Search Results for Computer networks -- Access control SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dComputer$002bnetworks$002b--$002bAccess$002bcontrol$0026ps$003d300?dt=list 2024-04-23T09:27:36Z Hybrid medium access control using token approach in wireless sensor network for high traffic applications ent://SD_ILS/0/SD_ILS:851934 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Nor Syahidatul Nadiah Ismail, 1985-, author<br/>Author&#160;Nor Syahidatul Nadiah Ismail, 1985-, author,&#160;Sharifah Hafizah Syed Ariffin, supervisor,&#160;Nurul Mua'zzah Abdul Latiff, supervisor,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;TK7872.D48 N675 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Ph.D (Kejuruteraan Elektrik)) - Universiti Teknologi Malaysia, 2015<br/> Acceptance towards using mobile phone number as single sign on identity ent://SD_ILS/0/SD_ILS:859353 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Sharifah Zabedah Ainon Azim, 1982-, author<br/>Author&#160;Sharifah Zabedah Ainon Azim, 1982-, author,&#160;Wardah Zainal Abidin, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S538 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/> Acceptance towards using mobile phone number as single sign on identity ent://SD_ILS/0/SD_ILS:859638 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Sharifah Zabedah Ainon Azim, 1982-, author<br/>Author&#160;Sharifah Zabedah Ainon Azim, 1982-, author,&#160;Wardah Zainal Abidin, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034744 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/> Identity and access management : business performanve through connected intelligence ent://SD_ILS/0/SD_ILS:831228 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Osmanoglu, Ertem<br/>Author&#160;Osmanoglu, Ertem<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 O78 2013<br/>Publisher&#160;Syngress, an imprint of Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124081406<br/> The Intrusion detection networks : a key to collaborative security ent://SD_ILS/0/SD_ILS:837290 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Fung, Carol author<br/>Author&#160;Fung, Carol author,&#160;Boutaba, Raouf<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9 A25 F85 2014<br/>Publisher&#160;Auerbach Pub.,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466564121<br/> UTM security with Fortinet : Mastering FortiOS ent://SD_ILS/0/SD_ILS:803817 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Tam, Kenneth<br/>Author&#160;Tam, Kenneth<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 U86 2013 a<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781597497473<br/> Analyzing pattern matching algorithms applied on snort intrusion detection system ent://SD_ILS/0/SD_ILS:804506 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Abdifatah Abdirahman Abdullahi, 1986-<br/>Author&#160;Abdifatah Abdirahman Abdullahi, 1986-,&#160;Mohd. Aizaini Maarof, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A234 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer ( Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Analyzing pattern matching algorithms applied on snort intrusion detection system ent://SD_ILS/0/SD_ILS:804507 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Abdifatah Abdirahman Abdullah, 1986- author<br/>Author&#160;Abdifatah Abdirahman Abdullah, 1986- author,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;CP 030021 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer ( Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:805287 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Williams, Barry L.<br/>Author&#160;Williams, Barry L.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W55 2013<br/>Publisher&#160;CRC Press, Taylor &amp; Francis Group,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781466580589<br/> Enhancement of network access control architecture with virtualization ent://SD_ILS/0/SD_ILS:840823 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Hairil Annuar Md Salleh, 1977-<br/>Author&#160;Hairil Annuar Md Salleh, 1977-,&#160;Shanmugam, Bharanidharan, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 034013 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Enhancement of network access control architecture with virtualization ent://SD_ILS/0/SD_ILS:840822 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Hairil Annuar Md Salleh, 1977-<br/>Author&#160;Hairil Annuar Md Salleh, 1977-,&#160;Shanmugam, Bharanidharan, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H35 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Client-side attacks and defense ent://SD_ILS/0/SD_ILS:797948 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Shimonski, Robert<br/>Author&#160;Shimonski, Robert,&#160;Oriyano, Sean-Philip<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S55 2012<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781597495905<br/> Role mining in business : taming role-based access control administration ent://SD_ILS/0/SD_ILS:808318 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Colantonio, Alessandro<br/>Author&#160;Colantonio, Alessandro,&#160;Di Pietro, Roberto,&#160;Ocello, Alberto<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C657 2012<br/>Publisher&#160;World Scientific,<br/>Publication Date&#160;2012<br/>ISBN&#160;9789814374002<br/> A multidisciplinary introduction to information security ent://SD_ILS/0/SD_ILS:826425 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Mjolsnes, Stig F.