Search Results for Communication - Narrowed by: Open Access Book - Computer security SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dCommunication$0026qf$003dITYPE$002509Material$002bType$0025091$00253AOPEN_BK$002509Open$002bAccess$002bBook$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ic$003dtrue$0026ps$003d300?dt=list 2024-06-15T00:42:20Z Secured multimedia data communication system ent://SD_ILS/0/SD_ILS:376035 2024-06-15T00:42:20Z 2024-06-15T00:42:20Z by&#160;Ahmad Zuri Sha'meri<br/>Author&#160;Ahmad Zuri Sha'meri,&#160;Universiti Teknologi Malaysia. Fakulti Kejuruteraan Elektrik,&#160;Universiti Teknologi Malaysia. Pusat Pengurusan Penyelidikan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.575 A983 2006 af<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/> Network security : private communication in a public world ent://SD_ILS/0/SD_ILS:391399 2024-06-15T00:42:20Z 2024-06-15T00:42:20Z by&#160;Kaufman, Charlie<br/>Author&#160;Kaufman, Charlie,&#160;Perlman, Radia,&#160;Speciner, Michael<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K34 2002<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Prentice Hall PTR,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780130460196<br/> Disaster recovery planning : for computers and communication resources ent://SD_ILS/0/SD_ILS:424667 2024-06-15T00:42:20Z 2024-06-15T00:42:20Z by&#160;Toigo, Jon<br/>Author&#160;Toigo, Jon<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D348 T64 1996<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;1996<br/>ISBN&#160;9780471121756<br/> Spatial domain technique to embed visible and invisible wetermarking ent://SD_ILS/0/SD_ILS:411665 2024-06-15T00:42:20Z 2024-06-15T00:42:20Z by&#160;Akram Mohd. Zeki<br/>Author&#160;Akram Mohd. Zeki,&#160;Azizah Abdul Manaf,&#160;Sayuthi Jaafar,&#160;International Conference Information and Communication Technology in Management (2005 : Melaka)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A37 2005<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/> Detection of DoS attacks using intrusion detection sensors ent://SD_ILS/0/SD_ILS:322034 2024-06-15T00:42:20Z 2024-06-15T00:42:20Z by&#160;Pathmenanthan Ramakrishna<br/>Author&#160;Pathmenanthan Ramakrishna,&#160;Mohd. Aizaini Maarof,&#160;Asia Pacific Optical and Wireless Communication Conference (2002: Shanghai, China)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P37 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Pervasive Computing and Communications. Part II : QOS &amp; SECURITY ent://SD_ILS/0/SD_ILS:864714 2024-06-15T00:42:20Z 2024-06-15T00:42:20Z by&#160;Yahaya Coulibaly, editor<br/>Author&#160;Yahaya Coulibaly, editor,&#160;Mohammad Abdur Razzaque, editor,&#160;Adekemi Adedokun, contributor,&#160;Chong, Yuh Chwen, contributor,&#160;Fauziah Abdul Razak, contributor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P473 2015 a<br/>Edition&#160;First Edition 2015<br/>Publication Date&#160;2015<br/>ISBN&#160;9789835210501<br/> A cryptography primer : secrets and promises ent://SD_ILS/0/SD_ILS:835848 2024-06-15T00:42:20Z 2024-06-15T00:42:20Z by&#160;Klein, Philip N., author<br/>Author&#160;Klein, Philip N., author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K545 2014<br/>Publisher&#160;Cambridge University Press,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781107017887<br/> Collaboration with cloud computing : security, social media, and unified communications ent://SD_ILS/0/SD_ILS:838073 2024-06-15T00:42:20Z 2024-06-15T00:42:20Z by&#160;Messier, Ric, author<br/>Author&#160;Messier, Ric, author,&#160;Konar, Allan, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M475 2014<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124170407<br/> Mobile device security : a comprehensive guide to securing your information in a moving world ent://SD_ILS/0/SD_ILS:640492 2024-06-15T00:42:20Z 2024-06-15T00:42:20Z by&#160;Fried, Stephen, 1962-<br/>Author&#160;Fried, Stephen, 1962-<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 F75 2010<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781439820162<br/> Seven deadliest wireless technologies attacks ent://SD_ILS/0/SD_ILS:758825 2024-06-15T00:42:20Z 2024-06-15T00:42:20Z by&#160;Haines, Brad<br/>Author&#160;Haines, Brad,&#160;Kramer, Tim<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 H325 2010<br/>Publisher&#160;Syngress/Elsevier,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781597495417<br/> Information assurance architecture ent://SD_ILS/0/SD_ILS:282892 2024-06-15T00:42:20Z 2024-06-15T00:42:20Z by&#160;WIllett, Keith D.<br/>Author&#160;WIllett, Keith D.