Search Results for Computer networks -- Access controlSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dComputer$002bnetworks$002b--$002bAccess$002bcontrol$0026ps$003d300?dt=list2024-04-23T09:27:36ZHybrid medium access control using token approach in wireless sensor network for high traffic applicationsent://SD_ILS/0/SD_ILS:8519342024-04-23T09:27:36Z2024-04-23T09:27:36Zby Nor Syahidatul Nadiah Ismail, 1985-, author<br/>Author Nor Syahidatul Nadiah Ismail, 1985-, author, Sharifah Hafizah Syed Ariffin, supervisor, Nurul Mua'zzah Abdul Latiff, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number TK7872.D48 N675 2015 raf<br/>Publication Date 2015<br/>Thesis (Ph.D (Kejuruteraan Elektrik)) - Universiti Teknologi Malaysia, 2015<br/>Acceptance towards using mobile phone number as single sign on identityent://SD_ILS/0/SD_ILS:8593532024-04-23T09:27:36Z2024-04-23T09:27:36Zby Sharifah Zabedah Ainon Azim, 1982-, author<br/>Author Sharifah Zabedah Ainon Azim, 1982-, author, Wardah Zainal Abidin, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 S538 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>Acceptance towards using mobile phone number as single sign on identityent://SD_ILS/0/SD_ILS:8596382024-04-23T09:27:36Z2024-04-23T09:27:36Zby Sharifah Zabedah Ainon Azim, 1982-, author<br/>Author Sharifah Zabedah Ainon Azim, 1982-, author, Wardah Zainal Abidin, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034744 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>Identity and access management : business performanve through connected intelligenceent://SD_ILS/0/SD_ILS:8312282024-04-23T09:27:36Z2024-04-23T09:27:36Zby Osmanoglu, Ertem<br/>Author Osmanoglu, Ertem<br/>Format: Books<br/>Call Number QA76.9.A25 O78 2013<br/>Publisher Syngress, an imprint of Elsevier,<br/>Publication Date 2014<br/>ISBN 9780124081406<br/>The Intrusion detection networks : a key to collaborative securityent://SD_ILS/0/SD_ILS:8372902024-04-23T09:27:36Z2024-04-23T09:27:36Zby Fung, Carol author<br/>Author Fung, Carol author, Boutaba, Raouf<br/>Format: Books<br/>Call Number QA76.9 A25 F85 2014<br/>Publisher Auerbach Pub.,<br/>Publication Date 2014<br/>ISBN 9781466564121<br/>UTM security with Fortinet : Mastering FortiOSent://SD_ILS/0/SD_ILS:8038172024-04-23T09:27:36Z2024-04-23T09:27:36Zby Tam, Kenneth<br/>Author Tam, Kenneth<br/>Format: Books<br/>Call Number TK5105.59 U86 2013 a<br/>Publisher Syngress,<br/>Publication Date 2013<br/>ISBN 9781597497473<br/>Analyzing pattern matching algorithms applied on snort intrusion detection systement://SD_ILS/0/SD_ILS:8045062024-04-23T09:27:36Z2024-04-23T09:27:36Zby Abdifatah Abdirahman Abdullahi, 1986-<br/>Author Abdifatah Abdirahman Abdullahi, 1986-, Mohd. Aizaini Maarof, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number TK5105.59 A234 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer ( Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Analyzing pattern matching algorithms applied on snort intrusion detection systement://SD_ILS/0/SD_ILS:8045072024-04-23T09:27:36Z2024-04-23T09:27:36Zby Abdifatah Abdirahman Abdullah, 1986- author<br/>Author Abdifatah Abdirahman Abdullah, 1986- author, Fakulti Komputeran<br/>Format: Books<br/>Call Number CP 030021 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer ( Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:8052872024-04-23T09:27:36Z2024-04-23T09:27:36Zby Williams, Barry L.<br/>Author Williams, Barry L.<br/>Format: Books<br/>Call Number QA76.9.A25 W55 2013<br/>Publisher CRC Press, Taylor & Francis Group,<br/>Publication Date 2013<br/>ISBN 9781466580589<br/>Enhancement of network access control architecture with virtualizationent://SD_ILS/0/SD_ILS:8408232024-04-23T09:27:36Z2024-04-23T09:27:36Zby Hairil Annuar Md Salleh, 1977-<br/>Author Hairil Annuar Md Salleh, 1977-, Shanmugam, Bharanidharan, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034013 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Enhancement of network access control architecture with virtualizationent://SD_ILS/0/SD_ILS:8408222024-04-23T09:27:36Z2024-04-23T09:27:36Zby Hairil Annuar Md Salleh, 1977-<br/>Author Hairil Annuar Md Salleh, 1977-, Shanmugam, Bharanidharan, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 