<br/>Author&#160;Mjolsnes, Stig F.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M562 2012<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2012&#160;2011<br/>ISBN&#160;9781420085907<br/> Design a framework for a security information and events management (SIEM) programs ent://SD_ILS/0/SD_ILS:836518 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Khalid Mohamed Mirghani, 1974-<br/>Author&#160;Khalid Mohamed Mirghani, 1974-,&#160;Bharanidharan Shanmugam, Dr.,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 K43 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Design a framework for a security information and events management (SIEM) programs ent://SD_ILS/0/SD_ILS:836519 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Khalid Mohamed Mirghani, 1974-<br/>Author&#160;Khalid Mohamed Mirghani, 1974-,&#160;Bharanidharan Shanmugam, Dr.,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034114 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Security information and event management (SIEM) implementation ent://SD_ILS/0/SD_ILS:643328 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Miller, David, 1959-<br/>Author&#160;Miller, David, 1959-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S445 2011<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780071701099<br/> Access control, security, and trust : a logical approach ent://SD_ILS/0/SD_ILS:759405 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Chin, Shiu-Kai<br/>Author&#160;Chin, Shiu-Kai,&#160;Older, Susan Beth<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C45 2011<br/>Publisher&#160;Chapman &amp; Hall/CRC,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781584888628<br/> Devising usability and security features for graphical password scheme ent://SD_ILS/0/SD_ILS:603479 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Muhammad Daniel Hafiz Abdullah, 1978-<br/>Author&#160;Muhammad Daniel Hafiz Abdullah, 1978-,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 017398 ra<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Designing an IAM framework with Oracle identity and access management suite ent://SD_ILS/0/SD_ILS:850751 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Scheidel, Jeff, author<br/>Author&#160;Scheidel, Jeff, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S337 2010<br/>Publisher&#160;Oracle/McGraw-Hill,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780071741378<br/> Seven deadliest network attacks ent://SD_ILS/0/SD_ILS:758900 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Prowell, Stacy J.<br/>Author&#160;Prowell, Stacy J.,&#160;Kraus, Rob,&#160;Borkin, Mike<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P76 2010<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781597495493<br/> Devising usability and security features for graphical password scheme ent://SD_ILS/0/SD_ILS:390590 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Muhammad Daniel Hafiz Abdullah, 1978-<br/>Author&#160;Muhammad Daniel Hafiz Abdullah, 1978-,&#160;Abdul Hanan Abdullah,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M325 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Contention-based collision-resolution medium access control algorithms ent://SD_ILS/0/SD_ILS:641307 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Kartsakli, Elli<br/>Author&#160;Kartsakli, Elli<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.55 C66 2009<br/>Publisher&#160;Nova Science Publishers,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781606925805<br/> Handbook of research on information security and assurance ent://SD_ILS/0/SD_ILS:293379 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Jatinder N. D. Gupta<br/>Author&#160;Jatinder N. D. Gupta,&#160;Gupta, Jatinder N. D.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H353 2009<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781599048550<br/> Implementing NAP and NAC security technologies : the complete guide to network access control ent://SD_ILS/0/SD_ILS:232208 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Hoffman, Daniel (Daniel V.), 1972-<br/>Author&#160;Hoffman, Daniel (Daniel V.), 1972-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.597 H63 2008<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470238387<br/> Policy-driven mobile ad hoc network management ent://SD_ILS/0/SD_ILS:205634 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Chadha, Ritu, 1964-<br/>Author&#160;Chadha, Ritu, 1964-,&#160;Kant, Lahta, 1962-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.77 C42 2008<br/>Publisher&#160;Wiley-Interscience,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470055373<br/> Implementing NAP and NAC security technologies : the complete guide to network access control ent://SD_ILS/0/SD_ILS:292712 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Hoffman, Daniel V.<br/>Author&#160;Hoffman, Daniel V.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.597 H64 2008<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470238387<br/> Role engineering for enterprise security management ent://SD_ILS/0/SD_ILS:263597 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Coyne, Edward J.