Search Results for Communication - Narrowed by: Open Access Book - Computer securitySirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dCommunication$0026qf$003dITYPE$002509Material$002bType$0025091$00253AOPEN_BK$002509Open$002bAccess$002bBook$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ic$003dtrue$0026ps$003d300?dt=list2024-06-15T00:42:20ZSecured multimedia data communication systement://SD_ILS/0/SD_ILS:3760352024-06-15T00:42:20Z2024-06-15T00:42:20Zby Ahmad Zuri Sha'meri<br/>Author Ahmad Zuri Sha'meri, Universiti Teknologi Malaysia. Fakulti Kejuruteraan Elektrik, Universiti Teknologi Malaysia. Pusat Pengurusan Penyelidikan<br/>Format: Books<br/>Call Number QA76.575 A983 2006 af<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Network security : private communication in a public worldent://SD_ILS/0/SD_ILS:3913992024-06-15T00:42:20Z2024-06-15T00:42:20Zby Kaufman, Charlie<br/>Author Kaufman, Charlie, Perlman, Radia, Speciner, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 K34 2002<br/>Edition 2nd ed.<br/>Publisher Prentice Hall PTR,<br/>Publication Date 2002<br/>ISBN 9780130460196<br/>Disaster recovery planning : for computers and communication resourcesent://SD_ILS/0/SD_ILS:4246672024-06-15T00:42:20Z2024-06-15T00:42:20Zby Toigo, Jon<br/>Author Toigo, Jon<br/>Format: Books<br/>Call Number QA76.9.D348 T64 1996<br/>Publisher Wiley,<br/>Publication Date 1996<br/>ISBN 9780471121756<br/>Spatial domain technique to embed visible and invisible wetermarkingent://SD_ILS/0/SD_ILS:4116652024-06-15T00:42:20Z2024-06-15T00:42:20Zby Akram Mohd. Zeki<br/>Author Akram Mohd. Zeki, Azizah Abdul Manaf, Sayuthi Jaafar, International Conference Information and Communication Technology in Management (2005 : Melaka)<br/>Format: Books<br/>Call Number QA76.9.A25 A37 2005<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>Detection of DoS attacks using intrusion detection sensorsent://SD_ILS/0/SD_ILS:3220342024-06-15T00:42:20Z2024-06-15T00:42:20Zby Pathmenanthan Ramakrishna<br/>Author Pathmenanthan Ramakrishna, Mohd. Aizaini Maarof, Asia Pacific Optical and Wireless Communication Conference (2002: Shanghai, China)<br/>Format: Books<br/>Call Number TK5105.59 P37 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Pervasive Computing and Communications. Part II : QOS & SECURITYent://SD_ILS/0/SD_ILS:8647142024-06-15T00:42:20Z2024-06-15T00:42:20Zby Yahaya Coulibaly, editor<br/>Author Yahaya Coulibaly, editor, Mohammad Abdur Razzaque, editor, Adekemi Adedokun, contributor, Chong, Yuh Chwen, contributor, Fauziah Abdul Razak, contributor<br/>Format: Books<br/>Call Number QA76.9.A25 P473 2015 a<br/>Edition First Edition 2015<br/>Publication Date 2015<br/>ISBN 9789835210501<br/>A cryptography primer : secrets and promisesent://SD_ILS/0/SD_ILS:8358482024-06-15T00:42:20Z2024-06-15T00:42:20Zby Klein, Philip N., author<br/>Author Klein, Philip N., author<br/>Format: Books<br/>Call Number QA76.9.A25 K545 2014<br/>Publisher Cambridge University Press,<br/>Publication Date 2014<br/>ISBN 9781107017887<br/>Collaboration with cloud computing : security, social media, and unified