Search Results for Computer security SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dComputer$002bsecurity$0026ps$003d300?dt=list 2024-04-26T21:41:18Z Computer security ent://SD_ILS/0/SD_ILS:246635 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Hamilton, Peter<br/>Author&#160;Hamilton, Peter<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.H37 1972<br/>Publisher&#160;Auerbach Pub.,<br/>Publication Date&#160;2020&#160;2019&#160;2018&#160;2017&#160;2016<br/>ISBN&#160;9780877691600<br/> Computer security ent://SD_ILS/0/SD_ILS:756730 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Gollmann, Dieter<br/>Author&#160;Gollmann, Dieter<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G65 2011<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780470741153<br/> Computer security ent://SD_ILS/0/SD_ILS:461636 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Gollmann, Dieter<br/>Author&#160;Gollmann, Dieter<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G65 2006<br/>Edition&#160;2nd ed.<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780470862933<br/> Computer security ent://SD_ILS/0/SD_ILS:98153 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Gollmann, Dieter<br/>Author&#160;Gollmann, Dieter<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G65 1999<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;1999<br/>ISBN&#160;9780471978442<br/> Computer security ent://SD_ILS/0/SD_ILS:239408 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Roberts, D. W.<br/>Author&#160;Roberts, D. W.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R62 1990<br/>Publisher&#160;Blenheim Online Publications,<br/>Publication Date&#160;1990<br/>ISBN&#160;9780863531804<br/> Computer security ent://SD_ILS/0/SD_ILS:182467 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Carrol, John M.<br/>Author&#160;Carrol, John M.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.C27 1987<br/>Edition&#160;2nd ed<br/>Publisher&#160;Butterworth Pub.,<br/>Publication Date&#160;1987<br/>ISBN&#160;9780409900323<br/> Computer security ent://SD_ILS/0/SD_ILS:296008 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Hsiao, David K.<br/>Author&#160;Hsiao, David K.,&#160;Kerr, Douglas S.,&#160;Madnick, Stuart E.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H74 1979<br/>Publisher&#160;Academic,<br/>Publication Date&#160;1979<br/>ISBN&#160;9780123576507<br/> Computer security ent://SD_ILS/0/SD_ILS:246876 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Carroll, John Millar, 1950-<br/>Author&#160;Carroll, John Millar, 1950-<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2 C37 1977<br/>Publisher&#160;Security Wold Pub.,<br/>Publication Date&#160;1977<br/>ISBN&#160;9780913708286<br/> Computer security ent://SD_ILS/0/SD_ILS:439721 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Carroll, John M. (John Millar), 1950-<br/>Author&#160;Carroll, John M. (John Millar), 1950-<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2 C37 1996<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Butterworth-Heinemann,<br/>Publication Date&#160;1996<br/>ISBN&#160;9780750696005<br/> Computer security ent://SD_ILS/0/SD_ILS:403215 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C67 1986 f<br/>Publisher&#160;Time life Books,<br/>Publication Date&#160;1986<br/>ISBN&#160;9780809456703<br/> Computer Security Fundamentals ent://SD_ILS/0/SD_ILS:886135 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Easttom, Chuck, author<br/>Author&#160;Easttom, Chuck, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 E27 2020<br/>Edition&#160;Fourth Edition<br/>Publication Date&#160;2020<br/>ISBN&#160;9780135774779<br/> Corporate computer security. ent://SD_ILS/0/SD_ILS:806503 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Boyle, Randall J.<br/>Author&#160;Boyle, Randall J.,&#160;Panko, Raymond R.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9 .A25 P36 2012<br/>Edition&#160;3rd ed. / Randall J. Boyle, Raymond R. Panko.<br/>Publisher&#160;Pearson,<br/>Publication Date&#160;2013&#160;2012<br/>ISBN&#160;9780132145350<br/> Computer security fundamentals ent://SD_ILS/0/SD_ILS:430484 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Easttom, Chuck<br/>Author&#160;Easttom, Chuck<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 E27 2006<br/>Publisher&#160;Pearson Prentice Hall,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780131711297<br/> Computer security handbook ent://SD_ILS/0/SD_ILS:481604 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Baker, Richard H.<br/>Author&#160;Baker, Richard H.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B35 1991<br/>Edition&#160;2nd ed.<br/>Publisher&#160;TAB Professional and Reference Books,<br/>Publication Date&#160;1991<br/>ISBN&#160;9780830675920<br/> Computer Network Security ent://SD_ILS/0/SD_ILS:887361 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Sadiqui, Ali, author<br/>Author&#160;Sadiqui, Ali, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S335 2020<br/>ISBN&#160;9781786305275<br/> Computer security handbook ent://SD_ILS/0/SD_ILS:624102 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Bosworth, Seymour<br/>Author&#160;Bosworth, Seymour,&#160;Kabay, Michel E.,&#160;Whyne, Eric, 1981-<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 C65 2009 issue.1<br/>Edition&#160;5th ed.<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780471716525&#160;9780470327227&#160;9780470327234<br/> Computer security handbook ent://SD_ILS/0/SD_ILS:384593 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Bosworth, Seymour<br/>Author&#160;Bosworth, Seymour,&#160;Kabay, Michel E.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 C65 2002<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780471412588<br/> Computer security handbook ent://SD_ILS/0/SD_ILS:423216 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Hutt, Arthur E.<br/>Author&#160;Hutt, Arthur E.,&#160;Bosworth, Seymour,&#160;Hoyt, Douglass B.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 C65 1995<br/>Edition&#160;3rd ed<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;1995<br/>ISBN&#160;9780471019077<br/> Computer-security technology ent://SD_ILS/0/SD_ILS:466561 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Cooper, James Arlin<br/>Author&#160;Cooper, James Arlin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C66 1984<br/>Publisher&#160;Lexington Books,<br/>Publication Date&#160;1984<br/>ISBN&#160;9780669064360<br/> Computer data security ent://SD_ILS/0/SD_ILS:476222 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Katzan, Harry<br/>Author&#160;Katzan, Harry<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2K33 1973<br/>Publisher&#160;Van Nost. Reinhold,<br/>Publication Date&#160;1973<br/>ISBN&#160;9780442242589<br/> Computer security management ent://SD_ILS/0/SD_ILS:209132 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Van Tassel, Dennie<br/>Author&#160;Van Tassel, Dennie<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2 .V33 1972<br/>Publisher&#160;Prntice-Hall,<br/>Publication Date&#160;1972<br/>ISBN&#160;9780131664647<br/> Computer security : proceedings ent://SD_ILS/0/SD_ILS:334585 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;IFIP TC11 International Conference on Information Security (9th : 1993 : Toronto, Ont.)<br/>Author&#160;IFIP TC11 International Conference on Information Security (9th : 1993 : Toronto, Ont.),&#160;Dougall, E. Graham<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I45 1993<br/>Publisher&#160;North-Holland,<br/>Publication Date&#160;1993<br/>ISBN&#160;9780444817488<br/> Computer Security Digest ent://SD_ILS/0/SD_ILS:567544 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z Format:&#160;Computer file<br/>Call Number&#160;http://proquest.umi.com/pqdweb<br/><a href="http://proquest.umi.com/pqdweb?RQT=318&TS=1089613007&clientId=21690&VType=PQD&VName=PQD&VInst=PROD&pmid=000034941&PageNum=1">Online access via ProQuest Computing</a><br/>Open access to UTM community only<br/> Journal of computer security ent://SD_ILS/0/SD_ILS:640207 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Jajodia, Sushil<br/>Author&#160;Jajodia, Sushil,&#160;Millen, Jonathan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 J684 2010<br/>Publisher&#160;IOS Pr.,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781607500889<br/> Introduction to computer security ent://SD_ILS/0/SD_ILS:170925 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Anderson, Hugh<br/>Author&#160;Anderson, Hugh<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A526 2005<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Pearson/Prentice Hall,<br/>Publication Date&#160;2005<br/>ISBN&#160;9789810675776<br/> Security for computer systems ent://SD_ILS/0/SD_ILS:236757 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Chadwick, B.<br/>Author&#160;Chadwick, B.,&#160;Wong, K. K.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.F37<br/>Publisher&#160;National Computing Centre,<br/>Publication Date&#160;1972<br/>ISBN&#160;9780850120776<br/> Introduction to computer security ent://SD_ILS/0/SD_ILS:807356 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Goodrich, Michael T.<br/>Author&#160;Goodrich, Michael T.,&#160;Tamassia, Roberto, 1960-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G66 2011<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780321512949<br/> Computer security lab manual ent://SD_ILS/0/SD_ILS:433853 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Nestler, Vincent J.<br/>Author&#160;Nestler, Vincent J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C654 2006<br/>Publication Date&#160;2006<br/>ISBN&#160;9780072255089<br/> Computer security within organisations ent://SD_ILS/0/SD_ILS:125864 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Warman, Adrian R.<br/>Author&#160;Warman, Adrian R.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W37 1993<br/>Publisher&#160;Macmillan,<br/>Publication Date&#160;1993<br/>ISBN&#160;9780333577271<br/> Computer security and cryptography ent://SD_ILS/0/SD_ILS:195334 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Konheim, Alan G., 1934-<br/>Author&#160;Konheim, Alan G., 1934-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K664 2007<br/>Publisher&#160;Wiley-Interscience,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780471947837<br/> Introduction to computer security ent://SD_ILS/0/SD_ILS:415491 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Bishop, Matt (Matthew A.)<br/>Author&#160;Bishop, Matt (Matthew A.)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B563 2005<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780321247445<br/> Journal of computer security ent://SD_ILS/0/SD_ILS:155568 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 J68 2007<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2007<br/>ISSN&#160;0926227X<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&db=a3h&jid=LCY&site=ehost-live">Online via EBSCOhost</a><br/>Accessible within UTM campus<br/> Information assurance and computer security ent://SD_ILS/0/SD_ILS:174888 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;NATO Advanced Research Workshop on Information Assurance and Computer Security ( 2005 : Tetouan, Morocco)<br/>Author&#160;NATO Advanced Research Workshop on Information Assurance and Computer Security ( 2005 : Tetouan, Morocco),&#160;Thomas, Johnson P.,&#160;Essaaidi, Mohamed<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N37 2005<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781586036782<br/> Computer security and information integrity ent://SD_ILS/0/SD_ILS:250462 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;IFIP International Conference on Computer Security and Information Integrity in Our Changing World (6th : 1990 : Espoo, Finland)<br/>Author&#160;IFIP International Conference on Computer Security and Information Integrity in Our Changing World (6th : 1990 : Espoo, Finland),&#160;Dittrich, Klaus R.,&#160;Rautakivi, Seppo,&#160;Saari, Juhani<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I44 1991<br/>Publisher&#160;Elseview Science Pub.,<br/>Publication Date&#160;1991<br/>ISBN&#160;9780444888594<br/> Computer security : a global challenge ent://SD_ILS/0/SD_ILS:296085 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;IFIP International Conference on Computer Security, 2nd: 1984 : Toronto, Ontario, Canada)<br/>Author&#160;IFIP International Conference on Computer Security, 2nd: 1984 : Toronto, Ontario, Canada),&#160;Finch, James H.,&#160;Dougall, E. Graham<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I35 1984<br/>Publisher&#160;North Holland,<br/>Publication Date&#160;1984<br/>ISBN&#160;9780444876188<br/> Computer security : principles and practice ent://SD_ILS/0/SD_ILS:804149 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Stallings, William<br/>Author&#160;Stallings, William,&#160;Brown, Lawrie<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S73 2012<br/>Edition&#160;2nd ed. International ed.<br/>Publisher&#160;Pearson,<br/>Publication Date&#160;2012<br/>ISBN&#160;9780273764496<br/> Computer security and penetration testing ent://SD_ILS/0/SD_ILS:245646 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Basta, Alfred<br/>Author&#160;Basta, Alfred,&#160;Halton, Wolf<br/>Format:&#160;Books<br/>Call Number&#160;TK5101.59 B37 2008<br/>Publisher&#160;Thomson,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781418048266<br/> Security mechanisms for computer networks ent://SD_ILS/0/SD_ILS:191666 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Muftic, Sead<br/>Author&#160;Muftic, Sead<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S42 1989<br/>Publisher&#160;Ellis Horwood,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780745806136<br/> A Handbook of computer security ent://SD_ILS/0/SD_ILS:171598 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Hearnden, Keith<br/>Author&#160;Hearnden, Keith<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.H363 1987<br/>Publisher&#160;Kogan page,<br/>Publication Date&#160;1987<br/>ISBN&#160;9781850913481<br/> Advances in computer system security ent://SD_ILS/0/SD_ILS:172931 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Turn, Rein,. 1931-<br/>Author&#160;Turn, Rein,. 