<br/>Author&#160;Coyne, Edward J.<br/>Format:&#160;Books<br/>Call Number&#160;T58.64 C69 2008<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781596932180<br/> Network security : private communications in a public world ent://SD_ILS/0/SD_ILS:328860 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Kaufman, Charlie<br/>Author&#160;Kaufman, Charlie,&#160;Perlman, Radia,&#160;Speciner, Michael<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K34 2008<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Prentice Hall of India,<br/>Publication Date&#160;2008<br/>ISBN&#160;9788120322134<br/> Role-based access control ent://SD_ILS/0/SD_ILS:209617 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Ferraiolo, David F.<br/>Author&#160;Ferraiolo, David F.,&#160;Kuhn, D. Richard,&#160;Chandramouli, Ramaswamy<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F47 2007<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781596931138<br/> IT security governance guidebook with security program metrics on CD-ROM ent://SD_ILS/0/SD_ILS:156661 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Cohen, Fred, 1956-<br/>Author&#160;Cohen, Fred, 1956-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C63 2007<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780849384356<br/> Integrated security systems design : concepts, specifications, and implementation ent://SD_ILS/0/SD_ILS:161025 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Norman, Thomas<br/>Author&#160;Norman, Thomas<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N674 2007<br/>Publisher&#160;Elsevier Butterworth-Heinemann,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780750679091<br/> Network security architecture design for Malaysian maritime enforcement agency ent://SD_ILS/0/SD_ILS:155373 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Mahathir Abdul Hamid<br/>Author&#160;Mahathir Abdul Hamid,&#160;Shamsul Sahibuddin, supervisor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M35 2007 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2007<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2007<br/> Information systems security third international conference, ICISS 2007, Delhi, India, December 16-20, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517560 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;International Conference on Information Systems Security (3rd : 2007 : Delhi, India)<br/>Author&#160;International Conference on Information Systems Security (3rd : 2007 : Delhi, India),&#160;McDaniel, Patrick (Patrick Drew),&#160;Gupta, Shyam K.,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000198<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540770862&#160;9783540770855<br/><a href="http://dx.doi.org/10.1007/978-3-540-77086-2">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> IT security governance guidebook with security program metrics on CD-ROM ent://SD_ILS/0/SD_ILS:570220 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Cohen, Fred, 1956-<br/>Author&#160;Cohen, Fred, 1956-<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 8941<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780849384356<br/> Snort : IDS and IPS toolkit ent://SD_ILS/0/SD_ILS:578042 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Beale, Jay<br/>Author&#160;Beale, Jay,&#160;Baker, Andrew R.,&#160;Esler, Joel<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 7232<br/>Publisher&#160;Syngress Publishing,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781597490993<br/> Network security architecture design for Malaysian maritime enforcement agency ent://SD_ILS/0/SD_ILS:568086 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Mahathir Abdul Hamid<br/>Author&#160;Mahathir Abdul Hamid,&#160;Shamsul Sahibuddin, supervisor<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 015120<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2007<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2007<br/>Restricted<br/> Cisco Network Admission Control ent://SD_ILS/0/SD_ILS:623505 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Helfrich, Denise<br/>Author&#160;Helfrich, Denise<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C574 2007 v.1<br/>Publisher&#160;Cisco,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781587052415<br/> Mechanics of user identification and authentication : fundamentals of identity management ent://SD_ILS/0/SD_ILS:248074 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Todorov, Dobromir<br/>Author&#160;Todorov, Dobromir<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 T62 2007<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781420052190<br/> Privacy-respecting intrusion detection ent://SD_ILS/0/SD_ILS:271638 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Flegel, Ulrich<br/>Author&#160;Flegel, Ulrich<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F53 2007<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780387343464<br/> Advances in computer science--ASIAN 2007 computer and network security : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517549 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Asian Computing Science Conference (12th : 2007 : Daw?