Search Results for Communication - Narrowed by: Computer networks -- Security measures SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dCommunication$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list 2024-06-10T19:55:41Z Security of information and communication networks ent://SD_ILS/0/SD_ILS:282111 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Kartalopoulos, Stamatios V.<br/>Author&#160;Kartalopoulos, Stamatios V.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 K37 2009<br/>Publisher&#160;Wiley-IEEE Press,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780470290255<br/> Introduction to communication electronic warfare systems ent://SD_ILS/0/SD_ILS:300381 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Poisel, Richard A.<br/>Author&#160;Poisel, Richard A.<br/>Format:&#160;Books<br/>Call Number&#160;UG590 P64 2008<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781596934528<br/> Introduction to communication electronic warfare systems ent://SD_ILS/0/SD_ILS:317083 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Poisel, Richard<br/>Author&#160;Poisel, Richard<br/>Format:&#160;Books<br/>Call Number&#160;UG590 P65 2002<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2002<br/>ISBN&#160;9781580533447<br/> A study of trusted computing implementation in public sector information, communication and technology (ICT) domain ent://SD_ILS/0/SD_ILS:604073 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Rusnita Isnin @ Hamdan<br/>Author&#160;Rusnita Isnin @ Hamdan,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 025045 ra<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> A study of trusted computing implementation in public sector information, communication and technology (ICT) domain ent://SD_ILS/0/SD_ILS:396440 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Rusnita Isnin @ Hamdan<br/>Author&#160;Rusnita Isnin @ Hamdan,&#160;Rabiah Ahmad, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R87 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> Network security : private communication in a public world ent://SD_ILS/0/SD_ILS:391399 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Kaufman, Charlie<br/>Author&#160;Kaufman, Charlie,&#160;Perlman, Radia,&#160;Speciner, Michael<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K34 2002<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Prentice Hall PTR,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780130460196<br/> Wireless network security ent://SD_ILS/0/SD_ILS:197062 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Xiao, Yang<br/>Author&#160;Xiao, Yang,&#160;Shen, X. (Xuemin), 1958-,&#160;Du, Ding-Zhu<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 W579 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780387280400<br/> A Benchmarking methodology for NPU-based stateful firewall ent://SD_ILS/0/SD_ILS:352612 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Lee, Eng Kean<br/>Author&#160;Lee, Eng Kean,&#160;Sulaiman Mohd. Nor,&#160;IEEE Asia Pacific Conference on Communication APCC 2003 (9th : 2003 : Penang)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 L44 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Detection of DoS attacks using intrusion detection sensors ent://SD_ILS/0/SD_ILS:322034 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Pathmenanthan Ramakrishna<br/>Author&#160;Pathmenanthan Ramakrishna,&#160;Mohd. Aizaini Maarof,&#160;Asia Pacific Optical and Wireless Communication Conference (2002: Shanghai, China)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P37 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> A secure model to mitigate bypassing web-based wireless authentication ent://SD_ILS/0/SD_ILS:831021 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Jamil Salem Bajamil, 1987-, author<br/>Author&#160;Jamil Salem Bajamil, 1987-, author,&#160;Mazdak Zamani, 1979-, supervisor,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 B35 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> A secure model to mitigate bypassing web-based wireless authentication ent://SD_ILS/0/SD_ILS:831022 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Jamil Salem Bajamil, 1987-, author<br/>Author&#160;Jamil Salem Bajamil, 1987-, author<br/>Format:&#160;Books<br/>Call Number&#160;CP 033623 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Security, privacy, trust, and resource management in mobile and wireless communications ent://SD_ILS/0/SD_ILS:841264 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Rawat, Danda B., 1977-, editor<br/>Author&#160;Rawat, Danda B., 1977-, editor,&#160;Bista, Bhed B., 1967-, editor,&#160;Yan, Gongjun, 1976-, editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 S435 2014 f<br/>Publisher&#160;Information Science Reference, an imprint of IGI Global,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466646919<br/> Security awareness framework of mobile phones from users' perspective ent://SD_ILS/0/SD_ILS:778415 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Mohamed Hagi Abdulkadir, 1985-<br/>Author&#160;Mohamed Hagi Abdulkadir, 1985-,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 M644 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Security awareness framework of mobile phones from users' perspective ent://SD_ILS/0/SD_ILS:778416 