Search Results for Computer securitySirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dComputer$002bsecurity$0026ps$003d300?dt=list2024-04-26T21:41:18ZComputer securityent://SD_ILS/0/SD_ILS:2466352024-04-26T21:41:18Z2024-04-26T21:41:18Zby Hamilton, Peter<br/>Author Hamilton, Peter<br/>Format: Books<br/>Call Number HF5548.2.H37 1972<br/>Publisher Auerbach Pub.,<br/>Publication Date 2020 2019 2018 2017 2016<br/>ISBN 9780877691600<br/>Computer securityent://SD_ILS/0/SD_ILS:7567302024-04-26T21:41:18Z2024-04-26T21:41:18Zby Gollmann, Dieter<br/>Author Gollmann, Dieter<br/>Format: Books<br/>Call Number QA76.9.A25 G65 2011<br/>Edition 3rd ed.<br/>Publisher Wiley,<br/>Publication Date 2011<br/>ISBN 9780470741153<br/>Computer securityent://SD_ILS/0/SD_ILS:4616362024-04-26T21:41:18Z2024-04-26T21:41:18Zby Gollmann, Dieter<br/>Author Gollmann, Dieter<br/>Format: Books<br/>Call Number QA76.9.A25 G65 2006<br/>Edition 2nd ed.<br/>Publisher John Wiley & Sons,<br/>Publication Date 2006<br/>ISBN 9780470862933<br/>Computer securityent://SD_ILS/0/SD_ILS:981532024-04-26T21:41:18Z2024-04-26T21:41:18Zby Gollmann, Dieter<br/>Author Gollmann, Dieter<br/>Format: Books<br/>Call Number QA76.9.A25 G65 1999<br/>Publisher John Wiley & Sons,<br/>Publication Date 1999<br/>ISBN 9780471978442<br/>Computer securityent://SD_ILS/0/SD_ILS:2394082024-04-26T21:41:18Z2024-04-26T21:41:18Zby Roberts, D. W.<br/>Author Roberts, D. W.<br/>Format: Books<br/>Call Number QA76.9.A25 R62 1990<br/>Publisher Blenheim Online Publications,<br/>Publication Date 1990<br/>ISBN 9780863531804<br/>Computer securityent://SD_ILS/0/SD_ILS:1824672024-04-26T21:41:18Z2024-04-26T21:41:18Zby Carrol, John M.<br/>Author Carrol, John M.<br/>Format: Books<br/>Call Number HF5548.2.C27 1987<br/>Edition 2nd ed<br/>Publisher Butterworth Pub.,<br/>Publication Date 1987<br/>ISBN 9780409900323<br/>Computer securityent://SD_ILS/0/SD_ILS:2960082024-04-26T21:41:18Z2024-04-26T21:41:18Zby Hsiao, David K.<br/>Author Hsiao, David K., Kerr, Douglas S., Madnick, Stuart E.<br/>Format: Books<br/>Call Number QA76.9.A25 H74 1979<br/>Publisher Academic,<br/>Publication Date 1979<br/>ISBN 9780123576507<br/>Computer securityent://SD_ILS/0/SD_ILS:2468762024-04-26T21:41:18Z2024-04-26T21:41:18Zby Carroll, John Millar, 1950-<br/>Author Carroll, John Millar, 1950-<br/>Format: Books<br/>Call Number HF5548.2 C37 1977<br/>Publisher Security Wold Pub.,<br/>Publication Date 1977<br/>ISBN 9780913708286<br/>Computer securityent://SD_ILS/0/SD_ILS:4397212024-04-26T21:41:18Z2024-04-26T21:41:18Zby Carroll, John M. (John Millar), 1950-<br/>Author Carroll, John M. (John Millar), 1950-<br/>Format: Books<br/>Call Number HF5548.2 C37 1996<br/>Edition 3rd ed.