{rcub}hah, Qatar)<br/>Author&#160;Asian Computing Science Conference (12th : 2007 : Daw?{rcub}hah, Qatar),&#160;Cervesato, Iliano,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000522<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540769293&#160;9783540769279<br/><a href="http://dx.doi.org/10.1007/978-3-540-76929-3">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Enhancement of snort intrusion detection system ent://SD_ILS/0/SD_ILS:111888 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Rabia Bakhteri Jahangir Bakhteri<br/>Author&#160;Rabia Bakhteri Jahangir Bakhteri<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 R32 2006<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Project Paper (Sarjana Muda Kejuruteraan (Komputer)) - Universiti Teknologi Malaysia, 2006<br/> Networked embedded sensing and control : Workshop NESC'05 : University of Notre Dame, USA, October 2005 proceedings ent://SD_ILS/0/SD_ILS:158170 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Workshop on Networked Embedded Sensing and Control (2005 : University of Notre Dame)<br/>Author&#160;Workshop on Networked Embedded Sensing and Control (2005 : University of Notre Dame),&#160;Antsaklis, Panos J.,&#160;Tabuada, Paulo<br/>Format:&#160;Books<br/>Call Number&#160;TK7872.D48 W67 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9783540327943<br/> Security and privacy in dynamic environments : proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden ent://SD_ILS/0/SD_ILS:158206 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;IFIP TC11 International Information Security Conference (21st : 2006 : Karlstad, Sweden)<br/>Author&#160;IFIP TC11 International Information Security Conference (21st : 2006 : Karlstad, Sweden),&#160;Fischer-Hubner, Simone<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S429 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387334059<br/> Access control systems : security, identity management and trust models ent://SD_ILS/0/SD_ILS:176900 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Benantar, Messaoud<br/>Author&#160;Benantar, Messaoud<br/>Format:&#160;Books<br/>Call Number&#160;TK5109.59 B46 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387004457<br/> Biometrics : personal identification in networked society ent://SD_ILS/0/SD_ILS:470531 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z Format:&#160;Books<br/>Call Number&#160;TK7882.B56 B56 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387285399<br/> Advances in biometrics : international conference, ICB 2006, Hong Kong, China, January 5-7, 2006 : proceedings ent://SD_ILS/0/SD_ILS:100928 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;ICB 2006 ( 2006 : Hong Kong, China)<br/>Author&#160;ICB 2006 ( 2006 : Hong Kong, China),&#160;Zhang, David, 1949-,&#160;Jain, Anil K., 1948-<br/>Format:&#160;Books<br/>Call Number&#160;TK7882.B56 I24 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9783540311119<br/> Advanced host intrusion prevention with CSA ent://SD_ILS/0/SD_ILS:101840 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Sullivan, Chad<br/>Author&#160;Sullivan, Chad,&#160;Mauvais, Paul,&#160;Asher, Jeff<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S94 2006<br/>Publisher&#160;Cisco Press,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781587052521<br/> Intrusion prevention fundamentals ent://SD_ILS/0/SD_ILS:101850 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Carter, Earl<br/>Author&#160;Carter, Earl,&#160;Hogue, Jonathan<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C377 2006<br/>Publisher&#160;Cisco Press,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781587052392<br/> Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohan ent://SD_ILS/0/SD_ILS:617575 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Mohd. Nizam Omar<br/>Author&#160;Mohd. Nizam Omar<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 11356<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2005<br/> Cisco security agent ent://SD_ILS/0/SD_ILS:444229 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Sullivan, Chad<br/>Author&#160;Sullivan, Chad<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S84 2005<br/>Publisher&#160;Cisco Press,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781587052057<br/> Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohan ent://SD_ILS/0/SD_ILS:470105 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Mohd. Nizam Omar<br/>Author&#160;Mohd. Nizam Omar<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M544 2005 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=40824">Preview</a><br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2005<br/> Building Cisco remote access networks (BCRAN) : CCNP self-study ent://SD_ILS/0/SD_ILS:97716 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Paquet, Catherine. Building Cisco remote access networks<br/>Author&#160;Paquet, Catherine. Building Cisco remote access networks,&#160;Cisco Systems, Inc.