H35 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Client-side attacks and defenseent://SD_ILS/0/SD_ILS:7979482024-04-23T09:27:36Z2024-04-23T09:27:36Zby Shimonski, Robert<br/>Author Shimonski, Robert, Oriyano, Sean-Philip<br/>Format: Books<br/>Call Number TK5105.59 S55 2012<br/>Publisher Syngress,<br/>Publication Date 2012<br/>ISBN 9781597495905<br/>Role mining in business : taming role-based access control administrationent://SD_ILS/0/SD_ILS:8083182024-04-23T09:27:36Z2024-04-23T09:27:36Zby Colantonio, Alessandro<br/>Author Colantonio, Alessandro, Di Pietro, Roberto, Ocello, Alberto<br/>Format: Books<br/>Call Number QA76.9.A25 C657 2012<br/>Publisher World Scientific,<br/>Publication Date 2012<br/>ISBN 9789814374002<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:8264252024-04-23T09:27:36Z2024-04-23T09:27:36Zby Mjolsnes, Stig F.<br/>Author Mjolsnes, Stig F.<br/>Format: Books<br/>Call Number QA76.9.A25 M562 2012<br/>Publisher CRC Press,<br/>Publication Date 2012 2011<br/>ISBN 9781420085907<br/>Design a framework for a security information and events management (SIEM) programsent://SD_ILS/0/SD_ILS:8365182024-04-23T09:27:36Z2024-04-23T09:27:36Zby Khalid Mohamed Mirghani, 1974-<br/>Author Khalid Mohamed Mirghani, 1974-, Bharanidharan Shanmugam, Dr., Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number TK5105.59 K43 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Design a framework for a security information and events management (SIEM) programsent://SD_ILS/0/SD_ILS:8365192024-04-23T09:27:36Z2024-04-23T09:27:36Zby Khalid Mohamed Mirghani, 1974-<br/>Author Khalid Mohamed Mirghani, 1974-, Bharanidharan Shanmugam, Dr., Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034114 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Security information and event management (SIEM) implementationent://SD_ILS/0/SD_ILS:6433282024-04-23T09:27:36Z2024-04-23T09:27:36Zby Miller, David, 1959-<br/>Author Miller, David, 1959-<br/>Format: Books<br/>Call Number TK5105.59 S445 2011<br/>Publisher McGraw-Hill,<br/>Publication Date 2011<br/>ISBN 9780071701099<br/>Access control, security, and trust : a logical approachent://SD_ILS/0/SD_ILS:7594052024-04-23T09:27:36Z2024-04-23T09:27:36Zby Chin, Shiu-Kai<br/>Author Chin, Shiu-Kai, Older, Susan Beth<br/>Format: Books<br/>Call Number QA76.9.A25 C45 2011<br/>Publisher Chapman & Hall/CRC,<br/>Publication Date 2011<br/>ISBN 9781584888628<br/>Devising usability and security features for graphical password schemeent://SD_ILS/0/SD_ILS:6034792024-04-23T09:27:36Z2024-04-23T09:27:36Zby Muhammad Daniel Hafiz Abdullah, 1978-<br/>Author Muhammad Daniel Hafiz Abdullah, 1978-, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 017398 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Designing an IAM framework with Oracle identity and access management suiteent://SD_ILS/0/SD_ILS:8507512024-04-23T09:27:36Z2024-04-23T09:27:36Zby Scheidel, Jeff, author<br/>Author Scheidel, Jeff, author<br/>Format: Books<br/>Call Number QA76.9.A25 S337 2010<br/>Publisher Oracle/McGraw-Hill,<br/>Publication Date 2010<br/>ISBN 9780071741378<br/>Seven deadliest network attacksent://SD_ILS/0/SD_ILS:7589002024-04-23T09:27:36Z2024-04-23T09:27:36Zby Prowell, Stacy J.<br/>Author Prowell, Stacy J., Kraus, Rob, Borkin, Mike<br/>Format: Books<br/>Call Number TK5105.59 P76 2010<br/>Publisher Syngress,<br/>Publication Date 2010<br/>ISBN 9781597495493<br/>Devising usability and security features for graphical password schemeent://SD_ILS/0/SD_ILS:3905902024-04-23T09:27:36Z2024-04-23T09:27:36Zby Muhammad Daniel Hafiz Abdullah, 1978-<br/>Author Muhammad Daniel Hafiz Abdullah, 1978-, Abdul Hanan Abdullah, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 M325 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Contention-based collision-resolution medium access control algorithmsent://SD_ILS/0/SD_ILS:6413072024-04-23T09:27:36Z2024-04-23T09:27:36Zby Kartsakli, Elli<br/>Author Kartsakli, Elli<br/>Format: Books<br/>Call Number TK5105.55 C66 2009<br/>Publisher Nova Science Publishers,<br/>Publication Date 2009<br/>ISBN 9781606925805<br/>Handbook of research on information security and assuranceent://SD_ILS/0/SD_ILS:2933792024-04-23T09:27:36Z2024-04-23T09:27:36Zby Jatinder N. D. Gupta<br/>Author Jatinder N. D. Gupta, Gupta, Jatinder N. D.