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Mohamed Hagi Abdulkadir, 1985-<br/>Author&#160;Mohamed Hagi Abdulkadir, 1985-<br/>Format:&#160;Books<br/>Call Number&#160;CP 027523 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Kajian pengumpukkan saluran menggunakan partial sharing scheme (PSS) terhadap pelbagai kelas trafik GSM dan GPRS ent://SD_ILS/0/SD_ILS:765341 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Nur Farhana Jalalluddin<br/>Author&#160;Nur Farhana Jalalluddin<br/>Format:&#160;Books<br/>Call Number&#160;CP 026419 ra<br/>Publication Date&#160;2011<br/>Project Paper (Sarjana Muda Sains (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2011<br/> Cognitive radio networking and security : a game-theoretic view ent://SD_ILS/0/SD_ILS:761273 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Liu, K. J. Ray, 1961-<br/>Author&#160;Liu, K. J. Ray, 1961-,&#160;Wang, Beibei<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.4815 L58 2011<br/>Publisher&#160;Cambridge University Press,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780521762311<br/> Kajian pengumpukkan saluran menggunakan partial sharing scheme (PSS) terhadap pelbagai kelas trafik GSM dan GPRS ent://SD_ILS/0/SD_ILS:765338 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Nur Farhana Jalalluddin<br/>Author&#160;Nur Farhana Jalalluddin,&#160;Syed Othmawi Abd. Rahman,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N43 2011 raf<br/>Publication Date&#160;2011<br/>Project Paper (Sarjana Muda Sains (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2011<br/> Analysis and implementation of security algorithms for wireless communications ent://SD_ILS/0/SD_ILS:604109 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Abdinasir Hassan Ali, 1977-<br/>Author&#160;Abdinasir Hassan Ali, 1977-,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 020848 ra<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> Analysis of wired network security facilities in securing wireless network ent://SD_ILS/0/SD_ILS:836160 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Abdul Kadir Ali Husein<br/>Author&#160;Abdul Kadir Ali Husein,&#160;Rabiah Ahmad, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 A238 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Makumat)) - Universiti Teknologi Malaysia, 2010<br/> Analysis and implementation of security algorithms for wireless communications ent://SD_ILS/0/SD_ILS:396710 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Abdinasir Hassan Ali, 1977-<br/>Author&#160;Abdinasir Hassan Ali, 1977-,&#160;Maslin Masrom, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A22 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> Security in wireless mesh networks ent://SD_ILS/0/SD_ILS:297556 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Zhang, Yan<br/>Author&#160;Zhang, Yan,&#160;Zheng, Jun,&#160;Hu, Honglin, 1975-<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 S44 2009<br/>Publisher&#160;CRC,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780849382505<br/> Security in an IPv6 environment ent://SD_ILS/0/SD_ILS:339599 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Minoli, Daniel<br/>Author&#160;Minoli, Daniel,&#160;Kouns, Jake<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M56 2009<br/>Publisher&#160;Auerbach Publication,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781420092295<br/> Security and cooperation in wireless networks : thwarting malicious and selfish behavior in the age of ubiquitous computing ent://SD_ILS/0/SD_ILS:210780 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Buttyan, Levente<br/>Author&#160;Buttyan, Levente,&#160;Hubaux, Jean-Pierre<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.85 B87 2008<br/>Publisher&#160;Cambridge University Press,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780521873710<br/> Network-aware security for group communications ent://SD_ILS/0/SD_ILS:225886 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Sun, Yan (Yan Lindsay)<br/>Author&#160;Sun, Yan (Yan Lindsay),&#160;Trappe, Wade,&#160;Liu, K. J. Ray, 1961-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S86 2008<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780387688466<br/> Information assurance architecture ent://SD_ILS/0/SD_ILS:282892 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;WIllett, Keith D.<br/>Author&#160;WIllett, Keith D.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W54 2008<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780849380679<br/> Digital privacy : theory, technologies and practices ent://SD_ILS/0/SD_ILS:248071 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Acquisti, Alessandro<br/>Author&#160;Acquisti, Alessandro<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D58 2008<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2008&#160;2007<br/>ISBN&#160;9781420052176<br/> Network security : private communications in a public world ent://SD_ILS/0/SD_ILS:328860 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Kaufman, Charlie<br/>Author&#160;Kaufman, Charlie,&#160;Perlman, Radia,&#160;Speciner, Michael<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K34 2008<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Prentice Hall of India,<br/>Publication Date&#160;2008<br/>ISBN&#160;9788120322134<br/> Foundations of communications electronic warfare ent://SD_ILS/0/SD_ILS:263577 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Poisel, Richard<br/>Author&#160;Poisel, Richard<br/>Format:&#160;Books<br/>Call Number&#160;UG590 P66 2008<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781596933910<br/> Securing information and communications systems : principles, technologies, and applications ent://SD_ILS/0/SD_ILS:263795 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Furnell, Steven M.