1931-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A38 1981-1988<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2020&#160;2019&#160;2018&#160;2017&#160;2016<br/>ISBN&#160;9780890061541&#160;9780890060964<br/> Computer security and penetration testing ent://SD_ILS/0/SD_ILS:835918 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Basta, Alfred, author<br/>Author&#160;Basta, Alfred, author,&#160;Basta, Nadine, author,&#160;Brown, Mary, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5101.59 B37 2014<br/>Edition&#160;Second edition<br/>Publisher&#160;Course Technology, Cengage Learning,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780840020932<br/> Computer and information security handbook ent://SD_ILS/0/SD_ILS:828457 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Vacca, John R., editor<br/>Author&#160;Vacca, John R., editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C665 2013 f<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Morgan Kaufmann, an imprint of Elsevier,<br/>Publication Date&#160;2013<br/>ISBN&#160;9780123943972<br/> Security basics for computer architects ent://SD_ILS/0/SD_ILS:835912 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Lee, Ruby B., author<br/>Author&#160;Lee, Ruby B., author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A73 L444 2013<br/>Publisher&#160;Morgan &amp; Claypool Publishers,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781627051552<br/> Computer security : protecting digital resources ent://SD_ILS/0/SD_ILS:374669 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Newman, Robert C.<br/>Author&#160;Newman, Robert C.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 N48 2010<br/>Publisher&#160;Jones &amp; Bartlett Publishers,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780763759940<br/> Collaborative computer security and trust management ent://SD_ILS/0/SD_ILS:631994 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Seigneur, Jean-Marc<br/>Author&#160;Seigneur, Jean-Marc,&#160;Slagell, Adam, 1977-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C656 2010 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781605664149&#160;9781605664156<br/> Advanced computer network and security ent://SD_ILS/0/SD_ILS:342700 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Mohd. Aizaini Maarof<br/>Author&#160;Mohd. Aizaini Maarof,&#160;Muhammad Shafie Abd. Latiff,&#160;Subariah Ibrahim,&#160;Shukor Abd. Razak,&#160;Ali Selamat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5 A39 2008 a<br/>Publisher&#160;Penerbit Universiti Teknologi Malaysia,<br/>Publication Date&#160;2008<br/>ISBN&#160;9789835206139<br/> Simple computer security : disinfect your PC ent://SD_ILS/0/SD_ILS:170952 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Geier, Eric, 1984-<br/>Author&#160;Geier, Eric, 1984-,&#160;Geier, James T.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G44 2007<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780470068540<br/> Enhancing computer security with smart technology ent://SD_ILS/0/SD_ILS:480576 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Vemuri, V. Rao<br/>Author&#160;Vemuri, V. Rao<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 E53 2005<br/>Publisher&#160;Auerbach Pablications,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780849330452<br/> Statistical methods in computer security ent://SD_ILS/0/SD_ILS:424052 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Chen, William W. S.<br/>Author&#160;Chen, William W. S.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S74 2005<br/>Publisher&#160;Marcel Dekker,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780824759391<br/> Corporate computer and network security ent://SD_ILS/0/SD_ILS:386771 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Panko, Raymond R.<br/>Author&#160;Panko, Raymond R.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P36 2004<br/>Publisher&#160;Pearson/Prentice Hall,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780130384713<br/> Computer system and network security ent://SD_ILS/0/SD_ILS:366284 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;White, Gregory B.<br/>Author&#160;White, Gregory B.,&#160;Fisch, Eric A.,&#160;Pooch, Udo W., 1944-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W44 1996<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;1996<br/>ISBN&#160;9780849371790<br/> Fundamentals of computer security technology ent://SD_ILS/0/SD_ILS:388519 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Amoroso, Edward G.<br/>Author&#160;Amoroso, Edward G.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A46 1994<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;1994<br/>ISBN&#160;9780133055412<br/> Computer audit, control and security ent://SD_ILS/0/SD_ILS:129688 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Moeller, Robert R.<br/>Author&#160;Moeller, Robert R.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A93 M63 1989<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780471853107<br/> Computer audit, control and security ent://SD_ILS/0/SD_ILS:129794 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Moeller, Robert R.<br/>Author&#160;Moeller, Robert R.<br/>Format:&#160;Books<br/>Call Number&#160;DSK 376<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;1989<br/> Cryptography : an introduction to computer security ent://SD_ILS/0/SD_ILS:442385 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Seberry, Jennifer<br/>Author&#160;Seberry, Jennifer,&#160;Pieprzyk, Josef<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S37 1989<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780724802746&#160;9780131949867<br/> Tutorial : computer and network security ent://SD_ILS/0/SD_ILS:171144 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Abrams, Marshall D.<br/>Author&#160;Abrams, Marshall D.,&#160;Podell, Harold J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A27 1987 f<br/>Publisher&#160;IEEE Computer Society,<br/>Publication Date&#160;1987<br/>ISBN&#160;9780818607561<br/> Guidelines for physical computer security ent://SD_ILS/0/SD_ILS:163944 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Wood, Michael B.<br/>Author&#160;Wood, Michael B.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2 .W663 1986<br/>Publisher&#160;NCC Pub.,<br/>Publication Date&#160;1986<br/>ISBN&#160;9780850125818<br/> Security of computer based information systems ent://SD_ILS/0/SD_ILS:181003 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Lane, V. P.<br/>Author&#160;Lane, V. P.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.L35 1985<br/>Publisher&#160;Macmillan Education,<br/>Publication Date&#160;1985<br/>ISBN&#160;9780333364369<br/> Security of computer based information systems ent://SD_ILS/0/SD_ILS:95120 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Lane, V. P.<br/>Author&#160;Lane, V. P.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.L35 1985<br/>Publisher&#160;MacMillan Education,<br/>Publication Date&#160;1985<br/> Management handbook of computer security ent://SD_ILS/0/SD_ILS:352592 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Waring, Leslie Philip<br/>Author&#160;Waring, Leslie Philip<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.W36 1978<br/>Publisher&#160;N C C,<br/>Publication Date&#160;1978<br/>ISBN&#160;9780850121858<br/> Computer security and integrity : proceedings ent://SD_ILS/0/SD_ILS:356767 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Symposium on Trends and Applications (1977 : Maryland)<br/>Author&#160;Symposium on Trends and Applications (1977 : Maryland),&#160;Institute of Electrical and Electronics Engineers. Computer Society<br/>Format:&#160;Books<br/>Call Number&#160;TK7885.A1 S98 1977 f<br/>Publisher&#160;IEEE,<br/>Publication Date&#160;1977<br/> Data base and computer systems security ent://SD_ILS/0/SD_ILS:298540 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Carroll, John Millar, 1950-<br/>Author&#160;Carroll, John Millar, 1950-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9. D3 D37 1976 f<br/>Publisher&#160;Q.E.D. Information Sciences,<br/>Publication Date&#160;1976<br/>ISBN&#160;9780894350023<br/> Security procedures for computer systems ent://SD_ILS/0/SD_ILS:246655 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Hemphill, Charles F.<br/>Author&#160;Hemphill, Charles F.,&#160;Hemphill, John M.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.H44 1973<br/>Publisher&#160;Dow-Jones-Irwin,<br/>Publication Date&#160;1973<br/>ISBN&#160;9780870940583<br/> Computer security in an educational environment ent://SD_ILS/0/SD_ILS:273048 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Summers, Wayne C.<br/>Author&#160;Summers, Wayne C.,&#160;Institut Teknologi Malaysia. Pusat Pendidikan Persediaan<br/>Format:&#160;Books<br/>Call Number&#160;MAK 9456<br/> Computer Security : A Hands-on Approach ent://SD_ILS/0/SD_ILS:879606 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Du, Wenliang, author<br/>Author&#160;Du, Wenliang, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D89 2017<br/>ISBN&#160;9781548367947<br/> Computer security, auditing and controls ent://SD_ILS/0/SD_ILS:546857 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z Format:&#160;Continuing Resources<br/>Call Number&#160;TK7885.A1 C63 12-14no1-2(1985-87)<br/>Publisher&#160;Management Advisory,<br/>Publication Date&#160;2020&#160;2019&#160;2018&#160;2017&#160;2016<br/>ISSN&#160;07384262<br/> Emerald : information management and computer security ent://SD_ILS/0/SD_ILS:559019 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z Format:&#160;Continuing Resources<br/>Call Number&#160;CP 174 CD-ROM archive 1993-1995 j1<br/>Publisher&#160;MCB University Press,<br/>Publication Date&#160;1996<br/> Management handbook of computer security ent://SD_ILS/0/SD_ILS:378308 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z Format:&#160;Books<br/>Call Number&#160;HF5548.2 .W36 1978 f<br/> Systems security : the key to computer integrity ent://SD_ILS/0/SD_ILS:262299 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;European Computer Systems Security Forum (1984)<br/>Author&#160;European Computer Systems Security Forum (1984)<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.E97 1984<br/>Publisher&#160;Online,<br/>Publication Date&#160;1984<br/>ISBN&#160;9780863530180<br/> ISSUES IN COMPUTER SECURITY &amp; NETWORKING. PART 2 ent://SD_ILS/0/SD_ILS:864112 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Mazleena Salleh, editor<br/>Author&#160;Mazleena Salleh, editor,&#160;Hassan Chizari, 1975-, editor,&#160;Abdul Hanan Abdullah, contributor,&#160;Behnam Dezfouli, 1982-, contributor,&#160;Kamalrulnizam Abu Bakar, contributor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I877 2015 a<br/>Publication Date&#160;2015<br/>ISBN&#160;9789835209543<br/> Computer security in the age of information ent://SD_ILS/0/SD_ILS:266219 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;IFIP International Conference on Computer Security (5th : 1988 : Gold Coast, Queensland)<br/>Author&#160;IFIP International Conference on Computer Security (5th : 1988 : Gold Coast, Queensland),&#160;Caelli, William,&#160;International Federation for Information Processing<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I35 1988<br/>Publisher&#160;North-Holland,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780444883247<br/> Where next for computer security? : a report ent://SD_ILS/0/SD_ILS:244362 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;National Computing Centre Limited National Study of Group on the Security of Computer-based Systems<br/>Author&#160;National Computing Centre Limited National Study of Group on the Security of Computer-based Systems<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.N38 1974<br/>Publisher&#160;Manchester,<br/>Publication Date&#160;1974<br/>ISBN&#160;9780850121230<br/> Human factor computer security awareness conceptual framework ent://SD_ILS/0/SD_ILS:778265 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Nasrin Badie, 1982-<br/>Author&#160;Nasrin Badie, 1982-<br/>Format:&#160;Books<br/>Call Number&#160;CP 027518 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Human factor computer security awareness conceptual framework ent://SD_ILS/0/SD_ILS:778263 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Nasrin Badie, 1982-<br/>Author&#160;Nasrin Badie, 1982-,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A28 N37 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> High security remote control switching for computer ent://SD_ILS/0/SD_ILS:198384 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Khairul Anuar Mohamed Ayoob<br/>Author&#160;Khairul Anuar Mohamed Ayoob,&#160;Abd. Jaafar Shafie,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;TK7881.2 K43 2007 raf<br/>Publication Date&#160;2007<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2007<br/> Security of e-systems and computer networks ent://SD_ILS/0/SD_ILS:210766 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Obaidat, Mohammad S. (Mohammad Salameh), 1952-<br/>Author&#160;Obaidat, Mohammad S. (Mohammad Salameh), 1952-,&#160;Boudriga, Noureddine<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 O22 2007<br/>Publisher&#160;Cambridge University Press,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780521837644<br/> High security remote control switching for computer ent://SD_ILS/0/SD_ILS:576645 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Khairul Anuar Mohamed Ayoob<br/>Author&#160;Khairul Anuar Mohamed Ayoob,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;CP 018781 ra<br/>Publication Date&#160;2007<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2007<br/> Computer security assurance using the common criteria ent://SD_ILS/0/SD_ILS:451172 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Merkow, Mark S.<br/>Author&#160;Merkow, Mark S.,&#160;Breithaupt, Jim<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M47 2004<br/>Publisher&#160;Thomson Delmar Learning,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781401862657<br/> Principles of computer security security and beyond ent://SD_ILS/0/SD_ILS:611599 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Conklin, Wm. Arthur<br/>Author&#160;Conklin, Wm. Arthur<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 6460<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780072256444<br/> Principles of computer security : security and beyond ent://SD_ILS/0/SD_ILS:424119 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Conklin, Wm. Arthur<br/>Author&#160;Conklin, Wm. Arthur<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P74 2004<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780072255096<br/> Computer security basics =Konpy&#363;ta sekyuriti no kiso ent://SD_ILS/0/SD_ILS:825054 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Russell, Deborah<br/>Author&#160;Russell, Deborah,&#160;Gangemi, Sr. G. T.,&#160;Yamaguchi, Suguru<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R87 1994<br/>Publisher&#160;Asuki,<br/>Publication Date&#160;1994<br/>ISBN&#160;9784756102997<br/> Computer auditing, security and internal control manual ent://SD_ILS/0/SD_ILS:450650 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Kuong, Javier F.