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W54 2008<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780849380679<br/> Digital privacy : theory, technologies and practices ent://SD_ILS/0/SD_ILS:248071 2024-06-15T00:42:20Z 2024-06-15T00:42:20Z by&#160;Acquisti, Alessandro<br/>Author&#160;Acquisti, Alessandro<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D58 2008<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2008&#160;2007<br/>ISBN&#160;9781420052176<br/> Network security : private communications in a public world ent://SD_ILS/0/SD_ILS:328860 2024-06-15T00:42:20Z 2024-06-15T00:42:20Z by&#160;Kaufman, Charlie<br/>Author&#160;Kaufman, Charlie,&#160;Perlman, Radia,&#160;Speciner, Michael<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K34 2008<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Prentice Hall of India,<br/>Publication Date&#160;2008<br/>ISBN&#160;9788120322134<br/> Securing information and communications systems : principles, technologies, and applications ent://SD_ILS/0/SD_ILS:263795 2024-06-15T00:42:20Z 2024-06-15T00:42:20Z by&#160;Furnell, Steven M.<br/>Author&#160;Furnell, Steven M.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S4244 2008<br/>Publisher&#160;Artech House Publishers,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781596932289<br/> Network security policies and procedures ent://SD_ILS/0/SD_ILS:158167 2024-06-15T00:42:20Z 2024-06-15T00:42:20Z by&#160;Frye, Douglas W.<br/>Author&#160;Frye, Douglas W.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 F79 2007<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780387309378<br/><a href="http://dx.doi.org/10.1007/978-0-387-47955-2">FullText</a><br/> WarDriving and wireless penetration testing ent://SD_ILS/0/SD_ILS:160952 2024-06-15T00:42:20Z 2024-06-15T00:42:20Z by&#160;Hurley, Chris<br/>Author&#160;Hurley, Chris<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 W38 2007<br/>Publisher&#160;Syngress Publishing,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781597491112<br/> A classical introduction to cryptography : applications for communications security ent://SD_ILS/0/SD_ILS:94421 2024-06-15T00:42:20Z 2024-06-15T00:42:20Z by&#160;Vaudenay, Serge<br/>Author&#160;Vaudenay, Serge<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 V38 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387254647<br/> Information assurance : security in the information environment ent://SD_ILS/0/SD_ILS:94547 2024-06-15T00:42:20Z 2024-06-15T00:42:20Z by&#160;Blyth, Andrew, 1966-<br/>Author&#160;Blyth, Andrew, 1966-,&#160;Kovacich, Gerald L.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B59 2006<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781846282669<br/> Security for mobility ent://SD_ILS/0/SD_ILS:395548 2024-06-15T00:42:20Z 2024-06-15T00:42:20Z by&#160;Mitchell, Chris J.<br/>Author&#160;Mitchell, Chris J.,&#160;Institution of Electrical Engineers<br/>Format:&#160;Books<br/>Call Number&#160;TK6570.M6 S42 2004<br/>Publisher&#160;Institution of Electrical Engineers,.<br/>Publication Date&#160;2004<br/>ISBN&#160;9780863413377<br/> Mobility, security and web services : technologies and service - oriented architectures for a new era of IT solutions ent://SD_ILS/0/SD_ILS:437191 2024-06-15T00:42:20Z 2024-06-15T00:42:20Z by&#160;Wiehler, Gerhard<br/>Author&#160;Wiehler, Gerhard<br/>Format:&#160;Books<br/>Call Number&#160;T58.64 W53 2004<br/>Publisher&#160;Publicis Corporate Pubs,<br/>Publication Date&#160;2004<br/>ISBN&#160;9783895782299<br/> UMTS security ent://SD_ILS/0/SD_ILS:394229 2024-06-15T00:42:20Z 2024-06-15T00:42:20Z by&#160;Niemi, Valtteri<br/>Author&#160;Niemi, Valtteri,&#160;Nyberg, Kaisa, 1948-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N53 2003<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780470847947<br/> Authentication protocol : methods review ent://SD_ILS/0/SD_ILS:326821 2024-06-15T00:42:20Z 2024-06-15T00:42:20Z by&#160;Cahyo Crysdian<br/>Author&#160;Cahyo Crysdian,&#160;Abdul Hanan Abdullah,&#160;International Technical Conference on Circuits, Systems, Computer and Communications (2002 : Thailand)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C35 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Secure electronic commerce : building the infrastructure for digital signatures and encryption ent://SD_ILS/0/SD_ILS:163877 2024-06-15T00:42:20Z 2024-06-15T00:42:20Z by&#160;Ford, Warwick<br/>Author&#160;Ford, Warwick,&#160;Baum, Michael S.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F67 2001<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2001<br/>ISBN&#160;9780130272768<br/> Securing e-business applications and communications ent://SD_ILS/0/SD_ILS:313187 2024-06-15T00:42:20Z 2024-06-15T00:42:20Z by&#160;Held, Jonathan S.<br/>Author&#160;Held, Jonathan S.,&#160;Bowers, John R.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H44 2001<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2001<br/>ISBN&#160;9780849309632<br/> Cryptography and secure communications ent://SD_ILS/0/SD_ILS:299072 2024-06-15T00:42:20Z 2024-06-15T00:42:20Z by&#160;Man, Young Rhee<br/>Author&#160;Man, Young Rhee<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R43 1994<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;1994<br/>ISBN&#160;9780071125024<br/> Cryptographic and Information Security : Approaches for Images and Videos ent://SD_ILS/0/SD_ILS:882255 2024-06-15T00:42:20Z 2024-06-15T00:42:20Z by&#160;Ramakrishnan, S., editor<br/>Author&#160;Ramakrishnan, S., editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C796 2019<br/>ISBN&#160;9781138563841<br/>