<br/>Publisher Butterworth-Heinemann,<br/>Publication Date 1996<br/>ISBN 9780750696005<br/>Computer securityent://SD_ILS/0/SD_ILS:4032152024-04-26T21:41:18Z2024-04-26T21:41:18ZFormat: Books<br/>Call Number QA76.9.A25 C67 1986 f<br/>Publisher Time life Books,<br/>Publication Date 1986<br/>ISBN 9780809456703<br/>Computer Security Fundamentalsent://SD_ILS/0/SD_ILS:8861352024-04-26T21:41:18Z2024-04-26T21:41:18Zby Easttom, Chuck, author<br/>Author Easttom, Chuck, author<br/>Format: Books<br/>Call Number QA76.9.A25 E27 2020<br/>Edition Fourth Edition<br/>Publication Date 2020<br/>ISBN 9780135774779<br/>Corporate computer security.ent://SD_ILS/0/SD_ILS:8065032024-04-26T21:41:18Z2024-04-26T21:41:18Zby Boyle, Randall J.<br/>Author Boyle, Randall J., Panko, Raymond R.<br/>Format: Books<br/>Call Number QA76.9 .A25 P36 2012<br/>Edition 3rd ed. / Randall J. Boyle, Raymond R. Panko.<br/>Publisher Pearson,<br/>Publication Date 2013 2012<br/>ISBN 9780132145350<br/>Computer security fundamentalsent://SD_ILS/0/SD_ILS:4304842024-04-26T21:41:18Z2024-04-26T21:41:18Zby Easttom, Chuck<br/>Author Easttom, Chuck<br/>Format: Books<br/>Call Number QA76.9.A25 E27 2006<br/>Publisher Pearson Prentice Hall,<br/>Publication Date 2006<br/>ISBN 9780131711297<br/>Computer security handbookent://SD_ILS/0/SD_ILS:4816042024-04-26T21:41:18Z2024-04-26T21:41:18Zby Baker, Richard H.<br/>Author Baker, Richard H.<br/>Format: Books<br/>Call Number QA76.9.A25 B35 1991<br/>Edition 2nd ed.<br/>Publisher TAB Professional and Reference Books,<br/>Publication Date 1991<br/>ISBN 9780830675920<br/>Computer Network Securityent://SD_ILS/0/SD_ILS:8873612024-04-26T21:41:18Z2024-04-26T21:41:18Zby Sadiqui, Ali, author<br/>Author Sadiqui, Ali, author<br/>Format: Books<br/>Call Number TK5105.59 S335 2020<br/>ISBN 9781786305275<br/>Computer security handbookent://SD_ILS/0/SD_ILS:6241022024-04-26T21:41:18Z2024-04-26T21:41:18Zby Bosworth, Seymour<br/>Author Bosworth, Seymour, Kabay, Michel E., Whyne, Eric, 1981-<br/>Format: Books<br/>Call Number HF5548.37 C65 2009 issue.1<br/>Edition 5th ed.<br/>Publisher John Wiley & Sons,<br/>Publication Date 2009<br/>ISBN 9780471716525 9780470327227 9780470327234<br/>Computer security handbookent://SD_ILS/0/SD_ILS:3845932024-04-26T21:41:18Z2024-04-26T21:41:18Zby Bosworth, Seymour<br/>Author Bosworth, Seymour, Kabay, Michel E.<br/>Format: Books<br/>Call Number HF5548.37 C65 2002<br/>Publisher John Wiley & Sons,<br/>Publication Date 2002<br/>ISBN 9780471412588<br/>Computer security handbookent://SD_ILS/0/SD_ILS:4232162024-04-26T21:41:18Z2024-04-26T21:41:18Zby Hutt, Arthur E.<br/>Author Hutt, Arthur E., Bosworth, Seymour, Hoyt, Douglass B.<br/>Format: Books<br/>Call Number HF5548.37 C65 1995<br/>Edition 3rd ed<br/>Publisher Wiley,<br/>Publication Date 1995<br/>ISBN 9780471019077<br/>Computer-security technologyent://SD_ILS/0/SD_ILS:4665612024-04-26T21:41:18Z2024-04-26T21:41:18Zby Cooper, James Arlin<br/>Author Cooper, James Arlin<br/>Format: Books<br/>Call Number QA76.9.A25 C66 1984<br/>Publisher Lexington Books,<br/>Publication Date 1984<br/>ISBN 9780669064360<br/>Computer data securityent://SD_ILS/0/SD_ILS:4762222024-04-26T21:41:18Z2024-04-26T21:41:18Zby Katzan, Harry<br/>Author Katzan, Harry<br/>Format: Books<br/>Call Number HF5548.2K33 