communicationsent://SD_ILS/0/SD_ILS:8380732024-06-15T00:42:20Z2024-06-15T00:42:20Zby Messier, Ric, author<br/>Author Messier, Ric, author, Konar, Allan, editor<br/>Format: Books<br/>Call Number QA76.9.A25 M475 2014<br/>Publisher Syngress,<br/>Publication Date 2014<br/>ISBN 9780124170407<br/>Mobile device security : a comprehensive guide to securing your information in a moving worldent://SD_ILS/0/SD_ILS:6404922024-06-15T00:42:20Z2024-06-15T00:42:20Zby Fried, Stephen, 1962-<br/>Author Fried, Stephen, 1962-<br/>Format: Books<br/>Call Number HF5548.37 F75 2010<br/>Publisher Auerbach Publications,<br/>Publication Date 2010<br/>ISBN 9781439820162<br/>Seven deadliest wireless technologies attacksent://SD_ILS/0/SD_ILS:7588252024-06-15T00:42:20Z2024-06-15T00:42:20Zby Haines, Brad<br/>Author Haines, Brad, Kramer, Tim<br/>Format: Books<br/>Call Number TK5103.2 H325 2010<br/>Publisher Syngress/Elsevier,<br/>Publication Date 2010<br/>ISBN 9781597495417<br/>Information assurance architectureent://SD_ILS/0/SD_ILS:2828922024-06-15T00:42:20Z2024-06-15T00:42:20Zby WIllett, Keith D.<br/>Author WIllett, Keith D.<br/>Format: Books<br/>Call Number QA76.9.A25 W54 2008<br/>Publisher CRC Press,<br/>Publication Date 2008<br/>ISBN 9780849380679<br/>Digital privacy : theory, technologies and practicesent://SD_ILS/0/SD_ILS:2480712024-06-15T00:42:20Z2024-06-15T00:42:20Zby Acquisti, Alessandro<br/>Author Acquisti, Alessandro<br/>Format: Books<br/>Call Number QA76.9.A25 D58 2008<br/>Publisher Auerbach Publications,<br/>Publication Date 2008 2007<br/>ISBN 9781420052176<br/>Network security : private communications in a public worldent://SD_ILS/0/SD_ILS:3288602024-06-15T00:42:20Z2024-06-15T00:42:20Zby Kaufman, Charlie<br/>Author Kaufman, Charlie, Perlman, Radia, Speciner, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 K34 2008<br/>Edition 2nd ed.<br/>Publisher Prentice Hall of India,<br/>Publication Date 2008<br/>ISBN 9788120322134<br/>Securing information and communications systems : principles, technologies, and applicationsent://SD_ILS/0/SD_ILS:2637952024-06-15T00:42:20Z2024-06-15T00:42:20Zby Furnell, Steven M.<br/>Author Furnell, Steven M.<br/>Format: Books<br/>Call Number QA76.9.A25 S4244 2008<br/>Publisher Artech House Publishers,<br/>Publication Date 2008<br/>ISBN 9781596932289<br/>Network security policies and proceduresent://SD_ILS/0/SD_ILS:1581672024-06-15T00:42:20Z2024-06-15T00:42:20Zby Frye, Douglas W.<br/>Author Frye, Douglas W.<br/>Format: Books<br/>Call Number HF5548.37 F79 2007<br/>Publisher Springer-Verlag,<br/>Publication Date 2007<br/>ISBN 9780387309378<br/><a href="http://dx.doi.org/10.1007/978-0-387-47955-2">FullText</a><br/>WarDriving and wireless penetration testingent://SD_ILS/0/SD_ILS:1609522024-06-15T00:42:20Z2024-06-15T00:42:20Zby Hurley, Chris<br/>Author Hurley, Chris<br/>Format: Books<br/>Call Number TK5103.2 W38 2007<br/>Publisher Syngress Publishing,<br/>Publication Date 2007<br/>ISBN 9781597491112<br/>A classical introduction to cryptography : applications for communications securityent://SD_ILS/0/SD_ILS:944212024-06-15T00:42:20Z2024-06-15T00:42:20Zby Vaudenay, Serge<br/>Author Vaudenay, Serge<br/>Format: Books<br/>Call Number QA76.9.A25 V38 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9780387254647<br/>Information assurance : security in the information environmentent://SD_ILS/0/SD_ILS:945472024-06-15T00:42:20Z2024-06-15T00:42:20Zby Blyth, Andrew, 1966-<br/>Author Blyth, Andrew, 1966-, Kovacich, Gerald L.