<br/>Author&#160;Kuong, Javier F.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K86 1987<br/>Publisher&#160;Prentice-Hall,<br/>Publication Date&#160;1987<br/>ISBN&#160;9780131629677<br/> Modern methods for computer security and privacy ent://SD_ILS/0/SD_ILS:463731 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Hoffman, Lance J.<br/>Author&#160;Hoffman, Lance J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H63 1977<br/>Publisher&#160;Prentice-Hall,<br/>Publication Date&#160;1977<br/>ISBN&#160;9780135952078<br/> Security, accuracy, and privacy in computer systems ent://SD_ILS/0/SD_ILS:246665 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Martin, James, 1933-<br/>Author&#160;Martin, James, 1933-<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2 .M34<br/>Publisher&#160;Prentice-Hall,<br/>Publication Date&#160;1973<br/>ISBN&#160;9780137989911<br/> Computer Security - ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007: Proceedings ent://SD_ILS/0/SD_ILS:626829 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;European Symposium on Research in Computer Security (12th : 2007 : Dresden, Germany)<br/>Author&#160;European Symposium on Research in Computer Security (12th : 2007 : Dresden, Germany),&#160;Biskup, Joachim,&#160;Lopez, Javier.,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 001353<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540748359<br/><a href="http://dx.doi.org/10.1007/978-3-540-74835-9">http://dx.doi.org/10.1007/978-3-540-74835-9</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007. Proceedings. ent://SD_ILS/0/SD_ILS:517498 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security $n(4th :$d2007 :$cSaint Petersburg, Russia)<br/>Author&#160;International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security $n(4th :$d2007 :$cSaint Petersburg, Russia),&#160;Gorodetsky, Vladimir,&#160;Kotenko, Igor,&#160;Skormin, Victor A.,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 001125<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540739869&#160;9783540739852<br/><a href="http://dx.doi.org/10.1007/978-3-540-73986-9">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Fourth Aerospace Computer Security Applications Conference : Orlando, Florida, December 12-16, 1988 ent://SD_ILS/0/SD_ILS:236627 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Aerospace Computer Security Applications Conference (4th : 1988 : Orlando, Fla.)<br/>Author&#160;Aerospace Computer Security Applications Conference (4th : 1988 : Orlando, Fla.)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A39 1988<br/>Publisher&#160;Computer Society Press,<br/>Publication Date&#160;1988<br/>ISBN&#160;9780818608957<br/> Computer security : the practical issues in a troubled world ent://SD_ILS/0/SD_ILS:180114 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;IFIP International Coonference on Computer Security (3rd : 1985 : Dublin, Ireland)<br/>Author&#160;IFIP International Coonference on Computer Security (3rd : 1985 : Dublin, Ireland),&#160;Grimson, Jane B.,&#160;Kugler, Hans Jurgen<br/>Format:&#160;Books<br/>Call Number&#160;QA76.5 I585 1985<br/>Publisher&#160;Elsevier Sc Pub,<br/>Publication Date&#160;1985<br/> Computer and Cyber Security : Principles, Algorithm, Applications, and Perspectives ent://SD_ILS/0/SD_ILS:882324 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Gupta, Brij, Dr., 1982-, editor<br/>Author&#160;Gupta, Brij, Dr., 1982-, editor,&#160;Agrawal, Dharma P., Dr., editor,&#160;Wang, Haoxiang, Dr., editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C668 2019<br/>Publication Date&#160;2019<br/>ISBN&#160;9780815371335<br/> Machine Learning for Computer and Cyber Security : Principles, Algorithms, and Practices ent://SD_ILS/0/SD_ILS:882268 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Gupta, Brij, 1982-, editor<br/>Author&#160;Gupta, Brij, 1982-, editor,&#160;Sheng, Quan Z., editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5 M335 2019<br/>Publication Date&#160;2019<br/>ISBN&#160;9781138587304<br/> Introduction to computer and network security : navigating shades of gray ent://SD_ILS/0/SD_ILS:805289 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Brooks, Richard R.<br/>Author&#160;Brooks, Richard R.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B76 2014<br/>Publisher&#160;Chapman and Hall/CRC,<br/>Publication Date&#160;2014&#160;2013<br/>ISBN&#160;9781439860717<br/> Computer security literacy : staying safe in a digital world ent://SD_ILS/0/SD_ILS:837215 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Jacobson, Douglas, author<br/>Author&#160;Jacobson, Douglas, author,&#160;Idziorek, Joseph, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 J334 2013<br/>Publisher&#160;CRC Press / Taylor &amp; Francis Group,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781439856185<br/> Encyclopaedia of cyber law and computer security : measures , controls &amp; practices ent://SD_ILS/0/SD_ILS:814048 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Moore, Paul., editor<br/>Author&#160;Moore, Paul., editor<br/>Format:&#160;Books<br/>Call Number&#160;TK7885.A2 E53 2012 re v.1<br/>Publisher&#160;Nyx Academics,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781621580003<br/> Issues in computer security and networking : part 1 ent://SD_ILS/0/SD_ILS:811380 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Muhalim Mohamed Amin author<br/>Author&#160;Muhalim Mohamed Amin author,&#160;Subariah Ibrahim author,&#160;Hazinah Kutty Mammi author,&#160;Ku, Peter Soo Lin author,&#160;Nurul Badriah Abu Bakar author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I87 2012 a<br/>Edition&#160;First edition<br/>Publisher&#160;Penerbit Universiti Teknologi Malaysia,<br/>Publication Date&#160;2012<br/>ISBN&#160;9789835209055<br/> Analyzing computer security : a threat/vulnerability/countermeasure approach ent://SD_ILS/0/SD_ILS:780002 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Pfleeger, Charles P., 1948-<br/>Author&#160;Pfleeger, Charles P., 1948-,&#160;Pfleeger, Shari Lawrence<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P45 2012<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2012<br/>ISBN&#160;9780132789462<br/> Evaluation of user's behaviours handling computer security incident in financial institution in Klang Valley ent://SD_ILS/0/SD_ILS:840290 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Nor Hidayah Mohd Jawawi<br/>Author&#160;Nor Hidayah Mohd Jawawi<br/>Format:&#160;Books<br/>Call Number&#160;CP 033975 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Evaluation of user's behaviours handling computer security incident in financial institution in Klang Valley ent://SD_ILS/0/SD_ILS:840289 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Nor Hidayah Mohd Jawawi<br/>Author&#160;Nor Hidayah Mohd Jawawi,&#160;Zuraini binti Ismail, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N678 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Securing the cloud : cloud computer security techniques and tactics ent://SD_ILS/0/SD_ILS:748817 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Winkler, J. R. (Joachim R.)<br/>Author&#160;Winkler, J. R. (Joachim R.)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.585 W56 2011<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597495929<br/> The Stuxnet Computer Worm and industrial control system security ent://SD_ILS/0/SD_ILS:798946 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Rebane, Jackson C.<br/>Author&#160;Rebane, Jackson C.<br/>Format:&#160;Books<br/>Call Number&#160;TS156.8 S78 2011<br/>Publisher&#160;Nova Science Publisher&rsquo;s, Inc.,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781612099859<br/> Analysis issues of computer network security management for disposable dishes companies in Iran ent://SD_ILS/0/SD_ILS:837885 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Fatemeh Honarjoo<br/>Author&#160;Fatemeh Honarjoo<br/>Format:&#160;Books<br/>Call Number&#160;CP 034161 ra<br/>Publication Date&#160;2011<br/>Thesis (Sarjana Sains (Pengurusan Teknologi Maklumat)) - Universiti Teknologi Malaysia, 2011<br/> Analysis issues of computer network security management for disposable dishes companies in Iran ent://SD_ILS/0/SD_ILS:837884 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Fatemeh Honarjoo<br/>Author&#160;Fatemeh Honarjoo,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F38 2011 raf<br/>Publication Date&#160;2011<br/>Thesis (Sarjana Sains (Pengurusan Teknologi Maklumat)) - Universiti Teknologi Malaysia, 2011<br/> Principles of computer security : CompTIA security+ and beyond ent://SD_ILS/0/SD_ILS:643445 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Conklin, Wm. Arthur (William Arthur)<br/>Author&#160;Conklin, Wm. Arthur (William Arthur)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.3 P75 2010 f<br/>Edition&#160;2nd ed.<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780071633758<br/> Principles of computer security CompTIA security+ and beyond ent://SD_ILS/0/SD_ILS:795775 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Conklin, Wm. Arthur (William Arthur)<br/>Author&#160;Conklin, Wm. Arthur (William Arthur)<br/>Format:&#160;Books<br/>Call Number&#160;CP 028414<br/>Edition&#160;2nd ed.<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780071633789<br/> Principles of computer security: CompTIA security+ and beyond ent://SD_ILS/0/SD_ILS:835961 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Conklin, Wm. Arthur (William Arthur)<br/>Author&#160;Conklin, Wm. Arthur (William Arthur)<br/>Format:&#160;Books<br/>Call Number&#160;CP 033498<br/>Edition&#160;2nd ed.<br/>Publisher&#160;McGraw-Hill Osborne Media,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780071633758<br/> Enhancing information security awareness and computer ethics for non-information technology company using integrated model ent://SD_ILS/0/SD_ILS:396627 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Mohd. Eyzuan Zainudin, 1975-<br/>Author&#160;Mohd. Eyzuan Zainudin, 1975-,&#160;Zuraini Ismail, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M494 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> Development of computer ethical framework for information security (education context) ent://SD_ILS/0/SD_ILS:590588 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Meysam Namayandeh, 1981-<br/>Author&#160;Meysam Namayandeh, 1981-,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 019836 ra<br/>Publication Date&#160;2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/> Comprehensive analysis on the influences of computer ethics on information security ent://SD_ILS/0/SD_ILS:590591 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Fiza Abdul Rahim, 1983-<br/>Author&#160;Fiza Abdul Rahim, 1983-,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 017321 ra<br/>Publication Date&#160;2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/> Comprehensive analysis on the influences of computer ethics on information security ent://SD_ILS/0/SD_ILS:322563 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Fiza Abdul Rahim, 1983-<br/>Author&#160;Fiza Abdul Rahim, 1983-,&#160;Zuraini Ismail, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 F59 2009 raf<br/>Publication Date&#160;2009<br/><a href="http://eprints.utm.my/5324">Full text thesis via UTM-IR</a><br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/> Development of computer ethical framework for information security (educational context) ent://SD_ILS/0/SD_ILS:322554 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Meysam Namayandeh, 1981-<br/>Author&#160;Meysam Namayandeh, 1981-,&#160;Maslin Masrom, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;HD30.2 M494 2009 raf<br/>Publication Date&#160;2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/> Visualization for computer security : 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008, Proceedings ent://SD_ILS/0/SD_ILS:292944 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;VizSec 2008 2008 : Cambridge, Mass.)<br/>Author&#160;VizSec 2008 2008 : Cambridge, Mass.),&#160;Goodall, John R.,&#160;Conti, Greg,&#160;Ma, Kwan-liu<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 V59 2008<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2008<br/>ISBN&#160;9783540859314<br/> Hardware-based computer security : from biometrics to quantum cryptography ent://SD_ILS/0/SD_ILS:290071 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Dube, Roger R.<br/>Author&#160;Dube, Roger R.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D82 2008<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470193396<br/> Computer Safety, Reliability, and Security 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007: Proceedings ent://SD_ILS/0/SD_ILS:628201 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;SAFECOMP 2007 (2007 : Nuremberg, Germany)<br/>Author&#160;SAFECOMP 2007 (2007 : Nuremberg, Germany),&#160;Saglietti, Francesca,&#160;Oster, Norbert,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 001370<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540751014<br/><a href="http://dx.doi.org/10.1007/978-3-540-75101-4">http://dx.doi.org/10.1007/978-3-540-75101-4</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007: Proceedings ent://SD_ILS/0/SD_ILS:516712 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;International Workshop on Security (2nd : 2007 : Nara-shi, Japan)<br/>Author&#160;International Workshop on Security (2nd : 2007 : Nara-shi, Japan),&#160;Miyaji, Atsuko,&#160;Kikuchi, Hiroaki,&#160;Rannenberg, Kai,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000582<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540756514<br/><a href="http://dx.doi.org/10.1007/978-3-540-75651-4">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Computer system security : basic concepts and solved exercises ent://SD_ILS/0/SD_ILS:328372 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Avoine, Gildas<br/>Author&#160;Avoine, Gildas,&#160;Junod, Pascal,&#160;Oechslin, Philippe<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A96 2004<br/>Publisher&#160;EFPL Press,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781420046205<br/> Advances in computer science--ASIAN 2007 computer and network security : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517549 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Asian Computing Science Conference (12th : 2007 : Daw?{rcub}hah, Qatar)<br/>Author&#160;Asian Computing Science Conference (12th : 2007 : Daw?