<br/>Format: Books<br/>Call Number TK5105.59 H353 2009<br/>Publisher Information Science Reference,<br/>Publication Date 2009<br/>ISBN 9781599048550<br/>Implementing NAP and NAC security technologies : the complete guide to network access controlent://SD_ILS/0/SD_ILS:2322082024-04-23T09:27:36Z2024-04-23T09:27:36Zby Hoffman, Daniel (Daniel V.), 1972-<br/>Author Hoffman, Daniel (Daniel V.), 1972-<br/>Format: Books<br/>Call Number TK5105.597 H63 2008<br/>Publisher Wiley,<br/>Publication Date 2008<br/>ISBN 9780470238387<br/>Policy-driven mobile ad hoc network managementent://SD_ILS/0/SD_ILS:2056342024-04-23T09:27:36Z2024-04-23T09:27:36Zby Chadha, Ritu, 1964-<br/>Author Chadha, Ritu, 1964-, Kant, Lahta, 1962-<br/>Format: Books<br/>Call Number TK5105.77 C42 2008<br/>Publisher Wiley-Interscience,<br/>Publication Date 2008<br/>ISBN 9780470055373<br/>Implementing NAP and NAC security technologies : the complete guide to network access controlent://SD_ILS/0/SD_ILS:2927122024-04-23T09:27:36Z2024-04-23T09:27:36Zby Hoffman, Daniel V.<br/>Author Hoffman, Daniel V.<br/>Format: Books<br/>Call Number TK5105.597 H64 2008<br/>Publisher Wiley,<br/>Publication Date 2008<br/>ISBN 9780470238387<br/>Role engineering for enterprise security managementent://SD_ILS/0/SD_ILS:2635972024-04-23T09:27:36Z2024-04-23T09:27:36Zby Coyne, Edward J.<br/>Author Coyne, Edward J.<br/>Format: Books<br/>Call Number T58.64 C69 2008<br/>Publisher Artech House,<br/>Publication Date 2008<br/>ISBN 9781596932180<br/>Network security : private communications in a public worldent://SD_ILS/0/SD_ILS:3288602024-04-23T09:27:36Z2024-04-23T09:27:36Zby Kaufman, Charlie<br/>Author Kaufman, Charlie, Perlman, Radia, Speciner, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 K34 2008<br/>Edition 2nd ed.<br/>Publisher Prentice Hall of India,<br/>Publication Date 2008<br/>ISBN 9788120322134<br/>Role-based access controlent://SD_ILS/0/SD_ILS:2096172024-04-23T09:27:36Z2024-04-23T09:27:36Zby Ferraiolo, David F.<br/>Author Ferraiolo, David F., Kuhn, D. Richard, Chandramouli, Ramaswamy<br/>Format: Books<br/>Call Number QA76.9.A25 F47 2007<br/>Edition 2nd ed.<br/>Publisher Artech House,<br/>Publication Date 2007<br/>ISBN 9781596931138<br/>IT security governance guidebook with security program metrics on CD-ROMent://SD_ILS/0/SD_ILS:1566612024-04-23T09:27:36Z2024-04-23T09:27:36Zby Cohen, Fred, 1956-<br/>Author Cohen, Fred, 1956-<br/>Format: Books<br/>Call Number TK5105.59 C63 2007<br/>Publisher Auerbach Publications,<br/>Publication Date 2007<br/>ISBN 9780849384356<br/>Integrated security systems design : concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:1610252024-04-23T09:27:36Z2024-04-23T09:27:36Zby Norman, Thomas<br/>Author Norman, Thomas<br/>Format: Books<br/>Call Number TK5105.59 N674 2007<br/>Publisher Elsevier Butterworth-Heinemann,<br/>Publication Date 2007<br/>ISBN 9780750679091<br/>Network security architecture design for Malaysian maritime enforcement agencyent://SD_ILS/0/SD_ILS:1553732024-04-23T09:27:36Z2024-04-23T09:27:36Zby Mahathir Abdul Hamid<br/>Author Mahathir Abdul Hamid, Shamsul Sahibuddin, supervisor<br/>Format: Books<br/>Call Number QA76.9.A25 M35 2007 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2007<br/>Information systems security third international conference, ICISS 2007, Delhi, India, December 16-20, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5175602024-04-23T09:27:36Z2024-04-23T09:27:36Zby International Conference on Information Systems Security (3rd : 2007 : Delhi, India)<br/>Author International Conference on Information Systems Security (3rd : 2007 : Delhi, India), McDaniel, Patrick (Patrick Drew), Gupta, Shyam K., SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000198<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540770862 9783540770855<br/><a href="http://dx.doi.org/10.1007/978-3-540-77086-2">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>IT security governance guidebook with security program metrics on CD-ROMent://SD_ILS/0/SD_ILS:5702202024-04-23T09:27:36Z2024-04-23T09:27:36Zby Cohen, Fred, 1956-<br/>Author Cohen, Fred, 1956-<br/>Format: Computer file<br/>Call