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.597 B84 2004<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Cisco Press,<br/>Publication Date&#160;2004<br/>ISBN&#160;9781587051487<br/> Analisa tindak balas aktif bagi simulasi serangan teragih secara selari ke atas hos IRS ent://SD_ILS/0/SD_ILS:366959 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Wahidah Md. Shah<br/>Author&#160;Wahidah Md. Shah<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W33 2004<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/>Tesis (Sarjana Sains (Komputer)) - Universiti Teknologi Malaysia, 2004<br/> Analisa tindak balas aktif bagi simulasi serangan teragih secara selari ke atas hos IRS ent://SD_ILS/0/SD_ILS:599771 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Wahidah Md. Shah<br/>Author&#160;Wahidah Md. Shah<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 8886<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/>Tesis (Sarjana Sains (Komputer)) - Universiti Teknologi Malaysia, 2004<br/> Snort for dummies ent://SD_ILS/0/SD_ILS:605741 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Scott, Charline<br/>Author&#160;Scott, Charline,&#160;Wolfe, Paul,&#160;Hayes, Bert<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 5376<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780764568350<br/> The hackers handbook : the strategy behind breaking into and defending networks ent://SD_ILS/0/SD_ILS:427103 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Young, Susan (Susan Elizabeth), 1968-<br/>Author&#160;Young, Susan (Susan Elizabeth), 1968-,&#160;Aitel, Dave<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 Y68 2004<br/>Publisher&#160;Auerbach Pub.,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780849308888<br/> Outsourcing information security ent://SD_ILS/0/SD_ILS:425362 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Axelrod, C. Warren<br/>Author&#160;Axelrod, C. Warren<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A93 2004<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2004<br/>ISBN&#160;9781580535311<br/> Snort for dummies ent://SD_ILS/0/SD_ILS:394616 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Scott, Charline<br/>Author&#160;Scott, Charline,&#160;Wolfe, Paul,&#160;Hayes, Bert<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S36 2004<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780764568350<br/> Cisco access control security : AAA administrative services ent://SD_ILS/0/SD_ILS:97730 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Carroll, Brandon<br/>Author&#160;Carroll, Brandon<br/>Format:&#160;Books<br/>Call Number&#160;QA76.3 C374 2004<br/>Publisher&#160;Cisco Press,<br/>Publication Date&#160;2004<br/>ISBN&#160;9781587051241<br/> Sistem penilaian permarkahan latihan praktik (FSKSM) secara atas talian ent://SD_ILS/0/SD_ILS:7071 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Farrah Maslina Umar<br/>Author&#160;Farrah Maslina Umar<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12994<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/> Ke arah pengurangan jurang masa sistem penindakbalasan pencerobohan melalui penggunaan pendekatan penjejakan pencerobohan pantas ent://SD_ILS/0/SD_ILS:353627 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Mohd. Nizam Omar<br/>Author&#160;Mohd. Nizam Omar,&#160;Mohd. Aizaini Maarof,&#160;Subariah Ibrahim,&#160;Persidangan Sempena Pameran Penyelidikan dan Pembangunan IPTA (2003 : Kuala Lumpur )<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M54 2003<br/>Publication Date&#160;2003<br/> A handbook on ICT Set-up and security ent://SD_ILS/0/SD_ILS:352208 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Hatta Mohd. Yusoff<br/>Author&#160;Hatta Mohd. Yusoff<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9 H374 2003<br/>Publisher&#160;Utusan Pubs. &amp; Distri.,<br/>Publication Date&#160;2003<br/>ISBN&#160;9789676114877<br/> NIRS : Network intrusion detection and active-response system : group report ent://SD_ILS/0/SD_ILS:352764 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Adedayo Adetoye<br/>Author&#160;Adedayo Adetoye,&#160;Andy Choi,&#160;Marina Md. Arshad,&#160;Olufemi Soretire<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N475 2003<br/>Publisher&#160;University College London,<br/>Publication Date&#160;2003<br/>Thesis (Sarjana Sains (Sains Komputer) - University College London, 2003<br/> Role-based access control ent://SD_ILS/0/SD_ILS:340153 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Ferraiolo, David F.<br/>Author&#160;Ferraiolo, David F.,&#160;Kuhn, D. Richard,&#160;Chandramouli, Ramaswamy<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F47 2003<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2003<br/>ISBN&#160;9781580533706<br/> Biometrics ent://SD_ILS/0/SD_ILS:344478 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Woodward, John D.