{rcub}hah, Qatar),&#160;Cervesato, Iliano,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000522<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540769293&#160;9783540769279<br/><a href="http://dx.doi.org/10.1007/978-3-540-76929-3">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Biometrics, computer security systems and artificial intelligence applications ent://SD_ILS/0/SD_ILS:191280 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Saeed, Khalid<br/>Author&#160;Saeed, Khalid,&#160;Pejas, Jerzy, 1954-,&#160;Mosdorf, Romuald<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B56 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387362328<br/> Minoli-Cordovana's authoritative computer &amp; network security dictionary ent://SD_ILS/0/SD_ILS:137902 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Minoli, Daniel, 1952-<br/>Author&#160;Minoli, Daniel, 1952-,&#160;Cordovana, James, 1973-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M565 2006<br/>Publisher&#160;Wiley-Interscience,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780471782636<br/> Advances in information and computer security : first International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006 : proceedings ent://SD_ILS/0/SD_ILS:142220 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;International Workshop on Security (1st : 2006 : Kyoto, Japan)<br/>Author&#160;International Workshop on Security (1st : 2006 : Kyoto, Japan),&#160;Yoshiura, Hiroshi<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I575 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9783540476993<br/> Network control and engineering for QoS, security and mobility, V : IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20-25, 2006, Santiago, Chile ent://SD_ILS/0/SD_ILS:116386 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;IFIP International Conference on Network Control and Engineering for QoS, Security, and Mobility (5th : 2006 : Santiago, Chile)<br/>Author&#160;IFIP International Conference on Network Control and Engineering for QoS, Security, and Mobility (5th : 2006 : Santiago, Chile),&#160;Gaiti, Dominique,&#160;IFIP World Computer Congress (19th : 2006 : Santiago, Chile)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5 I34 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387348254<br/> Designing security framework for computer science Faculty of Al - Qassim University ent://SD_ILS/0/SD_ILS:131676 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Habeeb Saleh Alhabeeb<br/>Author&#160;Habeeb Saleh Alhabeeb<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H32 2006<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2006<br/> Designing security framework for computer science Faculty of Al - Qassim University ent://SD_ILS/0/SD_ILS:783874 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Author&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;XX(783874.1)<br/>Publication Date&#160;2006<br/>Thesis (Sarjana) - Universiti Teknologi Malaysia, 2006<br/> Machine learning and data mining for computer security : methods and applications ent://SD_ILS/0/SD_ILS:470519 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Maloof , Marcus A.<br/>Author&#160;Maloof , Marcus A.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M34 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781846280290<br/> Defeating the hacker : a non-technical guide to computer security ent://SD_ILS/0/SD_ILS:286783 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Schifreen, Robert<br/>Author&#160;Schifreen, Robert<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S335 2006<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780470025550<br/> Risk management for computer security : Protecting your network and information assets ent://SD_ILS/0/SD_ILS:104570 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Jones, Andy, 1952-<br/>Author&#160;Jones, Andy, 1952-,&#160;Ashenden, Debi<br/>Format:&#160;Books<br/>Call Number&#160;T55 J66 2005<br/>Publisher&#160;Elsevier Butterworth-Heinemann,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780750677950<br/> Real digital forensics : computer security and incident response ent://SD_ILS/0/SD_ILS:470450 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Jones, Keith J. (Keith John)<br/>Author&#160;Jones, Keith J. (Keith John),&#160;Bejtlich, Richard,&#160;Rose, Curtis W.<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 J66 2005<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780321240699<br/> Computer security : 20 things every employee should know ent://SD_ILS/0/SD_ILS:467117 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Rothke, Ben<br/>Author&#160;Rothke, Ben<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 R67 2005<br/>Edition&#160;2nd ed.<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780072262827<br/> Computer security : 20 things every employee should know ent://SD_ILS/0/SD_ILS:363297 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Rothke, Ben<br/>Author&#160;Rothke, Ben<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 R67 2004<br/>Publisher&#160;McGraw-Hill Osborne,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780072230833<br/> Certification and security in e-services : from e-government to e-business : IFIP 17th World Computer Congress, TC11 stream on security in e-services, August 26-29, 2002, Montr&#65533;eal, Qu&#65533;ebec, Canada ent://SD_ILS/0/SD_ILS:348679 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;IFIP World Computer Congress (17th : 2002 : Montreal, Quebec)<br/>Author&#160;IFIP World Computer Congress (17th : 2002 : Montreal, Quebec),&#160;Nardelli, Enrico,&#160;Posadziejewski, Sabina,&#160;Talamo, Maurizio<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I36 2003<br/>Publisher&#160;Kluwer Academic Pubs,<br/>Publication Date&#160;2003<br/>ISBN&#160;9781402074936<br/> Integrating security services into computer supported cooperative work ent://SD_ILS/0/SD_ILS:121726 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Mohd. Aizaini Maarof<br/>Author&#160;Mohd. Aizaini Maarof<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M34 2000 raf<br/>Publisher&#160;Aston University,<br/>Publication Date&#160;2000<br/>Thesis (Doctor of Philosophy) - Aston University, 2000<br/> Mengkaji perlakuan peralatan voltan tinggi bagi sistem bekalan elektrik di Kampus UTM, Skudai, Johor; Prosedur dalaman penentukuran penjana voltan tinggi arus terus dan arus ulangalik institut voltan dan arus tinggi Fakulti Kejuruteraan Elektrik; Security analysis using power software (etc. ERACS and CYMES); Kesan voltan pusuan pensuisan terhadap peralatan perlindungan sistem kuasa; Computer aided design for the measurement of impulse generator parameters ent://SD_ILS/0/SD_ILS:7607 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Ahmad Fuad Md. Kasim<br/>Author&#160;Ahmad Fuad Md. Kasim,&#160;Azlan Mohd. Anwar,&#160;Mohd. Radhi Hamzah,&#160;Mohd. Rizal Ramlan,&#160;Rudzaba Mohd Jidin<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 8899 ra<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1996<br/>Kertas Projek (Sarjana Muda Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 1996<br/> Commonsense computer security : your practical guide to information protection ent://SD_ILS/0/SD_ILS:351183 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Smith, Martin<br/>Author&#160;Smith, Martin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S64 1993<br/>Edition&#160;2nd ed<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;1993<br/>ISBN&#160;9780077078058<br/> Internode router for hypercube parallel computer; Multiarchitecture back-end distribution processing task scheduling development; An investigationof an object-oriented design implementation of a speech recognition system based on N-tuple algorithm; Static stimulus testing; Smart employee identification card; Basic micropeocessor learning system; Micro controller based data logger; Security access system using smart card ent://SD_ILS/0/SD_ILS:333983 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Chen, Yen Kuang<br/>Author&#160;Chen, Yen Kuang,&#160;Hussaini Nordin Ali,&#160;Mas'od Mustafa,&#160;Norhilal Hashim,&#160;Ong, Weng Hang<br/>Format:&#160;Books<br/>Call Number&#160;MFL 7920 ra<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1993<br/>Project paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1993<br/> Security for computer networks : an introduction to data security in teleprocessing and electronic funds transfer ent://SD_ILS/0/SD_ILS:114989 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Davies, D. W.<br/>Author&#160;Davies, D. W.,&#160;Price, W. L.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105 D35 1989<br/>Edition&#160;2nd ed.<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780471921370<br/> Computer and communications security : strategies for the 1990s ent://SD_ILS/0/SD_ILS:454627 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Cooper, James Arlin<br/>Author&#160;Cooper, James Arlin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C67 1989<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780070129269<br/> Auditing computer security : a manual with case studies ent://SD_ILS/0/SD_ILS:104861 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Vallabhaneni, S. Rao<br/>Author&#160;Vallabhaneni, S. Rao<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 V35 1989 f<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780471626046<br/> Data &amp; computer security : dictionary of standards, concepts and terms ent://SD_ILS/0/SD_ILS:190947 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Longley, Dennis<br/>Author&#160;Longley, Dennis,&#160;Shain, Michael<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L67 1987 rd<br/>Publisher&#160;Stockton Pr,<br/>Publication Date&#160;1987<br/>ISBN&#160;9780333429358<br/> Foiling the systems breakers : computer security and access control ent://SD_ILS/0/SD_ILS:460388 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Lobel, Jerome<br/>Author&#160;Lobel, Jerome<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L62 1986<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;1986<br/>ISBN&#160;9780070383579<br/> Power supply filters and regulators; Computer assisted prediction of transient response; Load flow for distribution planning; Security sistem kuasa; Algebraic coding of signals; Kaji selidik mengenai gayalaku pecahtebat elektrik dalam hampagas; Model sistem untuk kawalan komputer ent://SD_ILS/0/SD_ILS:164603 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Muthelilan Murasu Nedumaran<br/>Author&#160;Muthelilan Murasu Nedumaran,&#160;Alias Hasan,&#160;Nik Azhari Nik Abdul Rahman,&#160;Azuhar Ismail,&#160;Mohamad Basiron Mohd. Othman<br/>Format:&#160;Books<br/>Call Number&#160;MFL 4654-4660 ra<br/>Publication Date&#160;1984<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1985<br/> Security for computer networks : an introduction to data security in teleprocessing and electronic funds transfer ent://SD_ILS/0/SD_ILS:138011 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Davies, D. W.<br/>Author&#160;Davies, D. W.,&#160;Price, W. L.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105 D35 1984<br/>Publisher&#160;John Wiley,<br/>Publication Date&#160;1984<br/>ISBN&#160;9780471900634<br/> Computer security management : a framework for effective management involvement ent://SD_ILS/0/SD_ILS:462893 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Solms, R. Von<br/>Author&#160;Solms, R. Von,&#160;Eloff, J. H. P.,&#160;Solms, S. H. Von<br/>Format:&#160;Books<br/>Call Number&#160;MAK 10032<br/> Computer security : computer crime is a threat to be recognized by everyone ent://SD_ILS/0/SD_ILS:390593 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Mohd. Daud Kasmuni<br/>Author&#160;Mohd. Daud Kasmuni,&#160;Seminar on EDP Audit and Controls a Better Realization of EDP Audit and Controls in Malaysia (1992 : Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;MAK 11739 a<br/> Cryptography : a new dimension in computer data security : a guide for the design and implementation of secure systems ent://SD_ILS/0/SD_ILS:342098 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Meyer, Carl H.<br/>Author&#160;Meyer, Carl H.,&#160;Matyas, Stephen M.<br/>Format:&#160;Books<br/>Call Number&#160;Z103.M49 1982<br/>ISBN&#160;9780471048923<br/> Security, Privacy and Reliability in Computer Communications and Networks ent://SD_ILS/0/SD_ILS:866967 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Sha, Kewei<br/>Author&#160;Sha, Kewei,&#160;Striegel, Aaron,&#160;Song, Min<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S43 2017<br/>ISBN&#160;9788793379893<br/> Security and the 1984 data protection : guidance for computer users ent://SD_ILS/0/SD_ILS:165414 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z Format:&#160;Books<br/>Call Number&#160;KD1957.C65 S42 1987<br/>Publisher&#160;National Computing Centre,<br/>Publication Date&#160;1987<br/>ISBN&#160;9780850126952<br/> European Computer Systems Security: the key to computer integrity ent://SD_ILS/0/SD_ILS:229518 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z Format:&#160;Books<br/>Call Number&#160;HF5548.2 .E97 1984 f<br/>Publisher&#160;Online,<br/>Publication Date&#160;1984<br/>ISBN&#160;9780863530180<br/> Commonsense computer security : your practical guide to preventing accidental and deliberate electronic data loss ent://SD_ILS/0/SD_ILS:461454 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S44 1989<br/> Privacy protection and computer forensics ent://SD_ILS/0/SD_ILS:420302 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Caloyannides, Michael A.<br/>Author&#160;Caloyannides, Michael A.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C345 2004<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2004<br/>ISBN&#160;9781580538305<br/> Implementing electronic card payment systems ent://SD_ILS/0/SD_ILS:340147 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Radu, Cristian<br/>Author&#160;Radu, Cristian<br/>Format:&#160;Books<br/>Call Number&#160;HG1710 R33 2003<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2003<br/>ISBN&#160;9781580533058<br/> Role-based access control ent://SD_ILS/0/SD_ILS:340153 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Ferraiolo, David F.<br/>Author&#160;Ferraiolo, David F.,&#160;Kuhn, D. Richard,&#160;Chandramouli, Ramaswamy<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F47 2003<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2003<br/>ISBN&#160;9781580533706<br/> Firewall design and analysis /cAlex X. Liu ent://SD_ILS/0/SD_ILS:764064 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Liu, Alex X.<br/>Author&#160;Liu, Alex X.