Number CP 8941<br/>Publisher Auerbach Publications,<br/>Publication Date 2007<br/>ISBN 9780849384356<br/>Snort : IDS and IPS toolkitent://SD_ILS/0/SD_ILS:5780422024-04-23T09:27:36Z2024-04-23T09:27:36Zby Beale, Jay<br/>Author Beale, Jay, Baker, Andrew R., Esler, Joel<br/>Format: Computer file<br/>Call Number CP 7232<br/>Publisher Syngress Publishing,<br/>Publication Date 2007<br/>ISBN 9781597490993<br/>Network security architecture design for Malaysian maritime enforcement agencyent://SD_ILS/0/SD_ILS:5680862024-04-23T09:27:36Z2024-04-23T09:27:36Zby Mahathir Abdul Hamid<br/>Author Mahathir Abdul Hamid, Shamsul Sahibuddin, supervisor<br/>Format: Computer file<br/>Call Number CP 015120<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2007<br/>Restricted<br/>Cisco Network Admission Controlent://SD_ILS/0/SD_ILS:6235052024-04-23T09:27:36Z2024-04-23T09:27:36Zby Helfrich, Denise<br/>Author Helfrich, Denise<br/>Format: Books<br/>Call Number QA76.9.A25 C574 2007 v.1<br/>Publisher Cisco,<br/>Publication Date 2007<br/>ISBN 9781587052415<br/>Mechanics of user identification and authentication : fundamentals of identity managementent://SD_ILS/0/SD_ILS:2480742024-04-23T09:27:36Z2024-04-23T09:27:36Zby Todorov, Dobromir<br/>Author Todorov, Dobromir<br/>Format: Books<br/>Call Number TK5105.59 T62 2007<br/>Publisher Auerbach Publications,<br/>Publication Date 2007<br/>ISBN 9781420052190<br/>Privacy-respecting intrusion detectionent://SD_ILS/0/SD_ILS:2716382024-04-23T09:27:36Z2024-04-23T09:27:36Zby Flegel, Ulrich<br/>Author Flegel, Ulrich<br/>Format: Books<br/>Call Number QA76.9.A25 F53 2007<br/>Publisher Springer-Verlag,<br/>Publication Date 2007<br/>ISBN 9780387343464<br/>Advances in computer science--ASIAN 2007 computer and network security : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5175492024-04-23T09:27:36Z2024-04-23T09:27:36Zby Asian Computing Science Conference (12th : 2007 : Daw?{rcub}hah, Qatar)<br/>Author Asian Computing Science Conference (12th : 2007 : Daw?{rcub}hah, Qatar), Cervesato, Iliano, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000522<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540769293 9783540769279<br/><a href="http://dx.doi.org/10.1007/978-3-540-76929-3">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Enhancement of snort intrusion detection systement://SD_ILS/0/SD_ILS:1118882024-04-23T09:27:36Z2024-04-23T09:27:36Zby Rabia Bakhteri Jahangir Bakhteri<br/>Author Rabia Bakhteri Jahangir Bakhteri<br/>Format: Books<br/>Call Number TK5105.59 R32 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Project Paper (Sarjana Muda Kejuruteraan (Komputer)) - Universiti Teknologi Malaysia, 2006<br/>Networked embedded sensing and control : Workshop NESC'05 : University of Notre Dame, USA, October 2005 proceedingsent://SD_ILS/0/SD_ILS:1581702024-04-23T09:27:36Z2024-04-23T09:27:36Zby Workshop on Networked Embedded Sensing and Control (2005 : University of Notre Dame)<br/>Author Workshop on Networked Embedded Sensing and Control (2005 : University of Notre Dame), Antsaklis, Panos J., Tabuada, Paulo<br/>Format: Books<br/>Call Number TK7872.D48 W67 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9783540327943<br/>Security and privacy in dynamic environments : proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Swedenent://SD_ILS/0/SD_ILS:1582062024-04-23T09:27:36Z2024-04-23T09:27:36Zby IFIP TC11 International Information Security Conference (21st : 2006 : Karlstad, Sweden)<br/>Author IFIP TC11 International Information Security Conference (21st : 2006 : Karlstad, Sweden), Fischer-Hubner, Simone<br/>Format: Books<br/>Call Number QA76.9.A25 S429 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9780387334059<br/>Access control systems : security, identity management and trust modelsent://SD_ILS/0/SD_ILS:1769002024-04-23T09:27:36Z2024-04-23T09:27:36Zby Benantar, Messaoud<br/>Author Benantar, Messaoud<br/>Format: Books<br/>Call Number TK5109.59 B46 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9780387004457<br/>Biometrics : personal identification in networked societyent://SD_ILS/0/SD_ILS:4705312024-04-23T09:27:36Z2024-04-23T09:27:36ZFormat: Books<br/>Call Number TK7882.B56 B56 