<br/>Author&#160;Furnell, Steven M.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S4244 2008<br/>Publisher&#160;Artech House Publishers,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781596932289<br/> CWSP guide to wireless security ent://SD_ILS/0/SD_ILS:122660 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Ciampa, Mark<br/>Author&#160;Ciampa, Mark<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.78 C52 2007<br/>Publisher&#160;Thomson Course Technology,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781418836375<br/> Network security policies and procedures ent://SD_ILS/0/SD_ILS:158167 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Frye, Douglas W.<br/>Author&#160;Frye, Douglas W.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 F79 2007<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780387309378<br/><a href="http://dx.doi.org/10.1007/978-0-387-47955-2">FullText</a><br/> Data communications and network security ent://SD_ILS/0/SD_ILS:301524 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Carr, Houston<br/>Author&#160;Carr, Houston,&#160;Snyder, Charles A.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C373 2007<br/>Publisher&#160;McGraw-Hill/Irwin,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780072976045<br/> Security for mobile networks and platforms ent://SD_ILS/0/SD_ILS:104573 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Aissi, Selim<br/>Author&#160;Aissi, Selim,&#160;Dabbous, Nora,&#160;Prasad, Anand<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 A374 2006<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781596930087<br/> Wireless networks : multiuser detection in cross-layer design ent://SD_ILS/0/SD_ILS:463871 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Comaniciu, Christina<br/>Author&#160;Comaniciu, Christina,&#160;Mandayam, Narayan B.,&#160;Poor, H. Vincent<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 C65 2005<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780387236971<br/> Applying mobile agent in distributed speech recognition using JADE ent://SD_ILS/0/SD_ILS:461514 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Emrul Hamide Md. Saaim<br/>Author&#160;Emrul Hamide Md. Saaim,&#160;Abdul Manan Ahmad,&#160;Mohamad Ashari Alias,&#160;Mohd. Fauzi Othman,&#160;International Conference on Computer, Communications and Signal Processing with Special Track on Biomedical Engineering (1st. : 2005 : Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.I58 A66 2005<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/> Protocols for secure electronic commerce ent://SD_ILS/0/SD_ILS:153996 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Sherif, Mostafa Hashem<br/>Author&#160;Sherif, Mostafa Hashem<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.3 S534 2003<br/>Edition&#160;2nd<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780849315091<br/> UMTS security ent://SD_ILS/0/SD_ILS:394229 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Niemi, Valtteri<br/>Author&#160;Niemi, Valtteri,&#160;Nyberg, Kaisa, 1948-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N53 2003<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780470847947<br/> Security in fixed and wireless networks : an introduction to securing data communications ent://SD_ILS/0/SD_ILS:395542 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Schafer, Gunter<br/>Author&#160;Schafer, Gunter,&#160;Von Schmoeger, Hedwig Jourdan<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S32 2003<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780470863701<br/> Internet and wireless security ent://SD_ILS/0/SD_ILS:475589 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Temple, Robert, 1963-<br/>Author&#160;Temple, Robert, 1963-,&#160;Regnault, John<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 I55 2002<br/>Publisher&#160;Institution of Electrical Engineers,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780852961971<br/> Implementation of Brands' digital cash system in TCP/IP networking environment ent://SD_ILS/0/SD_ILS:327744 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Teo, Pock Chueng<br/>Author&#160;Teo, Pock Chueng,&#160;Ahmad Zuri Sha'ameri,&#160;Zulkarnain Mohd. Yusof,&#160;International Symposium on Information and Communications Technologies (2002 : Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;HG1710 T46 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Authentication protocol : methods review ent://SD_ILS/0/SD_ILS:326821 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Cahyo Crysdian<br/>Author&#160;Cahyo Crysdian,&#160;Abdul Hanan Abdullah,&#160;International Technical Conference on Circuits, Systems, Computer and Communications (2002 : Thailand)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C35 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Secure electronic commerce : building the infrastructure for digital signatures and encryption ent://SD_ILS/0/SD_ILS:163877 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Ford, Warwick<br/>Author&#160;Ford, Warwick,&#160;Baum, Michael S.