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 L57 2011<br/>Publisher&#160;World Scientific,<br/>Publication Date&#160;2010<br/>ISBN&#160;9789814261654<br/> Trust and security in collaborative computing ent://SD_ILS/0/SD_ILS:232187 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Zou, Xukai, 1963-<br/>Author&#160;Zou, Xukai, 1963-,&#160;Dai, Yuan-Shun,&#160;Pan, Yi, 1960-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Z68 2008<br/>Publisher&#160;World Scientific,<br/>Publication Date&#160;2008<br/>ISBN&#160;9789812703682<br/> Securing information and communications systems : principles, technologies, and applications ent://SD_ILS/0/SD_ILS:263795 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Furnell, Steven M.<br/>Author&#160;Furnell, Steven M.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S4244 2008<br/>Publisher&#160;Artech House Publishers,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781596932289<br/> User's guide to cryptography and standards ent://SD_ILS/0/SD_ILS:418034 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Dent, Alexander W.<br/>Author&#160;Dent, Alexander W.,&#160;Mitchell, Chris J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D464 2005<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781580535304<br/> Defense and detection strategies against Internet worms ent://SD_ILS/0/SD_ILS:417839 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Nazario, Jose<br/>Author&#160;Nazario, Jose<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N394 2004<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2004<br/>ISBN&#160;9781580535373<br/> Implementing security for ATM networks ent://SD_ILS/0/SD_ILS:312453 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Tarman, Thomas D.<br/>Author&#160;Tarman, Thomas D.,&#160;Witzke, Edward L.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 T37 2002<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2002<br/>ISBN&#160;9781580532938<br/> Security in wireless LANs and MANs ent://SD_ILS/0/SD_ILS:470555 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Hardjono, Thomas<br/>Author&#160;Hardjono, Thomas,&#160;Dondeti, Lakshminath R.<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 H374 2005<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781580537551<br/> Contemporary cryptography ent://SD_ILS/0/SD_ILS:454299 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Oppliger, Rolf<br/>Author&#160;Oppliger, Rolf<br/>Format:&#160;Books<br/>Call Number&#160;Z103 O66 2005<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781580536424<br/> The German enigma cipher machine : beginnings, success, and ultimate failure ent://SD_ILS/0/SD_ILS:141225 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Winkel, Brian J.<br/>Author&#160;Winkel, Brian J.<br/>Format:&#160;Books<br/>Call Number&#160;D810.C88 G47 2005<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781580539968<br/> Bluetooth security ent://SD_ILS/0/SD_ILS:419276 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Gehrmann, Christian<br/>Author&#160;Gehrmann, Christian,&#160;Persson, Joakim,&#160;Smeets, Ben<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.3 G43 2004<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2004<br/>ISBN&#160;9781580535045<br/> Developing secure distributed systems with CORBA ent://SD_ILS/0/SD_ILS:317475 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Lang, Ulrich<br/>Author&#160;Lang, Ulrich,&#160;Schreiner, Rudolf<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A73 L36 2002<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2002<br/>ISBN&#160;9781580532952<br/> Java card for e-payment applications ent://SD_ILS/0/SD_ILS:317557 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Hassler, Vesna<br/>Author&#160;Hassler, Vesna<br/>Format:&#160;Books<br/>Call Number&#160;QA76.73.J38 J37 2002<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2002<br/>ISBN&#160;9781580532914<br/> Non-repudiation in electronic commerce ent://SD_ILS/0/SD_ILS:317073 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Zhou, Jianying<br/>Author&#160;Zhou, Jianying<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 Z49 2001<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2001<br/>ISBN&#160;9781580532471<br/> Electronic payment systems for e-commerce ent://SD_ILS/0/SD_ILS:317471 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;O'Mahony, Donal, 1961-<br/>Author&#160;O'Mahony, Donal, 1961-,&#160;Peirce, M. A. (Michael A.)<br/>Format:&#160;Books<br/>Call Number&#160;HG1710 O45 2001<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2001<br/>ISBN&#160;9781580532686<br/> Demystifying the IPsec puzzle ent://SD_ILS/0/SD_ILS:317477 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Frankel, Sheila<br/>Author&#160;Frankel, Sheila<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.567 F73 2001<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2001<br/>ISBN&#160;9781580530798<br/> Protecting intellectual property in space ent://SD_ILS/0/SD_ILS:333038 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Aerospace Computer Security Conference (1985 : McLean, Virginia)<br/>Author&#160;Aerospace Computer Security Conference (1985 : McLean, Virginia)<br/>Format:&#160;Books<br/>Call Number&#160;QA76 A37 1985<br/>Publisher&#160;IEEE Computer Society,<br/>Publication Date&#160;1985<br/>ISBN&#160;9780818606267<br/> Security and protection in information system ent://SD_ILS/0/SD_ILS:454623 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;IFIP TC 11 International Conference on Computer Security (4th : 1986 : Monte Carlo, Monaco)<br/>Author&#160;IFIP TC 11 International Conference on Computer Security (4th : 1986 : Monte Carlo, Monaco),&#160;Grissonnanche, Andre<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I34 1986<br/>Publisher&#160;North-Holland,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780444873453<br/> The need for security ent://SD_ILS/0/SD_ILS:104114 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;The Housley Computer Network Security Seminar (1987 : Melbourne)<br/>Author&#160;The Housley Computer Network Security Seminar (1987 : Melbourne),&#160;Davies, D. W.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H68 1987 f<br/> Swarm Based features selection for text summarization ent://SD_ILS/0/SD_ILS:781757 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Mohammed Salem Binwahtan, author<br/>Author&#160;Mohammed Salem Binwahtan, author,&#160;Naomei Salim, author,&#160;Ladda Suanmali, author,&#160;DCSNS International Journal of Computer Science and Network Security<br/>Format:&#160;Books<br/>Call Number&#160;XX(781757.1) 1<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2009<br/> Real-time crowd simulations for interactive virtual environments ent://SD_ILS/0/SD_ILS:251656 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Mohd. Shahrizal Sunar<br/>Author&#160;Mohd. Shahrizal Sunar,&#160;Mohamed 'Adi Mohamed Azahar,&#160;Daut Daman,&#160;Abdullah Bade,&#160;International Conference &amp; Industry Symposium on Computer Games : Animation, Multimedia, IPTV, Entertainment and Security (2008 : Singapore)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.C65 R424 2008<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2008<br/> Bounding volume Hierarchies for detecting collision in Urban simulation ent://SD_ILS/0/SD_ILS:251659 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Abdullah Bade, author<br/>Author&#160;Abdullah Bade, author,&#160;Hamzah Asyrani Sulaiman, 1985-, author,&#160;Daut Daman, author,&#160;Mohd. Shahrizal Sunar, author,&#160;International Conference Industry Symposium on Computer Games : Animation, Multimedia, IPTV, Edutainment &amp; Security (2008 : Singapore)<br/>Format:&#160;Books<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2008&#160;2007<br/> Quadtree spatial indexing use to make faster showing geographical map in mobile geographical information system technology using an oracle 10g application server and mapviewer application ent://SD_ILS/0/SD_ILS:359944 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Maruto Masserie Sardadi, 1982-, author<br/>Author&#160;Maruto Masserie Sardadi, 1982-, author,&#160;Mohd. Shafry Mohd. Rahim, author,&#160;Zahabidin Jupri, supervisor, author,&#160;Daut Daman, author,&#160;International Journal of Computer Science and Network Security (2008)i<br/>Format:&#160;Books<br/>Call Number&#160;MAK<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2008<br/> Evaluation of new collaboration method in virtual reality game based on human haptic emotion for artificial life simulation ent://SD_ILS/0/SD_ILS:363850 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Ahmad Hoirul Basori, author<br/>Author&#160;Ahmad Hoirul Basori, author,&#160;Daut Daman, author,&#160;Mohd. Shahrizal Sunar, author,&#160;Abdullah Bade, author,&#160;International Conference &amp; Industry Symposium on Computer Games, Animation, Multimedia, IPTV, Edutainment&amp; Security (2008: Singapore)<br/>Format:&#160;Books<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2008<br/> Geometric modelling in 3D computer graphics and visualisation ent://SD_ILS/0/SD_ILS:260527 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Rabiatul Adawiyah A. Rahman, author<br/>Author&#160;Rabiatul Adawiyah A. Rahman, author,&#160;Abdullah Bade, author,&#160;Daut Daman, author,&#160;Mohd. Shahrizal Sunar, author,&#160;International Conference &amp; Industry Symposium on Computer Games : Animation, Multimedia, IPTV, Entertainment and Security (2008 : Singapore)<br/>Format:&#160;Books<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2007<br/> Proceedings of a symposium on trends and applications ent://SD_ILS/0/SD_ILS:348912 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Symposium on Trends and Applications (1976-)<br/>Author&#160;Symposium on Trends and Applications (1976-),&#160;Institute of Electrical and Electronics Engineers. Computer Society<br/>Format:&#160;Books<br/>Call Number&#160;TK7885.A1 S98 1976 f<br/>Publisher&#160;IEEE,<br/>Publication Date&#160;2020&#160;2019&#160;2018&#160;2017&#160;2016<br/> Cybersecurity Analytics ent://SD_ILS/0/SD_ILS:887246 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Verma, Rakesh M., author<br/>Author&#160;Verma, Rakesh M., author,&#160;Marchette, David J., author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 V47 2020<br/>Publication Date&#160;2020<br/>ISBN&#160;9780367346010<br/> CYBER INFLUENCE AND COGNITIVE THREATS ent://SD_ILS/0/SD_ILS:887935 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Benson, Vladlena, editor<br/>Author&#160;Benson, Vladlena, editor,&#160;McAlaney, John, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C933 2020<br/>Publication Date&#160;2020<br/>ISBN&#160;9780128192047<br/> Digital Image Watermarking : Theoretical and Computational Advances ent://SD_ILS/0/SD_ILS:882197 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Borra, Surekha, author<br/>Author&#160;Borra, Surekha, author,&#160;Thanki, Rohit, author,&#160;Dey, Nilanjan, 1984-, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B673 2019<br/>Publication Date&#160;2019<br/>ISBN&#160;9781138390638<br/> Security in IoT-Enabled Space ent://SD_ILS/0/SD_ILS:882284 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Al-Turjman, Fadi, author<br/>Author&#160;Al-Turjman, Fadi, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.8857 A48 2019<br/>Publication Date&#160;2019<br/>ISBN&#160;9780367111236<br/> Advances of DNA computing in cryptography ent://SD_ILS/0/SD_ILS:882384 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Namasudra, Suyel, editor<br/>Author&#160;Namasudra, Suyel, editor,&#160;Deka, Ganesh Chandra, 1969- editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9 .A25 A378 2019<br/>Publication Date&#160;2019<br/>ISBN&#160;9780815385325<br/> AWS Certified Cloud Practitioner Study Guide : CLF-C01 Exam ent://SD_ILS/0/SD_ILS:887122 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Piper, Ben, author<br/>Author&#160;Piper, Ben, author,&#160;Clinton, David, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.3 P57 2019<br/>Publication Date&#160;2019<br/>ISBN&#160;9781119490708<br/> CRYPTOLOGY : Classical and Modern ent://SD_ILS/0/SD_ILS:882329 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Klima, Richard E., author<br/>Author&#160;Klima, Richard E., author,&#160;Sigmon, Neil, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 K55 2019<br/>Edition&#160;Second Edition<br/>Publication Date&#160;2019<br/>ISBN&#160;9781138047624<br/> GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONS ent://SD_ILS/0/SD_ILS:888152 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Nelson, Bill, author<br/>Author&#160;Nelson, Bill, author,&#160;Phillips, Amelia, author,&#160;Steuart, Christopher, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G84 2019<br/>Edition&#160;Sixth edition<br/>Publication Date&#160;2019<br/>ISBN&#160;9781337568944<br/> Automated image based CAPTCHA Solver ent://SD_ILS/0/SD_ILS:870360 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Choong, Kai Bin, 1993-, author<br/>Author&#160;Choong, Kai Bin, 1993-, author,&#160;Usman Ullah Sheikh, 1981-, supervisor,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C466 2018 raf<br/>Publication Date&#160;2018<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2018<br/> CompTIA security+ guide to network security fundamentals ent://SD_ILS/0/SD_ILS:873229 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Ciampa, Mark D., author<br/>Author&#160;Ciampa, Mark D., author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C574 2018<br/>Edition&#160;Sixth edition<br/>Publication Date&#160;2018<br/>ISBN&#160;9781337288781<br/> Security and Privacy in Cyber-Physical Systems : Foundations, Principles, and Applications ent://SD_ILS/0/SD_ILS:873241 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Song, Houbing, editor<br/>Author&#160;Song, Houbing, editor,&#160;Fink, Glenn A., editor,&#160;Jeschke, Sabina, editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S434 2018<br/>Edition&#160;First edition<br/>Publication Date&#160;2018<br/>ISBN&#160;9781119226048<br/> Automated image based CAPTCHA Solver ent://SD_ILS/0/SD_ILS:870363 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Choong, Kai Bin, 1993-, author<br/>Author&#160;Choong, Kai Bin, 1993-, author,&#160;Usman Ullah Sheikh, 1981-, supervisor,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;CP 265430 ra<br/>Publication Date&#160;2018<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2018<br/> CYBERSECURITY ESSENTIALS ent://SD_ILS/0/SD_ILS:882336 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Brooks, Charles J., author<br/>Author&#160;Brooks, Charles J., author,&#160;Grow, Christophe, author,&#160;Craig, Philip, author,&#160;Short, Donald, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 B76 2018<br/>Publication