1973<br/>Publisher Van Nost. Reinhold,<br/>Publication Date 1973<br/>ISBN 9780442242589<br/>Computer security managementent://SD_ILS/0/SD_ILS:2091322024-04-26T21:41:18Z2024-04-26T21:41:18Zby Van Tassel, Dennie<br/>Author Van Tassel, Dennie<br/>Format: Books<br/>Call Number HF5548.2 .V33 1972<br/>Publisher Prntice-Hall,<br/>Publication Date 1972<br/>ISBN 9780131664647<br/>Computer security : proceedingsent://SD_ILS/0/SD_ILS:3345852024-04-26T21:41:18Z2024-04-26T21:41:18Zby IFIP TC11 International Conference on Information Security (9th : 1993 : Toronto, Ont.)<br/>Author IFIP TC11 International Conference on Information Security (9th : 1993 : Toronto, Ont.), Dougall, E. Graham<br/>Format: Books<br/>Call Number QA76.9.A25 I45 1993<br/>Publisher North-Holland,<br/>Publication Date 1993<br/>ISBN 9780444817488<br/>Computer Security Digestent://SD_ILS/0/SD_ILS:5675442024-04-26T21:41:18Z2024-04-26T21:41:18ZFormat: Computer file<br/>Call Number http://proquest.umi.com/pqdweb<br/><a href="http://proquest.umi.com/pqdweb?RQT=318&TS=1089613007&clientId=21690&VType=PQD&VName=PQD&VInst=PROD&pmid=000034941&PageNum=1">Online access via ProQuest Computing</a><br/>Open access to UTM community only<br/>Journal of computer securityent://SD_ILS/0/SD_ILS:6402072024-04-26T21:41:18Z2024-04-26T21:41:18Zby Jajodia, Sushil<br/>Author Jajodia, Sushil, Millen, Jonathan<br/>Format: Books<br/>Call Number QA76.9.A25 J684 2010<br/>Publisher IOS Pr.,<br/>Publication Date 2010<br/>ISBN 9781607500889<br/>Introduction to computer securityent://SD_ILS/0/SD_ILS:1709252024-04-26T21:41:18Z2024-04-26T21:41:18Zby Anderson, Hugh<br/>Author Anderson, Hugh<br/>Format: Books<br/>Call Number QA76.9.A25 A526 2005<br/>Edition 2nd ed.<br/>Publisher Pearson/Prentice Hall,<br/>Publication Date 2005<br/>ISBN 9789810675776<br/>Security for computer systemsent://SD_ILS/0/SD_ILS:2367572024-04-26T21:41:18Z2024-04-26T21:41:18Zby Chadwick, B.<br/>Author Chadwick, B., Wong, K. K.<br/>Format: Books<br/>Call Number HF5548.2.F37<br/>Publisher National Computing Centre,<br/>Publication Date 1972<br/>ISBN 9780850120776<br/>Introduction to computer securityent://SD_ILS/0/SD_ILS:8073562024-04-26T21:41:18Z2024-04-26T21:41:18Zby Goodrich, Michael T.<br/>Author Goodrich, Michael T., Tamassia, Roberto, 1960-<br/>Format: Books<br/>Call Number QA76.9.A25 G66 2011<br/>Publisher Addison-Wesley,<br/>Publication Date 2011<br/>ISBN 9780321512949<br/>Computer security lab manualent://SD_ILS/0/SD_ILS:4338532024-04-26T21:41:18Z2024-04-26T21:41:18Zby Nestler, Vincent J.<br/>Author Nestler, Vincent J.<br/>Format: Books<br/>Call Number QA76.9.A25 C654 2006<br/>Publication Date 2006<br/>ISBN 9780072255089<br/>Computer security within organisationsent://SD_ILS/0/SD_ILS:1258642024-04-26T21:41:18Z2024-04-26T21:41:18Zby Warman, Adrian R.<br/>Author Warman, Adrian R.