<br/>Author&#160;Woodward, John D.,&#160;Orlans, Nicholas M.,&#160;Higgins, Peter T<br/>Format:&#160;Books<br/>Call Number&#160;TK7882.B56 W66 2003<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780072222272<br/> Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan ent://SD_ILS/0/SD_ILS:11180 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Ali Yusny Daud<br/>Author&#160;Ali Yusny Daud<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 13917<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/> Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan ent://SD_ILS/0/SD_ILS:601002 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Ali Yusny Daud<br/>Author&#160;Ali Yusny Daud<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 8375<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/> Network security : private communication in a public world ent://SD_ILS/0/SD_ILS:391399 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Kaufman, Charlie<br/>Author&#160;Kaufman, Charlie,&#160;Perlman, Radia,&#160;Speciner, Michael<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K34 2002<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Prentice Hall PTR,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780130460196<br/> Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan ent://SD_ILS/0/SD_ILS:371161 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Ali Yusny Daud<br/>Author&#160;Ali Yusny Daud<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A44 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=51186">Preview</a><br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/> Detection &amp; prevention of DoS attacks using intrusion detection system : design &amp; development ent://SD_ILS/0/SD_ILS:322481 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Pathmenanthan Ramakrishna<br/>Author&#160;Pathmenanthan Ramakrishna,&#160;Mohd. Aizaini Maarof,&#160;Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P376 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> DoS attacks detection using intrusion detection system and system calls ent://SD_ILS/0/SD_ILS:321462 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Mohd. Aizaini Maarof<br/>Author&#160;Mohd. Aizaini Maarof,&#160;Pathmenanthan Ramakrishna,&#160;Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M346 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Internet and intranet security ent://SD_ILS/0/SD_ILS:303203 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Oppliger, Rolf<br/>Author&#160;Oppliger, Rolf<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 O67 2002<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2002<br/>ISBN&#160;9781580531665<br/> Capaian alatan yang selamat dalam pembelajaran kolaboratif = Secure tools access in collaborative learning ent://SD_ILS/0/SD_ILS:20935 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Faaz Anwar Asan<br/>Author&#160;Faaz Anwar Asan<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12189<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/> Capaian alatan yang selamat dalam pembelajaran kolaboratif = Secure tools access in collaborative learning ent://SD_ILS/0/SD_ILS:301997 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Faaz Anwar Asan<br/>Author&#160;Faaz Anwar Asan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F33 2001<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/> Pengimplementasian teknik cincangan dan penyulitan data dalam sistem pembayaran bil Maxis Mobile di internet ent://SD_ILS/0/SD_ILS:20929 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Izatul Farita Yusof<br/>Author&#160;Izatul Farita Yusof<br/>Format:&#160;Visual Materials<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/>Project Paper(Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/> Military vehicle sound signature analysis ent://SD_ILS/0/SD_ILS:21089 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Firuz Giry Naidu Ramanujaloo Naidu<br/>Author&#160;Firuz Giry Naidu Ramanujaloo Naidu<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12124<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Project Paper (Bachelor of Computer Engineering) - Universiti Teknologi Malaysia /ATMA, 2000<br/> Network security monitoring software on network system ent://SD_ILS/0/SD_ILS:147501 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Tan, Kok Kuan<br/>Author&#160;Tan, Kok Kuan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T36 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2000<br/> Sistem kawalan inventori pusat perubatan ent://SD_ILS/0/SD_ILS:15771 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Hafiza Ibrahim<br/>Author&#160;Hafiza Ibrahim<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 11127<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/> Rekabentuk keselamatan untuk modul pembelajaran siber dalam kampus siber ... [et al. ] ent://SD_ILS/0/SD_ILS:13134 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Mazlan Talib<br/>Author&#160;Mazlan Talib,&#160;Mohd. Anuar Jaafar,&#160;Nurbaya Kardy,&#160;Rohazlina Jarudin,&#160;Shehnaaz Yusuf Patel Dowoodi<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 9473<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1999<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1999<br/> Understanding security on the net ent://SD_ILS/0/SD_ILS:472209 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Teo, Lu Ling<br/>Author&#160;Teo, Lu Ling<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T46 1998 raf<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1998<br/>Project paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1998<br/> Fundamental steps for fixed-font character recognition in image processing ... [et al.] ent://SD_ILS/0/SD_ILS:13091 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Khor, Sock Choo<br/>Author&#160;Khor, Sock Choo,&#160;Mohamad Azlie Mohamad Yusof,&#160;Tan, Yee