Date&#160;2018<br/>ISBN&#160;9781119362395<br/> Digital Forensics and Investigations : People, Processes, and Technologies to Defend the Enterprise ent://SD_ILS/0/SD_ILS:887256 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Sachowski, Jason, author<br/>Author&#160;Sachowski, Jason, author<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 S23 2018<br/>Publication Date&#160;2018<br/>ISBN&#160;9781138720930<br/> Advanced Persistent Security : A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies ent://SD_ILS/0/SD_ILS:873236 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Winkler, Ira, author<br/>Author&#160;Winkler, Ira, author,&#160;Gomes, Araceli Treu, author,&#160;Shackleford, Dave, editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W56 2017<br/>Publication Date&#160;2017<br/>ISBN&#160;9780128093160<br/> Advanced Penetration Testing : Hacking the World's Most Secure Networks ent://SD_ILS/0/SD_ILS:873238 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Allsopp, Wil, author<br/>Author&#160;Allsopp, Wil, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A4544 2017<br/>Publication Date&#160;2017<br/>ISBN&#160;9781119367680<br/> Privacy and Security Policies in Big Data ent://SD_ILS/0/SD_ILS:866730 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Tamane, Sharvari, 1973-, editor<br/>Author&#160;Tamane, Sharvari, 1973-, editor,&#160;Solanki, Vijender Kumar, 1980-, editor,&#160;Dey, Nilanjan, 1984-, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.B45 P75 2017 f<br/>Publisher&#160;IGI Global, Information Science Reference,<br/>Publication Date&#160;2017<br/>ISBN&#160;9781522524861<br/> Network Forensics ent://SD_ILS/0/SD_ILS:873173 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Messier, Ric, author<br/>Author&#160;Messier, Ric, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M47 2017<br/>Publication Date&#160;2017<br/>ISBN&#160;9781119328285<br/> Malaysia Perlu Pakar Serangan Untuk Keselamatan Sistem Komputer ent://SD_ILS/0/SD_ILS:874830 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Universiti Teknologi Malaysia. Perpustakaan. Unit Pembangunan dan Pengurusan Multimedia<br/>Author&#160;Universiti Teknologi Malaysia. Perpustakaan. Unit Pembangunan dan Pengurusan Multimedia<br/>Format:&#160;Visual Materials<br/>Call Number&#160;CP 080656 a<br/>Publication Date&#160;2017<br/> Discovering Computers 2017 : Tools, Apps, Devices, and the Impact of Technology ent://SD_ILS/0/SD_ILS:886146 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Vermaat, Misty, author<br/>Author&#160;Vermaat, Misty, author,&#160;Sebok, Susan L., author,&#160;Freund, Steven M., author,&#160;Campbell, Jennifer T.,, author,&#160;Frydenberg, Mark (Mark E.), author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.5 V47 2017 f<br/>Edition&#160;Enhanced edition<br/>Publication Date&#160;2017<br/>ISBN&#160;9781305657458<br/> Anonymous authentication mechanism based on group signature and pseudonym public key infrastructure for safety application of vehicular ad hoc network ent://SD_ILS/0/SD_ILS:863548 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Ali Asadi, 1979-, author<br/>Author&#160;Ali Asadi, 1979-, author,&#160;Abdul Samad Ismail, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;XX(863548.2)<br/>Publication Date&#160;2016<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2016<br/> CYBER-RISK INFORMATICS : Engineering Evaluation with Data Science ent://SD_ILS/0/SD_ILS:866793 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Sahinoglu, Mehmet, 1951-, author<br/>Author&#160;Sahinoglu, Mehmet, 1951-, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S246 2016<br/>Publication Date&#160;2016<br/>ISBN&#160;9781119087519<br/> Anonymous authentication mechanism based on group signature and pseudonym public key infrastructure for safety application of vehicular ad hoc network ent://SD_ILS/0/SD_ILS:868429 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Ali Asadi, 1979-, author<br/>Author&#160;Ali Asadi, 1979-, author<br/>Format:&#160;Electronic Resources<br/>Call Number&#160;CP 064612 ra<br/>Publication Date&#160;2016<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2016<br/> Cloud computing three-factor user authentication framework and protocols for telecare medical information system ent://SD_ILS/0/SD_ILS:849174 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Zeeshan Siddiqui, 1979-, author<br/>Author&#160;Zeeshan Siddiqui, 1979-, author,&#160;Abdul Hanan Abdullah, supervisor,&#160;Muhammad Khurram Khan, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;R858 Z33 2015 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/> Online psychographic model for insider identification ent://SD_ILS/0/SD_ILS:849188 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Ikuesan Richard Adeyemi, 1983-, author<br/>Author&#160;Ikuesan Richard Adeyemi, 1983-, author,&#160;Shukor Abdul Razak, supervisor,&#160;Mazleena Salleh, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;XX(849188.1)<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/> Enhanced framework for alert processing using clustering approach based on artifical immune system ent://SD_ILS/0/SD_ILS:849204 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Ashara Banu Mohamed, 1969-, author<br/>Author&#160;Ashara Banu Mohamed, 1969-, author,&#160;Norbik Bashah Idris, Dato&rsquo; Prof. Dr., supervisor,&#160;Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;XX(849204.1)<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer) - Universiti Teknologi Malaysia, 2015<br/> Gravitational search algorithm-based anomly intrusion detection system ent://SD_ILS/0/SD_ILS:849341 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Salima Omar M. Hamad, 1963-, author<br/>Author&#160;Salima Omar M. Hamad, 1963-, author,&#160;Md. Asri Ngadi, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;XX(849341.1)<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/> Enhanced framework for alert processing using clustering approach based on artifical immune system ent://SD_ILS/0/SD_ILS:851362 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Ashara Banu Mohamed, 1969-, author<br/>Author&#160;Ashara Banu Mohamed, 1969-, author<br/>Format:&#160;Books<br/>Call Number&#160;CP 054731 ra<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/> Gravitational search algorithm-based anomly intrusion detection system ent://SD_ILS/0/SD_ILS:851502 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Salima Omar M. Hamad, 1963- , author<br/>Author&#160;Salima Omar M. Hamad, 1963- , author<br/>Format:&#160;Books<br/>Call Number&#160;CP 054786 ra<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/> Cloud computing three-factor user authentication framework and protocols for telecare medical information system ent://SD_ILS/0/SD_ILS:851523 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Zeeshan Siddiqui, 1979-, author<br/>Author&#160;Zeeshan Siddiqui, 1979-, author<br/>Format:&#160;Books<br/>Call Number&#160;CP 054792 ra<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/> Trusted connection decision support mechanism using TOPSIS method ent://SD_ILS/0/SD_ILS:854232 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Ahmad Kamal Kamarun Hamidy, 1986-, author<br/>Author&#160;Ahmad Kamal Kamarun Hamidy, 1986-, author,&#160;Hassan Chizari, upervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;HM742 A46 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/> Trusted connection decision support mechanism using TOPSIS method ent://SD_ILS/0/SD_ILS:854233 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Ahmad Kamal Kamarun Hamidy, 1986-<br/>Author&#160;Ahmad Kamal Kamarun Hamidy, 1986-<br/>Format:&#160;Books<br/>Call Number&#160;CP 057166 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/> Secure development for mobile apps : how to design and code secure mobile applications with PHP and javascript ent://SD_ILS/0/SD_ILS:822512 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Glaser, J. D.<br/>Author&#160;Glaser, J. D.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G535 2015<br/>Publisher&#160;CRC Press, Taylor &amp; Francis Group, CRC Press is an imprint of the Taylor &amp; Francis Group, an informa business,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781482209037<br/> Cybersecurity : engineering a secure information technology organization ent://SD_ILS/0/SD_ILS:828276 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Shoemaker, Dan<br/>Author&#160;Shoemaker, Dan,&#160;Sigler, Kenneth, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S49 2015 f<br/>Publisher&#160;Cengage Learning,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781285169903<br/> Computing security &amp; cryptography handbook ent://SD_ILS/0/SD_ILS:834747 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Mason, Stephen<br/>Author&#160;Mason, Stephen<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C667 2015<br/>Publisher&#160;Clanrye International,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781632401137<br/> Biometric technology : authentication, biocryptography, and cloud-based architecture ent://SD_ILS/0/SD_ILS:834878 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Das, Ravindra, author<br/>Author&#160;Das, Ravindra, author<br/>Format:&#160;Books<br/>Call Number&#160;TK7882.B56 D37 2015<br/>Publisher&#160;CRC Press/Taylor &amp; Francis,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781466592452<br/> Applications of cryptography and network security ent://SD_ILS/0/SD_ILS:836934 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Mason, Stephen<br/>Author&#160;Mason, Stephen<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 A675 2015<br/>Publisher&#160;Clanrye Intl.,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781632400659<br/> Ethical hacking and penetration testing guide ent://SD_ILS/0/SD_ILS:837218 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Baloch, Rafay<br/>Author&#160;Baloch, Rafay<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B35 2015<br/>Publisher&#160;CRC Press, Taylor &amp; Francis Group,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781482231618<br/> Legal issues in information security ent://SD_ILS/0/SD_ILS:839130 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Grama, Joanna Lyn<br/>Author&#160;Grama, Joanna Lyn<br/>Format:&#160;Books<br/>Call Number&#160;KF1263.C65 G73 2015<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781284054743<br/> Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systems ent://SD_ILS/0/SD_ILS:841037 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Knapp, Eric D.<br/>Author&#160;Knapp, Eric D.,&#160;Langill, Joel Thomas<br/>Format:&#160;Books<br/>Call Number&#160;TS156.8 K53 2015<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Syngress ,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780124201149<br/> Information hiding in speech signals for secure communication ent://SD_ILS/0/SD_ILS:841038 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Wu, Zhijun<br/>Author&#160;Wu, Zhijun<br/>Format:&#160;Books<br/>Call Number&#160;TK7882.S65 W8 2015<br/>Publisher&#160;Syngress ,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780128013281<br/> CHFI computer hacking forensic investigator : exam guide ent://SD_ILS/0/SD_ILS:843159 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Brooks, Charles L.<br/>Author&#160;Brooks, Charles L.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B766 2015<br/>Publisher&#160;McGraw-Hill Education ,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780071831567<br/> CHFI computer hacking forensic investigator certification exam guide ent://SD_ILS/0/SD_ILS:848084 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Brooks, Charles L.<br/>Author&#160;Brooks, Charles L.<br/>Format:&#160;Books<br/>Call Number&#160;CP 034575<br/>Publisher&#160;McGraw-Hill Education ,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780071831567<br/> Online psychographic model for insider identification ent://SD_ILS/0/SD_ILS:851360 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Ikuesan Richard Adeyemi, 1983-<br/>Author&#160;Ikuesan Richard Adeyemi, 1983-<br/>Format:&#160;Books<br/>Call Number&#160;CP 054732 ra<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/> Factors affecting the information security awareness in maldives customs service ent://SD_ILS/0/SD_ILS:859369 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Ibrahim Naaif, 1987-, author<br/>Author&#160;Ibrahim Naaif, 1987-, author,&#160;Zuraini Ismail, Assoc.Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I27 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/> A Model Of Security Awareness In Cloud Computing ent://SD_ILS/0/SD_ILS:859372 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Abdul Ghafar Jaafar, 1985-, author<br/>Author&#160;Abdul Ghafar Jaafar, 1985-, author,&#160;Rasimah Che Mohd. Yusoff, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.585 A238 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> Integration of verification in otp cryptography for highly critical embedded system ent://SD_ILS/0/SD_ILS:859380 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Muhammad Maharoff, 1980- , author<br/>Author&#160;Muhammad Maharoff, 1980- , author,&#160;Saiful Adli Ismail, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M846 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Kejuruteraan Sistem Komputer)) - Universiti Teknologi Malaysia, 2015<br/> Performance evaluation of snort intrusion detection system over IPV4/IPV6 networks using PF_ring cluster ent://SD_ILS/0/SD_ILS:859385 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Kaveh Khosravi, 1987-, author<br/>Author&#160;Kaveh Khosravi, 1987-, author,&#160;Saiful Adli Ismail, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 K38 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/> Feasibility study of the acceptance of e-assessment by lecturers from security perspective ent://SD_ILS/0/SD_ILS:859459 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Kavitha Thamadharan, 1989-, author<br/>Author&#160;Kavitha Thamadharan, 1989-, author,&#160;Nurazean Maarop, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;LB1028.5 K38 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/> Feasibility study of the acceptance of e-assessment by lecturers from security perspective ent://SD_ILS/0/SD_ILS:859460 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Kavitha Thamadharan, 1989-, author<br/>Author&#160;Kavitha Thamadharan, 1989-, author,&#160;Nurazean Maarop, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034748 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/> Developing network vulnerability prediction and detection application ent://SD_ILS/0/SD_ILS:859448 