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F67 2001<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2001<br/>ISBN&#160;9780130272768<br/> Securing e-business applications and communications ent://SD_ILS/0/SD_ILS:313187 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Held, Jonathan S.<br/>Author&#160;Held, Jonathan S.,&#160;Bowers, John R.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H44 2001<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2001<br/>ISBN&#160;9780849309632<br/> Fundamental steps for fixed-font character recognition in image processing ... [et al.] ent://SD_ILS/0/SD_ILS:13091 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Khor, Sock Choo<br/>Author&#160;Khor, Sock Choo,&#160;Mohamad Azlie Mohamad Yusof,&#160;Tan, Yee Fei,&#160;Teo, Lu Ling,&#160;Thoo, Wei Ping<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 9464<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1998<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1998<br/> ENHANCEMENT OF WIRELESS LOCAL AREA NETWORK SECURITY AT PUBLIC SERVICE DEPARTMENT ent://SD_ILS/0/SD_ILS:839021 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Zulkarnain Kamaruddin, 1977-, author<br/>Author&#160;Zulkarnain Kamaruddin, 1977-, author,&#160;Abdul Hanan Abdullah, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 Z85 2007 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> ROGUE ACCESS POINT DETECTION ON THE CLIENT-SIDE ent://SD_ILS/0/SD_ILS:839090 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Somayeh Nikbakhsh, 1982-, author<br/>Author&#160;Somayeh Nikbakhsh, 1982-, author,&#160;Azizah Abd. Manaf, Prof.Dr., supervisor,&#160;Mazdak Zamani, Dr., supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.85 S66 2012 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> SECURE WIRELESS IMPLEMENTATION BASED ON IEEE 802.1X NETWORK STANDARD ent://SD_ILS/0/SD_ILS:839597 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;al-Slakhi, Mahmoud H.R., 1982-, author<br/>Author&#160;al-Slakhi, Mahmoud H.R., 1982-, author,&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr., supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S535 2007 raf<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2007<br/> AN AUTOMATED MECHANISM TO DETECT AND MITIGATE DEAUTHENTICATION AND DISASSOCIATION DOS ATTACK IN WIRELESS 802.11 NETWORKS ent://SD_ILS/0/SD_ILS:870830 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Haitham Ameen Noman, 1986-, author<br/>Author&#160;Haitham Ameen Noman, 1986-, author,&#160;Mohd. Shahidan Abdullah, Assoc.Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.85 H35 2017 raf<br/>Thesis (Ph.D) - Universiti Teknologi Malaysia, 2017<br/> AN AUTOMATED MECHANISM TO DETECT AND MITIGATE DEAUTHENTICATION AND DISASSOCIATION DOS ATTACK IN WIRELESS 802.11 NETWORKS ent://SD_ILS/0/SD_ILS:871074 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Haitham Ameen Noman, 1986-, author<br/>Author&#160;Haitham Ameen Noman, 1986-, author,&#160;Mohd. Shahidan Abdullah, Assoc.Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 064022 ra<br/>Thesis (Ph.D) - Universiti Teknologi Malaysia, 2017<br/> A high-speed wireless secure model-real time software system perspective ent://SD_ILS/0/SD_ILS:836500 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Shamsul Bahry Amirudin<br/>Author&#160;Shamsul Bahry Amirudin,&#160;Othman B. Mohd Yusop, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 S536 2004 raf<br/>Thesis (Sarjana Sains (Sains Komputer - Real Time Software Engineering) - Universiti Teknologi Malaysia, 2004<br/> ENHANCEMENT OF WIRELESS LOCAL AREA NETWORK SECURITY AT PUBLIC SERVICE DEPARTMENT ent://SD_ILS/0/SD_ILS:839029 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Zulkarnain Kamaruddin, 1977-, author<br/>Author&#160;Zulkarnain Kamaruddin, 1977-, author,&#160;Abdul Hanan Abdullah, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 034566 ra<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> ROGUE ACCESS POINT DETECTION ON THE CLIENT-SIDE ent://SD_ILS/0/SD_ILS:839091 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Somayeh Nikbakhsh, 1982-, author<br/>Author&#160;Somayeh Nikbakhsh, 1982-, author,&#160;Azizah Abd. Manaf, Prof.Dr., supervisor,&#160;Mazdak Zamani, Dr., supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 034559 ra<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> SECURE WIRELESS IMPLEMENTATION BASED ON IEEE 802.1X NETWORK STANDARD ent://SD_ILS/0/SD_ILS:839599 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;al-Slakhi, Mahmoud H.R., 1982-<br/>Author&#160;al-Slakhi, Mahmoud H.R., 1982-,&#160;Zailani Mohamed Sidek,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 034563 ra<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2007<br/> Security, Privacy and Reliability in Computer Communications and Networks ent://SD_ILS/0/SD_ILS:866967 2024-06-10T19:55:41Z 2024-06-10T19:55:41Z by&#160;Sha, Kewei<br/>Author&#160;Sha, Kewei,&#160;Striegel, Aaron,&#160;Song, Min<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S43 2017<br/>ISBN&#160;9788793379893<br/>