<br/>Format: Books<br/>Call Number QA76.9.A25 W37 1993<br/>Publisher Macmillan,<br/>Publication Date 1993<br/>ISBN 9780333577271<br/>Computer security and cryptographyent://SD_ILS/0/SD_ILS:1953342024-04-26T21:41:18Z2024-04-26T21:41:18Zby Konheim, Alan G., 1934-<br/>Author Konheim, Alan G., 1934-<br/>Format: Books<br/>Call Number QA76.9.A25 K664 2007<br/>Publisher Wiley-Interscience,<br/>Publication Date 2007<br/>ISBN 9780471947837<br/>Introduction to computer securityent://SD_ILS/0/SD_ILS:4154912024-04-26T21:41:18Z2024-04-26T21:41:18Zby Bishop, Matt (Matthew A.)<br/>Author Bishop, Matt (Matthew A.)<br/>Format: Books<br/>Call Number QA76.9.A25 B563 2005<br/>Publisher Addison-Wesley,<br/>Publication Date 2005<br/>ISBN 9780321247445<br/>Journal of computer securityent://SD_ILS/0/SD_ILS:1555682024-04-26T21:41:18Z2024-04-26T21:41:18ZFormat: Books<br/>Call Number QA76.9.A25 J68 2007<br/>Publisher IOS Press,<br/>Publication Date 2007<br/>ISSN 0926227X<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&db=a3h&jid=LCY&site=ehost-live">Online via EBSCOhost</a><br/>Accessible within UTM campus<br/>Information assurance and computer securityent://SD_ILS/0/SD_ILS:1748882024-04-26T21:41:18Z2024-04-26T21:41:18Zby NATO Advanced Research Workshop on Information Assurance and Computer Security ( 2005 : Tetouan, Morocco)<br/>Author NATO Advanced Research Workshop on Information Assurance and Computer Security ( 2005 : Tetouan, Morocco), Thomas, Johnson P., Essaaidi, Mohamed<br/>Format: Books<br/>Call Number QA76.9.A25 N37 2005<br/>Publisher IOS Press,<br/>Publication Date 2006<br/>ISBN 9781586036782<br/>Computer security and information integrityent://SD_ILS/0/SD_ILS:2504622024-04-26T21:41:18Z2024-04-26T21:41:18Zby IFIP International Conference on Computer Security and Information Integrity in Our Changing World (6th : 1990 : Espoo, Finland)<br/>Author IFIP International Conference on Computer Security and Information Integrity in Our Changing World (6th : 1990 : Espoo, Finland), Dittrich, Klaus R., Rautakivi, Seppo, Saari, Juhani<br/>Format: Books<br/>Call Number QA76.9.A25 I44 1991<br/>Publisher Elseview Science Pub.,<br/>Publication Date 1991<br/>ISBN 9780444888594<br/>Computer security : a global challengeent://SD_ILS/0/SD_ILS:2960852024-04-26T21:41:18Z2024-04-26T21:41:18Zby IFIP International Conference on Computer Security, 2nd: 1984 : Toronto, Ontario, Canada)<br/>Author IFIP International Conference on Computer Security, 2nd: 1984 : Toronto, Ontario, Canada), Finch, James H., Dougall, E. Graham<br/>Format: Books<br/>Call Number QA76.9.A25 I35 1984<br/>Publisher North Holland,<br/>Publication Date 1984<br/>ISBN 9780444876188<br/>Computer security : principles and practiceent://SD_ILS/0/SD_ILS:8041492024-04-26T21:41:18Z2024-04-26T21:41:18Zby Stallings, William<br/>Author Stallings, William, Brown, Lawrie<br/>Format: Books<br/>Call Number QA76.9.A25 S73 2012<br/>Edition 2nd ed. International ed.