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Mehran Janfeshan, 1987-, author<br/>Author&#160;Mehran Janfeshan, 1987-, author,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M44 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> Public key infrastructure authentication framework (PKIAF) for Malaysian public sector ent://SD_ILS/0/SD_ILS:859477 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Noraida Aman Nor, 1985-, author<br/>Author&#160;Noraida Aman Nor, 1985-, author,&#160;Ganthan Narayana Samy, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N6735 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/> Public key infrastructure authentication framework (PKIAF) for Malaysian public sector ent://SD_ILS/0/SD_ILS:859478 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Noraida Aman Nor, 1985-, author<br/>Author&#160;Noraida Aman Nor, 1985-, author,&#160;Ganthan Narayana Samy, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034722 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/> Factors affecting the information security awareness in maldives customs service ent://SD_ILS/0/SD_ILS:859564 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Ibrahim Naaif, 1987-, author<br/>Author&#160;Ibrahim Naaif, 1987-, author,&#160;Zuraini Ismail, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034727 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/> A security awareness model of data leakage prevention in private sector ent://SD_ILS/0/SD_ILS:859894 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author<br/>Author&#160;Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author,&#160;Mohd. Shahidan Abdullah, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A366 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> Detection of spam on feature selection using cuckoo's search algorithm ent://SD_ILS/0/SD_ILS:860736 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Maznif Arahin Mujail, 1991-, author<br/>Author&#160;Maznif Arahin Mujail, 1991-, author,&#160;Anazida Zainal, Dr., supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;XX(860736.1)<br/>Publication Date&#160;2015<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2015<br/> Detection of spam on feature selection using cuckoo's search algorithm ent://SD_ILS/0/SD_ILS:860737 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Maznif Arahin Mujail, 1991-, author<br/>Author&#160;Maznif Arahin Mujail, 1991-, author,&#160;Anazida Zainal, Dr., supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;CP 061247 ra<br/>Publication Date&#160;2015<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2015<br/> Pervasive Computing and Communications. Part II : QOS &amp; SECURITY ent://SD_ILS/0/SD_ILS:864714 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Yahaya Coulibaly, editor<br/>Author&#160;Yahaya Coulibaly, editor,&#160;Mohammad Abdur Razzaque, editor,&#160;Adekemi Adedokun, contributor,&#160;Chong, Yuh Chwen, contributor,&#160;Fauziah Abdul Razak, contributor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P473 2015 a<br/>Edition&#160;First Edition 2015<br/>Publication Date&#160;2015<br/>ISBN&#160;9789835210501<br/> SECURITY IN COMPUTING &amp; NETWORKING. PART II ent://SD_ILS/0/SD_ILS:865839 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Hassan Chizari, 1975-, editor<br/>Author&#160;Hassan Chizari, 1975-, editor,&#160;Hazinah Kutty Mammi, editor,&#160;Hassan Chizari, 1975-, contributor,&#160;Mahnoush Babaeizadeh, 1988-, contributor,&#160;Majid Bakhtiari, 1961-, contributor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S439 2015 a<br/>Edition&#160;First Edition 2015<br/>Publication Date&#160;2015<br/>ISBN&#160;9789835211515<br/> Protocols and procedures of cryptography and network security ent://SD_ILS/0/SD_ILS:835156 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Mason, Stephen<br/>Author&#160;Mason, Stephen<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P768 2015<br/>Publisher&#160;Clanrye International,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781632404237<br/> Introduction to modern cryptography ent://SD_ILS/0/SD_ILS:835855 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Katz, Jonathan, 1974- author<br/>Author&#160;Katz, Jonathan, 1974- author,&#160;Lindell, Yehuda, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K38 2015<br/>Edition&#160;Second edition<br/>Publisher&#160;CRC Press/Taylor &amp; Francis,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781466570269<br/> Web security : a WhiteHat perspective ent://SD_ILS/0/SD_ILS:835869 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Hanqing, Wu, author<br/>Author&#160;Hanqing, Wu, author,&#160;Zhao, Liz, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H363 2015<br/>Publisher&#160;CRC Press is an imprint of Taylor &amp; Francis ; Publishing House of Electronics Industry,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781466592612<br/> Case studies in secure computing : achievements and trends ent://SD_ILS/0/SD_ILS:835881 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Issac, Biju, editor<br/>Author&#160;Issac, Biju, editor,&#160;Israr, Nauman, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C375 2015<br/>Publisher&#160;Taylor &amp; Francis, CRC Press,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781482207064<br/> Information security : principles and new concepts ent://SD_ILS/0/SD_ILS:837058 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Hobbs, Fiona, editor<br/>Author&#160;Hobbs, Fiona, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I549 2015 f v.1<br/>Publisher&#160;Clanrye Intl.,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781632403063&#160;9781632403070&#160;9781632403087&#160;9781632403094<br/> Integrated researh in steganography ent://SD_ILS/0/SD_ILS:837102 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Coon, Audrey, editor<br/>Author&#160;Coon, Audrey, editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 I58 2015<br/>Publisher&#160;Clanrye Intl.,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781632403131<br/> Hardware security : design, threats, and safeguards ent://SD_ILS/0/SD_ILS:837219 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Mukhopadhyay, Debdeep, author<br/>Author&#160;Mukhopadhyay, Debdeep, author,&#160;Chakraborty, Rajat Subhra, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M85 2015<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781439895832<br/> CSA guide to cloud computing : implementing cloud privacy and security ent://SD_ILS/0/SD_ILS:838362 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Samani, Raj author<br/>Author&#160;Samani, Raj author,&#160;Honan, Brian author,&#160;Reavis, Jim author,&#160;Jirasek, Vladimir author,&#160;CSA (Organization)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.585 S26 2015<br/>Publisher&#160;Elsevier/Syngress, an imprint of Elsevier,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780124201255<br/> Designing and building security operations center ent://SD_ILS/0/SD_ILS:838365 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Nathans, David<br/>Author&#160;Nathans, David<br/>Format:&#160;Books<br/>Call Number&#160;HV8290 N38 2015<br/>Publisher&#160;Syngress ,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780128008997<br/> Information security analytics : finding security insights, patterns, and anomalies in big data ent://SD_ILS/0/SD_ILS:838366 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Talabis, Mark, author<br/>Author&#160;Talabis, Mark, author,&#160;McPherson, Robert, author,&#160;Miyamoto, I., author,&#160;Martin, Jason L., author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T355 2015<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780128002070<br/> Computational network science : an algorithmic approach ent://SD_ILS/0/SD_ILS:838372 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Hexmoor, Henry, author<br/>Author&#160;Hexmoor, Henry, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H49 2015<br/>Publisher&#160;Morgan Kaufmann,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780128008911<br/> Cyberwarfare : information operations in a connected world ent://SD_ILS/0/SD_ILS:839126 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Chapple, Mike, author<br/>Author&#160;Chapple, Mike, author,&#160;Seidl, David, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C437 2015<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781284058482<br/> Managing risk in information systems ent://SD_ILS/0/SD_ILS:839128 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Gibson, Darril, author<br/>Author&#160;Gibson, Darril, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G53 2015<br/>Edition&#160;Second edition<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781284055955<br/> Security policies and implementation issues ent://SD_ILS/0/SD_ILS:839131 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Johnson, Robert, 1946- author<br/>Author&#160;Johnson, Robert, 1946- author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 J64 2015<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781284055993<br/> Face recognition based security robot incorporating omnidirectional vision ent://SD_ILS/0/SD_ILS:846783 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Mohamed Tahir Ahmed Shoani, 1968-<br/>Author&#160;Mohamed Tahir Ahmed Shoani, 1968-,&#160;Shamsudin H. M. Amin,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;TA1650 M64 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2015<br/> A graphics processing unit based network intrusion detection system with bloom filter pattern matching algorithm ent://SD_ILS/0/SD_ILS:846855 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Ong, Wen Jian, 1987-, author<br/>Author&#160;Ong, Wen Jian, 1987-, author,&#160;Usman Ullah Sheikh, 1981-, supervisor,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 O54 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2015<br/> A graphics processing unit based network intrusion detection system with bloom filter pattern matching algorithm ent://SD_ILS/0/SD_ILS:846857 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Ong, Wen Jian, 1987-, author<br/>Author&#160;Ong, Wen Jian, 1987-, author<br/>Format:&#160;Books<br/>Call Number&#160;CP 052944 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2015<br/> Developing network vulnerability prediction and detection application ent://SD_ILS/0/SD_ILS:859449 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Mehran Janfeshan, 1987-, author<br/>Author&#160;Mehran Janfeshan, 1987-, author,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034751 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> Security implementation approach for the use of bring your own device in government agencies ent://SD_ILS/0/SD_ILS:859463 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Mohamad Roshidi Rozali, 1980-, author<br/>Author&#160;Mohamad Roshidi Rozali, 1980-, author,&#160;Zuraini Ismail, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.85 M64 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> Security implementation approach for the use of bring your own device in government agencies ent://SD_ILS/0/SD_ILS:859464 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Mohamad Roshidi Rozali, 1980-<br/>Author&#160;Mohamad Roshidi Rozali, 1980-,&#160;Zuraini Ismai, author?UNAUTHORIZED,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034749 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> Integration of verification in otp cryptography for highly critical embedded system ent://SD_ILS/0/SD_ILS:859625 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Muhammad Maharoff, 1980- , author<br/>Author&#160;Muhammad Maharoff, 1980- , author,&#160;Saiful Adli Ismail, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034740 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Kejuruteraan Sistem Komputer))-Universiti Teknologi Malaysia, 2015<br/> Performance evaluation of snort intrusion detection system over IPV4/IPV6 networks using PF_ring cluster ent://SD_ILS/0/SD_ILS:859636 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Kaveh Khosravi, 1987-, author<br/>Author&#160;Kaveh Khosravi, 1987-, author,&#160;Saiful Adli Ismail, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034742 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> A model of security awareness in cloud computing ent://SD_ILS/0/SD_ILS:859645 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Abdul Ghafar Jaafar, 1985-, author<br/>Author&#160;Abdul Ghafar Jaafar, 1985-, author,&#160;Rasimah Che Mohd. Yusoff, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034746 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> Enhancing password storage security ent://SD_ILS/0/SD_ILS:860307 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Yeoh, Soon Yau, 1991-, author<br/>Author&#160;Yeoh, Soon Yau, 1991-, author,&#160;Mazleena Salleh, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Y46 2015 raf<br/>Publication Date&#160;2015<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2015<br/> Enhancing password storage security ent://SD_ILS/0/SD_ILS:860337 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Yeoh, Soon Yau, 1991-, author<br/>Author&#160;Yeoh, Soon Yau, 1991-, author,&#160;Mazleena Salleh, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;CP 061137 ra<br/>Publication Date&#160;2015<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2015<br/> A security awareness model of data leakage prevention in private sector ent://SD_ILS/0/SD_ILS:860784 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author<br/>Author&#160;Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author,&#160;Mohd. Shahidan Abdullah, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034789 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> SECURITY IN COMPUTING &amp; NETWORKING. PART 1 ent://SD_ILS/0/SD_ILS:864380 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Hassan Chizari, 1975-, editor<br/>Author&#160;Hassan Chizari, 1975-, editor,&#160;Hazinah Kutty Mammi, editor,&#160;A. Ahmed Ibrahim Alkilary, contributor,&#160;Affandi Husain, contributor,&#160;Hassan Chizari, 1975-, contributor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S438 2015 a<br/>Edition&#160;First Edition 2015<br/>Publication Date&#160;2015<br/>ISBN&#160;35000000012313<br/> Cybersecurity : managing systems, conducting testing, and investigating intrusions ent://SD_ILS/0/SD_ILS:822549 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Mowbray, Thomas J.