Azlina Hamzah<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 10930<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/> Electronic commerce relationships : trust by design ent://SD_ILS/0/SD_ILS:141849 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Keen, Peter<br/>Author&#160;Keen, Peter<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 E53 2000<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2000<br/>ISBN&#160;9780130170378<br/> Implimentasi keselamatan komunikasi diantara agen ent://SD_ILS/0/SD_ILS:148257 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Lee, Chee Voon<br/>Author&#160;Lee, Chee Voon<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 L43 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/> Global network security : threats and countermeasures ent://SD_ILS/0/SD_ILS:136385 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Cameron, Debra<br/>Author&#160;Cameron, Debra<br/>Format:&#160;Books<br/>Call Number&#160;HD30.38 C35 2000<br/>Publisher&#160;Computer Technology Research,<br/>Publication Date&#160;2000<br/>ISBN&#160;9781566070775<br/> Using SET for secure electronic commerce ent://SD_ILS/0/SD_ILS:122003 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Drew, Grady N.<br/>Author&#160;Drew, Grady N.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 D74 1999<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;1999<br/>ISBN&#160;9780130997159<br/> E-commerce security strategies : protecting the enterprise ent://SD_ILS/0/SD_ILS:136356 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Cameron, Debra<br/>Author&#160;Cameron, Debra<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 C353 1998 f<br/>Publisher&#160;Computer Technology Research,<br/>Publication Date&#160;1998<br/>ISBN&#160;9781566070577<br/> E-commerce security : weak links, best defenses ent://SD_ILS/0/SD_ILS:114354 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Ghosh, Anup K.<br/>Author&#160;Ghosh, Anup K.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 G56 1998<br/>Publisher&#160;John Wiley,<br/>Publication Date&#160;1998<br/>ISBN&#160;9780471192237<br/> Intranet firewalls : planning &amp; implementing your network security system ent://SD_ILS/0/SD_ILS:456836 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Fuller, Scott<br/>Author&#160;Fuller, Scott,&#160;Pagan, Kevin<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 F84 1996<br/>Publisher&#160;Ventana Communications Group, Inc.,<br/>Publication Date&#160;1997<br/>ISBN&#160;9781566045063<br/> Electronic selling : twenty-three steps to e-selling profits ent://SD_ILS/0/SD_ILS:467790 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Jamison, Brian<br/>Author&#160;Jamison, Brian,&#160;Gold, Josh,&#160;Jamison, Warren<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.325.U6 J35 1997<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;1997<br/>ISBN&#160;9780070329300<br/> Internet security for business ent://SD_ILS/0/SD_ILS:112376 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Bernstein, Terry<br/>Author&#160;Bernstein, Terry<br/>Format:&#160;Books<br/>Call Number&#160;HD30.38 I57 1996<br/>Publisher&#160;John Wiley,<br/>Publication Date&#160;1996<br/>ISBN&#160;9780471137528<br/> Frameworks of IT prosumption for business development ent://SD_ILS/0/SD_ILS:841192 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Pa&#324;kowska, Ma&#322;gorzata editor<br/>Author&#160;Pa&#324;kowska, Ma&#322;gorzata editor<br/>Format:&#160;Books<br/>Call Number&#160;HD45 F734 2014 f<br/>ISBN&#160;9781466643130&#160;9781466643147&#160;9781466643154<br/> Cyber security management : a governance, risk and compliance framework ent://SD_ILS/0/SD_ILS:841295 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Trim, Peter R. J author<br/>Author&#160;Trim, Peter R. J author,&#160;Lee, Yang-Im author<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 T754 2014<br/>ISBN&#160;9781472432094&#160;9781472432100&#160;9781472432117<br/> A CASE STUDY FOR CYBER HYGIENE AWARENESS IN ABC COMPANY ent://SD_ILS/0/SD_ILS:871283 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Hairunnazri Haron, 1985-, author<br/>Author&#160;Hairunnazri Haron, 1985-, author,&#160;Rasimah Che Mohd. Yusoff, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H35 2017 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/> A CASE STUDY FOR CYBER HYGIENE AWARENESS IN ABC COMPANY ent://SD_ILS/0/SD_ILS:872127 2024-04-24T16:11:09Z 2024-04-24T16:11:09Z by&#160;Hairunnazri Haron, 1985-, author<br/>Author&#160;Hairunnazri Haron, 1985-, author,&#160;Rasimah Che Mohd. Yusoff, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 064087 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/>