Fei,&#160;Teo, Lu Ling,&#160;Thoo, Wei Ping<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 9464<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1998<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1998<br/> Sistem pemetaan utiliti berintegrasi ; Kajian terhadap ancaman-ancaman pusat komputer dan perancangan diMalaysia ; Pakej inventori ; Sistem pakar untuk rekabentuk rangkaian berkomputer = expert system for computerized network design ; Sistem pengurusan maklumat pameran Muzium Negara ; Sistem jadual waktu sekolah berkomputer ; Kajian maklumat dan data grafik diSyarikat Telekom Malaysia (STM) ; ent://SD_ILS/0/SD_ILS:162273 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Safian Mohamed Sahari<br/>Author&#160;Safian Mohamed Sahari,&#160;Sofiah Daud,&#160;Suriah Hasan,&#160;Tee, Chee Kiat,&#160;Zamri Tebi<br/>Format:&#160;Books<br/>Call Number&#160;MFL 7768 ra<br/>Publication Date&#160;1991<br/> Information technology - open systems interconnection - local area networks - medium access control (MAC) service defination ent://SD_ILS/0/SD_ILS:443215 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;British Standards Institution<br/>Author&#160;British Standards Institution,&#160;International Organization for Standardization,&#160;International Electrotechnical Commission<br/>Format:&#160;Books<br/>Call Number&#160;PIA BS ISO/IEC 10039 : 1991<br/>Publication Date&#160;1990<br/> Security mechanisms for computer networks ent://SD_ILS/0/SD_ILS:191666 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Muftic, Sead<br/>Author&#160;Muftic, Sead<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S42 1989<br/>Publisher&#160;Ellis Horwood,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780745806136<br/> APPLICATION OF K-MEANS IN REDUCING FALSE POSITIVE ALARMS IN INTRUSION PREVENTION SYSTEMS ent://SD_ILS/0/SD_ILS:836166 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Iman Biglari, 1982-, author<br/>Author&#160;Iman Biglari, 1982-, author,&#160;Bharanidharan Shanmugam, Dr.,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 034123 ra<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> The need for security ent://SD_ILS/0/SD_ILS:104114 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;The Housley Computer Network Security Seminar (1987 : Melbourne)<br/>Author&#160;The Housley Computer Network Security Seminar (1987 : Melbourne),&#160;Davies, D. W.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H68 1987 f<br/> A SECURITY AWARENESS MODEL OF SINGLE SIGN-ON IN UNDERSTANDING PRIVATE SECTOR USER&rsquo;S ACCEPTANCE AND BEHAVIOR ent://SD_ILS/0/SD_ILS:860237 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Raihan Yahya @ Zakaria, 1985-, author<br/>Author&#160;Raihan Yahya @ Zakaria, 1985-, author,&#160;Yusnaidi Md. Yusof, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R35 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> INFORMATION SECURITY AWARENESS AMONG SYSTEM ADMINISTRATORS AND END-USER PERSPECTIVES ent://SD_ILS/0/SD_ILS:871010 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Pugneswary Panner Selvan, 1984-, author<br/>Author&#160;Pugneswary Panner Selvan, 1984-, author,&#160;Roslina Ibrahim, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P84 2016 raf<br/>Thesis&#160;Master of Science (Information Technology Managent)<br/> APPLICATION OF K-MEANS IN REDUCING FALSE POSITIVE ALARMS IN INTRUSION PREVENTION SYSTEMS ent://SD_ILS/0/SD_ILS:836165 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Iman Biglari, 1982-, author<br/>Author&#160;Iman Biglari, 1982-, author,&#160;Bharanidharan Shanmugam, Dr.,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I436 2010 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> A SECURITY AWARENESS MODEL OF SINGLE SIGN-ON IN UNDERSTANDING PRIVATE SECTOR USER&rsquo;S ACCEPTANCE AND BEHAVIOR ent://SD_ILS/0/SD_ILS:861027 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Raihan Yahya @ Zakaria, 1985-, author<br/>Author&#160;Raihan Yahya @ Zakaria, 1985-, author,&#160;Yusnaidi Md. Yusof, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 035032 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> INFORMATION SECURITY AWARENESS AMONG SYSTEM ADMINISTRATORS AND END-USER PERSPECTIVES ent://SD_ILS/0/SD_ILS:872156 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Pugneswary Panner Selvan, 1984-, author<br/>Author&#160;Pugneswary Panner Selvan, 1984-, author,&#160;Roslina Ibrahim, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 064089 ra<br/>Thesis&#160;Master of Science (Information Technology Managent)<br/> Big Data Analytics with Applications in Insider Threat Detection ent://SD_ILS/0/SD_ILS:882369 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Thuraisingham, Bhavani M., author<br/>Author&#160;Thuraisingham, Bhavani M., author,&#160;Parveen, Pallabi author,&#160;Mohammad Mahedy Masud author,&#160;Khan, Latifur author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T487 2018<br/>ISBN&#160;9781498705479<br/> The Insider Threat : Assessment and Mitigation of Risks ent://SD_ILS/0/SD_ILS:882431 2024-04-23T09:27:36Z 2024-04-23T09:27:36Z by&#160;Thompson, Eleanor E.<br/>Author&#160;Thompson, Eleanor E.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T466 2019<br/>ISBN&#160;9781498747080<br/>