<br/>Author&#160;Mowbray, Thomas J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M69 2014<br/>Publisher&#160;John Wiley and Sons,<br/>Publication Date&#160;2014&#160;2013<br/>ISBN&#160;9781118697115<br/> Guide to network defense and countermeasures ent://SD_ILS/0/SD_ILS:822586 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Weaver, Randy, author<br/>Author&#160;Weaver, Randy, author,&#160;Weaver, Dawn, author,&#160;Farwood, Dean, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W424 2014<br/>Edition&#160;Third edition<br/>Publisher&#160;Cengage Learning,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781133727941<br/> A virus disaster recovery plan framework for academic computing center ent://SD_ILS/0/SD_ILS:825488 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Mohamed Ismail Gurhan, 1985-<br/>Author&#160;Mohamed Ismail Gurhan, 1985-,&#160;Norafida Ithnin, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.C68 M64 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Firewall for mitigation relay attack in near field communication in smartphones ent://SD_ILS/0/SD_ILS:825490 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Mehdi Hossein Zadeh, 1983-<br/>Author&#160;Mehdi Hossein Zadeh, 1983-,&#160;Abdul Hanan Abdullah,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M44 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Security management of next generation telecommunications networks and services ent://SD_ILS/0/SD_ILS:825733 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Jacobs, Stuart<br/>Author&#160;Jacobs, Stuart<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 J334 2014<br/>Publisher&#160;IEEE Press/Wiley,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780470565131<br/> Digital communication : communication, multimedia, security ent://SD_ILS/0/SD_ILS:825786 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Meinel, Christoph, 1954-, author<br/>Author&#160;Meinel, Christoph, 1954-, author,&#160;Sack, Harald, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.7 M45 2014<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2014<br/>ISBN&#160;9783642543302<br/> Analysis of DoS attacks effects on cloud computing performance ent://SD_ILS/0/SD_ILS:825970 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Ahmed Kadhim Noor, 1989-<br/>Author&#160;Ahmed Kadhim Noor, 1989-,&#160;Mohammad Abdur Razzaque,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A46 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Hands-on information security lab manual ent://SD_ILS/0/SD_ILS:828287 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Whitman, Michael E., 1964-, author<br/>Author&#160;Whitman, Michael E., 1964-, author,&#160;Mattord, Herbert J., author,&#160;Green, Andrew, author<br/>Format:&#160;Books<br/>Call Number&#160;HD30.38 W45 2014 f<br/>Publisher&#160;Cengage Learning,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781285167572<br/> Image encryption : a communication perspective ent://SD_ILS/0/SD_ILS:828934 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Abd el-Samie, Fathi E.<br/>Author&#160;Abd el-Samie, Fathi E.,&#160;Ahmed, Hossam Eldin H., author,&#160;Elashry, Ibrahim F., author,&#160;Shahieen, Mai H., author,&#160;Faragallah, Osama S., author<br/>Format:&#160;Books<br/>Call Number&#160;TA1637 A23 2014<br/>Publisher&#160;CRC Press, Tayllor &amp; Francis Group,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466576988<br/> Introduction to information security : a strategic-based approach ent://SD_ILS/0/SD_ILS:829124 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Shimeall, Timothy J.<br/>Author&#160;Shimeall, Timothy J.,&#160;Spring, Jonathan M.<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.85 S55 2014<br/>Publisher&#160;Syngress ,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781597499699<br/> Developing a guideline for adopting byod in a higher learning institution ent://SD_ILS/0/SD_ILS:830994 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Jayaseelan Vejayon<br/>Author&#160;Jayaseelan Vejayon,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;CP 033638 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> A secure model to mitigate bypassing web-based wireless authentication ent://SD_ILS/0/SD_ILS:831021 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Jamil Salem Bajamil, 1987-, author<br/>Author&#160;Jamil Salem Bajamil, 1987-, author,&#160;Mazdak Zamani, 1979-, supervisor,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 B35 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> A secure model to mitigate bypassing web-based wireless authentication ent://SD_ILS/0/SD_ILS:831022 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Jamil Salem Bajamil, 1987-, author<br/>Author&#160;Jamil Salem Bajamil, 1987-, author<br/>Format:&#160;Books<br/>Call Number&#160;CP 033623 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Emerging trends in ICT security ent://SD_ILS/0/SD_ILS:831031 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Akhgar, Babak, editor<br/>Author&#160;Akhgar, Babak, editor,&#160;Arabnia, Hamid R., editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 E46 2014<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124114746<br/> Managing information security ent://SD_ILS/0/SD_ILS:831036 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Vacca, John R., editor<br/>Author&#160;Vacca, John R., editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M36 2014<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124166882<br/> Business continuity and disaster recovery planning for IT professionals ent://SD_ILS/0/SD_ILS:831037 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Snedaker, Susan<br/>Author&#160;Snedaker, Susan,&#160;Rima, Chris<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 S67 2014<br/>Edition&#160;2nd edition.<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124105263<br/> The basics of IT audit : purposes, processes, and practical information ent://SD_ILS/0/SD_ILS:831038 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Gantz, Stephen D.<br/>Author&#160;Gantz, Stephen D.,&#160;Maske, Steve<br/>Format:&#160;Books<br/>Call Number&#160;T58.5 G37 2014<br/>Publisher&#160;Syngress, an imprint of Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124171596<br/> Social media security : leveraging social networking while mitigating risk ent://SD_ILS/0/SD_ILS:831039 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Cross, Michael, 1965-<br/>Author&#160;Cross, Michael, 1965-<br/>Format:&#160;Books<br/>Call Number&#160;HM742 C77 2013<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2014&#160;2013<br/>ISBN&#160;9781597499866<br/> Identity and access management : business performanve through connected intelligence ent://SD_ILS/0/SD_ILS:831228 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Osmanoglu, Ertem<br/>Author&#160;Osmanoglu, Ertem<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 O78 2013<br/>Publisher&#160;Syngress, an imprint of Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124081406<br/> Cyber security and IT infrastructure protection ent://SD_ILS/0/SD_ILS:831239 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Vacca, John R., editor<br/>Author&#160;Vacca, John R., editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C934 2014<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124166813<br/> Network and system security ent://SD_ILS/0/SD_ILS:831241 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Vacca, John R., editor<br/>Author&#160;Vacca, John R., editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N486 2014<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124166899<br/> The basics of digital privacy : simple tools to protect your personal information and your identity online ent://SD_ILS/0/SD_ILS:831266 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Cherry, Denny<br/>Author&#160;Cherry, Denny,&#160;Larock, Thomas, technical editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C444 2014<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780128000113<br/> Hacking with Kali : practical penetration testing techniques ent://SD_ILS/0/SD_ILS:831278 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Broad, James<br/>Author&#160;Broad, James,&#160;Bindner, Andrew<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B764 2014<br/>Publisher&#160;Elsevier Science,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124077492<br/> System forensics, investigation and response ent://SD_ILS/0/SD_ILS:831408 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Easttom, Chuck<br/>Author&#160;Easttom, Chuck<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 E27 2014<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781284031058<br/> Fundamentals of information systems security ent://SD_ILS/0/SD_ILS:831409 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Kim, David<br/>Author&#160;Kim, David,&#160;Solomon, Michael G.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K564 2014<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Jones &amp; Bartlett Learning ,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781284031621<br/> Network security firewalls, and VPNs ent://SD_ILS/0/SD_ILS:831412 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Stewart, J. Michael<br/>Author&#160;Stewart, J. Michael<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S74 2014<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781284031676<br/> Security strategies in windows platforms and applications ent://SD_ILS/0/SD_ILS:831414 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Solomon, Michael G.<br/>Author&#160;Solomon, Michael G.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.O63 S656 2014<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781284031652<br/> Hacker techniques, tools, and incident handling ent://SD_ILS/0/SD_ILS:831415 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Oriyano, Sean-Philip<br/>Author&#160;Oriyano, Sean-Philip<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 O75 2014<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781284031713<br/> Learning nessus for penetration testing : master how to perfom IT infrastructure security vulnerability assessments using nessus with tips and insights from real-world challenges faced during vulnerability assessment ent://SD_ILS/0/SD_ILS:831436 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Kumar, Himanshu<br/>Author&#160;Kumar, Himanshu<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K864 2014<br/>Publisher&#160;Packt Publiching,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781783550999<br/> Conducting network penetration and espionage in a global environment ent://SD_ILS/0/SD_ILS:833094 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Middleton, Bruce, 1953-, author<br/>Author&#160;Middleton, Bruce, 1953-, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M53 2014<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781482206470<br/> Simplified computer incident response model for premium pension limited Nigeria ent://SD_ILS/0/SD_ILS:843364 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Abubakar Mohammed, 1989-<br/>Author&#160;Abubakar Mohammed, 1989-,&#160;Norafida Ithnin,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;CP 051607 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia,2014<br/> Improvement scalar multiplication in elliptic curve cryptography ent://SD_ILS/0/SD_ILS:843414 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Sui, Tao, 1988- author<br/>Author&#160;Sui, Tao, 1988- author,&#160;Majid Bakhtiari, Dr.,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S85 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> A comparison study of particale swarm optimizzation and differential evolution for feature selection intrusion detection system ent://SD_ILS/0/SD_ILS:843415 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Mohamud Sheikh Ali Hussein, 1988- author<br/>Author&#160;Mohamud Sheikh Ali Hussein, 1988- author,&#160;Anazida Zainal, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M647 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Improvement scalar multiplication in elliptic curve cryptography ent://SD_ILS/0/SD_ILS:843418 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Sui, Tao, 1988- author<br/>Author&#160;Sui, Tao, 1988- author<br/>Format:&#160;Books<br/>Call Number&#160;CP 052054 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia,2014<br/> A comparison study of particale swarm optimizzation and differential evolution for feature selection intrusion detection system ent://SD_ILS/0/SD_ILS:843645 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Mohamud Sheikh Ali Hussein, 1988- author<br/>Author&#160;Mohamud Sheikh Ali Hussein, 1988- author,&#160;Anazida Zainal, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;CP 052066 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> A cloud security audit quality model for a commercial bank in Malaysia ent://SD_ILS/0/SD_ILS:843871 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Mariana Md. Hashim, 1982-, author<br/>Author&#160;Mariana Md. Hashim, 1982-, author,&#160;Mazdak Zamani, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.585 M375 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> A cloud security audit quality model for a commercial bank in Malaysia ent://SD_ILS/0/SD_ILS:843872 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Mariana Md. Hashim, 1982-, author<br/>Author&#160;Mariana Md. Hashim, 1982-, author,&#160;Mazdak Zamani, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034206 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Preferred methodologies of penetration testing from information security professionals perspective ent://SD_ILS/0/SD_ILS:843902 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Mohd. Irzani Wahid, 1985-, author<br/>Author&#160;Mohd. Irzani Wahid, 1985-, author,&#160;Bharanidharan Shanmugam, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M6439 2014 raf<br/>Publication Date&#160;2014<br/>Thesis&#160;Sarjana Sains (Jaminan Maklumat) - Universiti Teknologi Malaysia, 2014<br/> Databased encrytpion/decryption using AES/DES ent://SD_ILS/0/SD_ILS:844000 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Abdul Kadir Abukar Sufi, 1985- author<br/>Author&#160;Abdul Kadir Abukar Sufi, 1985- author,&#160;Ismail Fauzi Isnin, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A23 2014 raf<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/> Optimize perceptuality of digital image from encryption based on quadtree ent://SD_ILS/0/SD_ILS:844096 2024-04-26T21:41:18Z 2024-04-26T21:41:18Z by&#160;Hussein A. Hussein, 1983- author<br/>Author&#160;Hussein A. Hussein, 1983- author,&#160;Dzulkifli Mohamed, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;CP 052393 ra<br/>Publication Date&#160;2014<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2014<br/>