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9780387285399<br/>Advances in biometrics : international conference, ICB 2006, Hong Kong, China, January 5-7, 2006 : proceedingsent://SD_ILS/0/SD_ILS:1009282024-04-23T09:27:36Z2024-04-23T09:27:36Zby ICB 2006 ( 2006 : Hong Kong, China)<br/>Author ICB 2006 ( 2006 : Hong Kong, China), Zhang, David, 1949-, Jain, Anil K., 1948-<br/>Format: Books<br/>Call Number TK7882.B56 I24 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9783540311119<br/>Advanced host intrusion prevention with CSAent://SD_ILS/0/SD_ILS:1018402024-04-23T09:27:36Z2024-04-23T09:27:36Zby Sullivan, Chad<br/>Author Sullivan, Chad, Mauvais, Paul, Asher, Jeff<br/>Format: Books<br/>Call Number TK5105.59 S94 2006<br/>Publisher Cisco Press,<br/>Publication Date 2006<br/>ISBN 9781587052521<br/>Intrusion prevention fundamentalsent://SD_ILS/0/SD_ILS:1018502024-04-23T09:27:36Z2024-04-23T09:27:36Zby Carter, Earl<br/>Author Carter, Earl, Hogue, Jonathan<br/>Format: Books<br/>Call Number TK5105.59 C377 2006<br/>Publisher Cisco Press,<br/>Publication Date 2006<br/>ISBN 9781587052392<br/>Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohanent://SD_ILS/0/SD_ILS:6175752024-04-23T09:27:36Z2024-04-23T09:27:36Zby Mohd. Nizam Omar<br/>Author Mohd. Nizam Omar<br/>Format: Computer file<br/>Call Number CP 11356<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2005<br/>Cisco security agentent://SD_ILS/0/SD_ILS:4442292024-04-23T09:27:36Z2024-04-23T09:27:36Zby Sullivan, Chad<br/>Author Sullivan, Chad<br/>Format: Books<br/>Call Number TK5105.59 S84 2005<br/>Publisher Cisco Press,<br/>Publication Date 2005<br/>ISBN 9781587052057<br/>Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohanent://SD_ILS/0/SD_ILS:4701052024-04-23T09:27:36Z2024-04-23T09:27:36Zby Mohd. Nizam Omar<br/>Author Mohd. Nizam Omar<br/>Format: Books<br/>Call Number TK5105.59 M544 2005 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=40824">Preview</a><br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2005<br/>Building Cisco remote access networks (BCRAN) : CCNP self-studyent://SD_ILS/0/SD_ILS:977162024-04-23T09:27:36Z2024-04-23T09:27:36Zby Paquet, Catherine. Building Cisco remote access networks<br/>Author Paquet, Catherine. Building Cisco remote access networks, Cisco Systems, Inc.<br/>Format: Books<br/>Call Number TK5105.597 B84 2004<br/>Edition 2nd ed.<br/>Publisher Cisco Press,<br/>Publication Date 2004<br/>ISBN 9781587051487<br/>Analisa tindak balas aktif bagi simulasi serangan teragih secara selari ke atas hos IRSent://SD_ILS/0/SD_ILS:3669592024-04-23T09:27:36Z2024-04-23T09:27:36Zby Wahidah Md. Shah<br/>Author Wahidah Md. Shah<br/>Format: Books<br/>Call Number TK5105.59 W33 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Tesis (Sarjana Sains (Komputer)) - Universiti Teknologi Malaysia, 2004<br/>Analisa tindak balas aktif bagi simulasi serangan teragih secara selari ke atas hos IRSent://SD_ILS/0/SD_ILS:5997712024-04-23T09:27:36Z2024-04-23T09:27:36Zby Wahidah Md. Shah<br/>Author Wahidah Md. Shah<br/>Format: Computer file<br/>Call Number CP 8886<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Tesis (Sarjana Sains (Komputer)) - Universiti Teknologi Malaysia, 2004<br/>Snort for dummiesent://SD_ILS/0/SD_ILS:6057412024-04-23T09:27:36Z2024-04-23T09:27:36Zby Scott, Charline<br/>Author Scott, Charline, Wolfe, Paul, Hayes, Bert<br/>Format: Computer file<br/>Call Number CP 5376<br/>Publisher Wiley,<br/>Publication Date 2004<br/>ISBN 9780764568350<br/>The hackers handbook : the strategy behind breaking into and defending networksent://SD_ILS/0/SD_ILS:4271032024-04-23T09:27:36Z2024-04-23T09:27:36Zby Young, Susan (Susan Elizabeth), 1968-<br/>Author Young, Susan (Susan Elizabeth), 1968-, Aitel, Dave<br/>Format: Books<br/>Call Number TK5105.59 Y68 2004<br/>Publisher Auerbach Pub.,<br/>Publication Date 2004<br/>ISBN 9780849308888<br/>Outsourcing information securityent://SD_ILS/0/SD_ILS:4253622024-04-23T09:27:36Z2024-04-23T09:27:36Zby Axelrod, C. Warren<br/>Author Axelrod, C. Warren<br/>Format: Books<br/>Call Number QA76.9.A25 A93 2004<br/>Publisher Artech House,<br/>Publication Date 2004<br/>ISBN 9781580535311<br/>Snort for dummiesent://SD_ILS/0/SD_ILS:3946162024-04-23T09:27:36Z2024-04-23T09:27:36Zby Scott, Charline<br/>Author