<br/>Format: Books<br/>Call Number QA76.9.A25 B59 2006<br/>Edition 2nd ed.<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9781846282669<br/>Security for mobilityent://SD_ILS/0/SD_ILS:3955482024-06-15T00:42:20Z2024-06-15T00:42:20Zby Mitchell, Chris J.<br/>Author Mitchell, Chris J., Institution of Electrical Engineers<br/>Format: Books<br/>Call Number TK6570.M6 S42 2004<br/>Publisher Institution of Electrical Engineers,.<br/>Publication Date 2004<br/>ISBN 9780863413377<br/>Mobility, security and web services : technologies and service - oriented architectures for a new era of IT solutionsent://SD_ILS/0/SD_ILS:4371912024-06-15T00:42:20Z2024-06-15T00:42:20Zby Wiehler, Gerhard<br/>Author Wiehler, Gerhard<br/>Format: Books<br/>Call Number T58.64 W53 2004<br/>Publisher Publicis Corporate Pubs,<br/>Publication Date 2004<br/>ISBN 9783895782299<br/>UMTS securityent://SD_ILS/0/SD_ILS:3942292024-06-15T00:42:20Z2024-06-15T00:42:20Zby Niemi, Valtteri<br/>Author Niemi, Valtteri, Nyberg, Kaisa, 1948-<br/>Format: Books<br/>Call Number QA76.9.A25 N53 2003<br/>Publisher John Wiley & Sons,<br/>Publication Date 2003<br/>ISBN 9780470847947<br/>Authentication protocol : methods reviewent://SD_ILS/0/SD_ILS:3268212024-06-15T00:42:20Z2024-06-15T00:42:20Zby Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, International Technical Conference on Circuits, Systems, Computer and Communications (2002 : Thailand)<br/>Format: Books<br/>Call Number QA76.9.A25 C35 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Secure electronic commerce : building the infrastructure for digital signatures and encryptionent://SD_ILS/0/SD_ILS:1638772024-06-15T00:42:20Z2024-06-15T00:42:20Zby Ford, Warwick<br/>Author Ford, Warwick, Baum, Michael S.<br/>Format: Books<br/>Call Number QA76.9.A25 F67 2001<br/>Edition 2nd ed.<br/>Publisher Prentice Hall,<br/>Publication Date 2001<br/>ISBN 9780130272768<br/>Securing e-business applications and communicationsent://SD_ILS/0/SD_ILS:3131872024-06-15T00:42:20Z2024-06-15T00:42:20Zby Held, Jonathan S.<br/>Author Held, Jonathan S., Bowers, John R.<br/>Format: Books<br/>Call Number QA76.9.A25 H44 2001<br/>Publisher Auerbach Publications,<br/>Publication Date 2001<br/>ISBN 9780849309632<br/>Cryptography and secure communicationsent://SD_ILS/0/SD_ILS:2990722024-06-15T00:42:20Z2024-06-15T00:42:20Zby Man, Young Rhee<br/>Author Man, Young Rhee<br/>Format: Books<br/>Call Number QA76.9.A25 R43 1994<br/>Publisher McGraw-Hill,<br/>Publication Date 1994<br/>ISBN 9780071125024<br/>Cryptographic and Information Security : Approaches for Images and Videosent://SD_ILS/0/SD_ILS:8822552024-06-15T00:42:20Z2024-06-15T00:42:20Zby Ramakrishnan, S., editor<br/>Author Ramakrishnan, S., editor<br/>Format: Books<br/>Call Number QA76.9.A25 C796 2019<br/>ISBN 9781138563841<br/>