<br/>Publisher Pearson,<br/>Publication Date 2012<br/>ISBN 9780273764496<br/>Computer security and penetration testingent://SD_ILS/0/SD_ILS:2456462024-04-26T21:41:18Z2024-04-26T21:41:18Zby Basta, Alfred<br/>Author Basta, Alfred, Halton, Wolf<br/>Format: Books<br/>Call Number TK5101.59 B37 2008<br/>Publisher Thomson,<br/>Publication Date 2008<br/>ISBN 9781418048266<br/>Security mechanisms for computer networksent://SD_ILS/0/SD_ILS:1916662024-04-26T21:41:18Z2024-04-26T21:41:18Zby Muftic, Sead<br/>Author Muftic, Sead<br/>Format: Books<br/>Call Number QA76.9.A25 S42 1989<br/>Publisher Ellis Horwood,<br/>Publication Date 1989<br/>ISBN 9780745806136<br/>A Handbook of computer securityent://SD_ILS/0/SD_ILS:1715982024-04-26T21:41:18Z2024-04-26T21:41:18Zby Hearnden, Keith<br/>Author Hearnden, Keith<br/>Format: Books<br/>Call Number HF5548.2.H363 1987<br/>Publisher Kogan page,<br/>Publication Date 1987<br/>ISBN 9781850913481<br/>Advances in computer system securityent://SD_ILS/0/SD_ILS:1729312024-04-26T21:41:18Z2024-04-26T21:41:18Zby Turn, Rein,. 1931-<br/>Author Turn, Rein,. 1931-<br/>Format: Books<br/>Call Number QA76.9.A25 A38 1981-1988<br/>Publisher Artech House,<br/>Publication Date 2020 2019 2018 2017 2016<br/>ISBN 9780890061541 9780890060964<br/>Computer security and penetration testingent://SD_ILS/0/SD_ILS:8359182024-04-26T21:41:18Z2024-04-26T21:41:18Zby Basta, Alfred, author<br/>Author Basta, Alfred, author, Basta, Nadine, author, Brown, Mary, author<br/>Format: Books<br/>Call Number TK5101.59 B37 2014<br/>Edition Second edition<br/>Publisher Course Technology, Cengage Learning,<br/>Publication Date 2014<br/>ISBN 9780840020932<br/>Computer and information security handbookent://SD_ILS/0/SD_ILS:8284572024-04-26T21:41:18Z2024-04-26T21:41:18Zby Vacca, John R., editor<br/>Author Vacca, John R., editor<br/>Format: Books<br/>Call Number QA76.9.A25 C665 2013 f<br/>Edition 2nd ed.<br/>Publisher Morgan Kaufmann, an imprint of Elsevier,<br/>Publication Date 2013<br/>ISBN 9780123943972<br/>Security basics for computer architectsent://SD_ILS/0/SD_ILS:8359122024-04-26T21:41:18Z2024-04-26T21:41:18Zby Lee, Ruby B., author<br/>Author Lee, Ruby B., author<br/>Format: Books<br/>Call Number QA76.9.A73 L444 2013<br/>Publisher Morgan & Claypool Publishers,<br/>Publication Date 2013<br/>ISBN 9781627051552<br/>Computer security : protecting digital resourcesent://SD_ILS/0/SD_ILS:3746692024-04-26T21:41:18Z2024-04-26T21:41:18Zby Newman, Robert C.<br/>Author Newman, Robert C.<br/>Format: Books<br/>Call Number QA76.9.D314 N48 2010<br/>Publisher Jones & Bartlett Publishers,<br/>Publication Date 2010<br/>ISBN 9780763759940<br/>Collaborative computer security and trust managementent://SD_ILS/0/SD_ILS:6319942024-04-26T21:41:18Z2024-04-26T21:41:18Zby Seigneur, Jean-Marc<br/>Author Seigneur, Jean-Marc, Slagell, Adam, 1977-<br/>Format: Books<br/>Call Number QA76.9.A25 C656 2010 f<br/>Publisher Information Science Reference,<br/>Publication Date 2010<br/>ISBN 9781605664149 9781605664156<br/>Advanced computer network and securityent://SD_ILS/0/SD_ILS:3427002024-04-26T21:41:18Z2024-04-26T21:41:18Zby Mohd. Aizaini Maarof<br/>Author Mohd. Aizaini Maarof, Muhammad Shafie Abd. Latiff, Subariah Ibrahim, Shukor Abd. Razak, Ali Selamat<br/>Format: Books<br/>Call Number TK5105.5 A39 2008 a<br/>Publisher Penerbit Universiti Teknologi Malaysia,<br/>Publication Date 2008<br/>ISBN 9789835206139<br/>Simple computer security : disinfect your PCent://SD_ILS/0/SD_ILS:1709522024-04-26T21:41:18Z2024-04-26T21:41:18Zby Geier, Eric, 1984-<br/>Author Geier, Eric, 1984-, Geier, James T.