Scott, Charline, Wolfe, Paul, Hayes, Bert<br/>Format: Books<br/>Call Number TK5105.59 S36 2004<br/>Publisher Wiley,<br/>Publication Date 2004<br/>ISBN 9780764568350<br/>Cisco access control security : AAA administrative servicesent://SD_ILS/0/SD_ILS:977302024-04-23T09:27:36Z2024-04-23T09:27:36Zby Carroll, Brandon<br/>Author Carroll, Brandon<br/>Format: Books<br/>Call Number QA76.3 C374 2004<br/>Publisher Cisco Press,<br/>Publication Date 2004<br/>ISBN 9781587051241<br/>Sistem penilaian permarkahan latihan praktik (FSKSM) secara atas talianent://SD_ILS/0/SD_ILS:70712024-04-23T09:27:36Z2024-04-23T09:27:36Zby Farrah Maslina Umar<br/>Author Farrah Maslina Umar<br/>Format: Visual Materials<br/>Call Number MFL 12994<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/>Ke arah pengurangan jurang masa sistem penindakbalasan pencerobohan melalui penggunaan pendekatan penjejakan pencerobohan pantasent://SD_ILS/0/SD_ILS:3536272024-04-23T09:27:36Z2024-04-23T09:27:36Zby Mohd. Nizam Omar<br/>Author Mohd. Nizam Omar, Mohd. Aizaini Maarof, Subariah Ibrahim, Persidangan Sempena Pameran Penyelidikan dan Pembangunan IPTA (2003 : Kuala Lumpur )<br/>Format: Books<br/>Call Number TK5105.59 M54 2003<br/>Publication Date 2003<br/>A handbook on ICT Set-up and securityent://SD_ILS/0/SD_ILS:3522082024-04-23T09:27:36Z2024-04-23T09:27:36Zby Hatta Mohd. Yusoff<br/>Author Hatta Mohd. Yusoff<br/>Format: Books<br/>Call Number QA76.9 H374 2003<br/>Publisher Utusan Pubs. & Distri.,<br/>Publication Date 2003<br/>ISBN 9789676114877<br/>NIRS : Network intrusion detection and active-response system : group reportent://SD_ILS/0/SD_ILS:3527642024-04-23T09:27:36Z2024-04-23T09:27:36Zby Adedayo Adetoye<br/>Author Adedayo Adetoye, Andy Choi, Marina Md. Arshad, Olufemi Soretire<br/>Format: Books<br/>Call Number TK5105.59 N475 2003<br/>Publisher University College London,<br/>Publication Date 2003<br/>Thesis (Sarjana Sains (Sains Komputer) - University College London, 2003<br/>Role-based access controlent://SD_ILS/0/SD_ILS:3401532024-04-23T09:27:36Z2024-04-23T09:27:36Zby Ferraiolo, David F.<br/>Author Ferraiolo, David F., Kuhn, D. Richard, Chandramouli, Ramaswamy<br/>Format: Books<br/>Call Number QA76.9.A25 F47 2003<br/>Publisher Artech House,<br/>Publication Date 2003<br/>ISBN 9781580533706<br/>Biometricsent://SD_ILS/0/SD_ILS:3444782024-04-23T09:27:36Z2024-04-23T09:27:36Zby Woodward, John D.<br/>Author Woodward, John D., Orlans, Nicholas M., Higgins, Peter T<br/>Format: Books<br/>Call Number TK7882.B56 W66 2003<br/>Publisher McGraw-Hill,<br/>Publication Date 2003<br/>ISBN 9780072222272<br/>Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohanent://SD_ILS/0/SD_ILS:111802024-04-23T09:27:36Z2024-04-23T09:27:36Zby Ali Yusny Daud<br/>Author Ali Yusny Daud<br/>Format: Visual Materials<br/>Call Number MFL 13917<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/>Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohanent://SD_ILS/0/SD_ILS:6010022024-04-23T09:27:36Z2024-04-23T09:27:36Zby Ali Yusny Daud<br/>Author Ali Yusny Daud<br/>Format: Computer file<br/>Call Number CP 8375<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/>Network security : private communication in a public worldent://SD_ILS/0/SD_ILS:3913992024-04-23T09:27:36Z2024-04-23T09:27:36Zby Kaufman, Charlie<br/>Author Kaufman, Charlie, Perlman, Radia, Speciner, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 K34 2002<br/>Edition 2nd ed.<br/>Publisher Prentice Hall PTR,<br/>Publication Date 2002<br/>ISBN 9780130460196<br/>Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohanent://SD_ILS/0/SD_ILS:3711612024-04-23T09:27:36Z2024-04-23T09:27:36Zby Ali Yusny Daud<br/>Author Ali Yusny Daud<br/>Format: Books<br/>Call Number TK5105.59 A44 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=51186">Preview</a><br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/>Detection & prevention of DoS attacks using intrusion detection system : design & developmentent://SD_ILS/0/SD_ILS:3224812024-04-23T09:27:36Z2024-04-23T09:27:36Zby Pathmenanthan Ramakrishna<br/>Author Pathmenanthan Ramakrishna, Mohd. Aizaini Maarof, Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format: Books<br/>Call Number TK5105.59 P376 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>DoS attacks detection using intrusion detection system and system callsent://SD_ILS/0/SD_ILS:3214622024-04-23T09:27:36Z2024-04-23T09:27:36Zby Mohd. Aizaini Maarof<br/>Author Mohd. Aizaini Maarof, Pathmenanthan Ramakrishna, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number TK5105.59 M346 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Internet and intranet securityent://SD_ILS/0/SD_ILS:3032032024-04-23T09:27:36Z2024-04-23T09:27:36Zby Oppliger, Rolf<br/>Author Oppliger, Rolf<br/>Format: Books<br/>Call Number TK5105.875.I57 O67 2002<br/>Edition 2nd ed.<br/>Publisher Artech House,<br/>Publication Date 2002<br/>ISBN 9781580531665<br/>Capaian alatan yang selamat dalam pembelajaran kolaboratif = Secure tools access in collaborative learningent://SD_ILS/0/SD_ILS:209352024-04-23T09:27:36Z2024-04-23T09:27:36Zby Faaz Anwar Asan<br/>Author Faaz Anwar Asan<br/>Format: Visual Materials<br/>Call Number MFL 12189<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Capaian alatan yang selamat dalam pembelajaran kolaboratif = Secure tools access in collaborative learningent://SD_ILS/0/SD_ILS:3019972024-04-23T09:27:36Z2024-04-23T09:27:36Zby Faaz Anwar Asan<br/>Author Faaz Anwar Asan<br/>Format: Books<br/>Call Number QA76.9.A25 F33 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Pengimplementasian teknik cincangan dan penyulitan data dalam sistem pembayaran bil Maxis Mobile di internetent://SD_ILS/0/SD_ILS:209292024-04-23T09:27:36Z2024-04-23T09:27:36Zby Izatul Farita Yusof<br/>Author Izatul Farita Yusof<br/>Format: Visual Materials<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Project Paper(Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Military vehicle sound signature analysisent://SD_ILS/0/SD_ILS:210892024-04-23T09:27:36Z2024-04-23T09:27:36Zby Firuz Giry Naidu Ramanujaloo Naidu<br/>Author Firuz Giry Naidu Ramanujaloo Naidu<br/>Format: Visual Materials<br/>Call Number MFL 12124<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Project Paper (Bachelor of Computer Engineering) - Universiti Teknologi Malaysia /ATMA, 2000<br/>Network security monitoring software on network systement://SD_ILS/0/SD_ILS:1475012024-04-23T09:27:36Z2024-04-23T09:27:36Zby Tan, Kok Kuan<br/>Author Tan, Kok Kuan<br/>Format: Books<br/>Call Number QA76.9.A25 T36 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2000<br/>Sistem kawalan inventori pusat perubatanent://SD_ILS/0/SD_ILS:157712024-04-23T09:27:36Z2024-04-23T09:27:36Zby Hafiza Ibrahim<br/>Author Hafiza Ibrahim<br/>Format: Visual Materials<br/>Call Number MFL 11127<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/>Rekabentuk keselamatan untuk modul pembelajaran siber dalam kampus siber ... [et al. ]ent://SD_ILS/0/SD_ILS:131342024-04-23T09:27:36Z2024-04-23T09:27:36Zby Mazlan Talib<br/>Author Mazlan Talib, Mohd. Anuar Jaafar, Nurbaya Kardy, Rohazlina Jarudin, Shehnaaz Yusuf Patel Dowoodi<br/>Format: Visual Materials<br/>Call Number MFL 9473<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1999<br/>Understanding security on the netent://SD_ILS/0/SD_ILS:4722092024-04-23T09:27:36Z2024-04-23T09:27:36Zby Teo, Lu Ling<br/>Author Teo, Lu Ling<br/>Format: Books<br/>Call Number QA76.9.A25 T46 1998 raf<br/>Publisher UTM,<br/>Publication Date 1998<br/>Project paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1998<br/>Fundamental steps for fixed-font character recognition in image processing ... [et al.]ent://SD_ILS/0/SD_ILS:130912024-04-23T09:27:36Z2024-04-23T09:27:36Zby Khor, Sock Choo<br/>Author Khor, Sock Choo, Mohamad Azlie Mohamad Yusof, Tan, Yee Fei, Teo, Lu Ling, Thoo, Wei Ping<br/>Format: Visual Materials<br/>Call Number MFL 9464<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1998<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1998<br/>Sistem pemetaan utiliti berintegrasi ; Kajian terhadap ancaman-ancaman pusat komputer dan perancangan diMalaysia ; Pakej inventori ; Sistem pakar untuk rekabentuk rangkaian berkomputer = expert system for computerized network design ; Sistem pengurusan maklumat pameran Muzium Negara ; Sistem jadual waktu sekolah berkomputer ; Kajian maklumat dan data grafik diSyarikat Telekom Malaysia (STM) ;ent://SD_ILS/0/SD_ILS:1622732024-04-23T09:27:36Z2024-04-23T09:27:36Zby Safian Mohamed Sahari<br/>Author Safian Mohamed Sahari, Sofiah Daud, Suriah Hasan, Tee, Chee Kiat, Zamri Tebi<br/>Format: Books<br/>Call Number MFL 7768 ra<br/>Publication Date 1991<br/>Information technology - open systems interconnection - local area networks - medium access control (MAC) service definationent://SD_ILS/0/SD_ILS:4432152024-04-23T09:27:36Z2024-04-23T09:27:36Zby British Standards Institution<br/>Author British Standards Institution, International Organization for Standardization, International Electrotechnical Commission<br/>Format: Books<br/>Call Number PIA BS ISO/IEC 10039 : 1991<br/>Publication Date 1990<br/>Security mechanisms for computer networksent://SD_ILS/0/SD_ILS:1916662024-04-23T09:27:36Z2024-04-23T09:27:36Zby Muftic, Sead<br/>Author Muftic, Sead<br/>Format: Books<br/>Call Number QA76.9.A25 S42 1989<br/>Publisher Ellis Horwood,<br/>Publication Date 1989<br/>ISBN 9780745806136<br/>APPLICATION OF K-MEANS IN REDUCING FALSE POSITIVE ALARMS IN INTRUSION PREVENTION SYSTEMSent://SD_ILS/0/SD_ILS:8361662024-04-23T09:27:36Z2024-04-23T09:27:36Zby Iman Biglari, 1982-, author<br/>Author Iman Biglari, 1982-, author, Bharanidharan Shanmugam, Dr., Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034123 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>The need for securityent://SD_ILS/0/SD_ILS:1041142024-04-23T09:27:36Z2024-04-23T09:27:36Zby The Housley Computer Network Security Seminar (1987 : Melbourne)<br/>Author The Housley Computer Network Security Seminar (1987 : Melbourne), Davies, D. W.<br/>Format: Books<br/>Call Number QA76.9.A25 H68 1987 f<br/>A SECURITY AWARENESS MODEL OF SINGLE SIGN-ON IN UNDERSTANDING PRIVATE SECTOR USER’S ACCEPTANCE AND BEHAVIORent://SD_ILS/0/SD_ILS:8602372024-04-23T09:27:36Z2024-04-23T09:27:36Zby Raihan Yahya @ Zakaria, 1985-, author<br/>Author Raihan Yahya @ Zakaria, 1985-, author, Yusnaidi Md. Yusof, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 R35 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>INFORMATION SECURITY AWARENESS AMONG SYSTEM ADMINISTRATORS AND END-USER PERSPECTIVESent://SD_ILS/0/SD_ILS:8710102024-04-23T09:27:36Z2024-04-23T09:27:36Zby Pugneswary Panner Selvan, 1984-, author<br/>Author Pugneswary Panner Selvan, 1984-, author, Roslina Ibrahim, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 P84 2016 raf<br/>Thesis Master of Science (Information Technology Managent)<br/>APPLICATION OF K-MEANS IN REDUCING FALSE POSITIVE ALARMS IN INTRUSION PREVENTION SYSTEMSent://SD_ILS/0/SD_ILS:8361652024-04-23T09:27:36Z2024-04-23T09:27:36Zby Iman Biglari, 1982-, author<br/>Author Iman Biglari, 1982-, author, Bharanidharan Shanmugam, Dr., Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 I436 2010 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>A SECURITY AWARENESS MODEL OF SINGLE SIGN-ON IN UNDERSTANDING PRIVATE SECTOR USER’S ACCEPTANCE AND BEHAVIORent://SD_ILS/0/SD_ILS:8610272024-04-23T09:27:36Z2024-04-23T09:27:36Zby Raihan Yahya @ Zakaria, 1985-, author<br/>Author Raihan Yahya @ Zakaria, 1985-, author, Yusnaidi Md. Yusof, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035032 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>INFORMATION SECURITY AWARENESS AMONG SYSTEM ADMINISTRATORS AND END-USER PERSPECTIVESent://SD_ILS/0/SD_ILS:8721562024-04-23T09:27:36Z2024-04-23T09:27:36Zby Pugneswary Panner Selvan, 1984-, author<br/>Author Pugneswary Panner Selvan, 1984-, author, Roslina Ibrahim, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 064089 ra<br/>Thesis Master of Science (Information Technology Managent)<br/>Big Data Analytics with Applications in Insider Threat Detectionent://SD_ILS/0/SD_ILS:8823692024-04-23T09:27:36Z2024-04-23T09:27:36Zby Thuraisingham, Bhavani M., author<br/>Author Thuraisingham, Bhavani M., author, Parveen, Pallabi author, Mohammad Mahedy Masud author, Khan, Latifur author<br/>Format: Books<br/>Call Number QA76.9.A25 T487 2018<br/>ISBN 9781498705479<br/>The Insider Threat : Assessment and Mitigation of Risksent://SD_ILS/0/SD_ILS:8824312024-04-23T09:27:36Z2024-04-23T09:27:36Zby Thompson, Eleanor E.<br/>Author Thompson, Eleanor E.<br/>Format: Books<br/>Call Number QA76.9.A25 T466 2019<br/>ISBN 9781498747080<br/>