<br/>Format: Books<br/>Call Number QA76.9.A25 G44 2007<br/>Publisher Wiley Publishing,<br/>Publication Date 2007<br/>ISBN 9780470068540<br/>Enhancing computer security with smart technologyent://SD_ILS/0/SD_ILS:4805762024-04-26T21:41:18Z2024-04-26T21:41:18Zby Vemuri, V. Rao<br/>Author Vemuri, V. Rao<br/>Format: Books<br/>Call Number TK5105.59 E53 2005<br/>Publisher Auerbach Pablications,<br/>Publication Date 2006<br/>ISBN 9780849330452<br/>Statistical methods in computer securityent://SD_ILS/0/SD_ILS:4240522024-04-26T21:41:18Z2024-04-26T21:41:18Zby Chen, William W. S.<br/>Author Chen, William W. S.<br/>Format: Books<br/>Call Number QA76.9.A25 S74 2005<br/>Publisher Marcel Dekker,<br/>Publication Date 2005<br/>ISBN 9780824759391<br/>Corporate computer and network securityent://SD_ILS/0/SD_ILS:3867712024-04-26T21:41:18Z2024-04-26T21:41:18Zby Panko, Raymond R.<br/>Author Panko, Raymond R.<br/>Format: Books<br/>Call Number QA76.9.A25 P36 2004<br/>Publisher Pearson/Prentice Hall,<br/>Publication Date 2004<br/>ISBN 9780130384713<br/>Computer system and network securityent://SD_ILS/0/SD_ILS:3662842024-04-26T21:41:18Z2024-04-26T21:41:18Zby White, Gregory B.<br/>Author White, Gregory B., Fisch, Eric A., Pooch, Udo W., 1944-<br/>Format: Books<br/>Call Number QA76.9.A25 W44 1996<br/>Publisher CRC Press,<br/>Publication Date 1996<br/>ISBN 9780849371790<br/>Fundamentals of computer security technologyent://SD_ILS/0/SD_ILS:3885192024-04-26T21:41:18Z2024-04-26T21:41:18Zby Amoroso, Edward G.<br/>Author Amoroso, Edward G.<br/>Format: Books<br/>Call Number QA76.9.A25 A46 1994<br/>Publisher Prentice Hall,<br/>Publication Date 1994<br/>ISBN 9780133055412<br/>Computer audit, control and securityent://SD_ILS/0/SD_ILS:1296882024-04-26T21:41:18Z2024-04-26T21:41:18Zby Moeller, Robert R.<br/>Author Moeller, Robert R.<br/>Format: Books<br/>Call Number QA76.9.A93 M63 1989<br/>Publisher Wiley,<br/>Publication Date 1989<br/>ISBN 9780471853107<br/>Computer audit, control and securityent://SD_ILS/0/SD_ILS:1297942024-04-26T21:41:18Z2024-04-26T21:41:18Zby Moeller, Robert R.<br/>Author Moeller, Robert R.<br/>Format: Books<br/>Call Number DSK 376<br/>Publisher Wiley,<br/>Publication Date 1989<br/>Cryptography : an introduction to computer securityent://SD_ILS/0/SD_ILS:4423852024-04-26T21:41:18Z2024-04-26T21:41:18Zby Seberry, Jennifer<br/>Author Seberry, Jennifer, Pieprzyk, Josef<br/>Format: Books<br/>Call Number QA76.9.A25 S37 1989<br/>Publisher Prentice Hall,<br/>Publication Date 1989<br/>ISBN 9780724802746 9780131949867<br/>Tutorial : computer and network securityent://SD_ILS/0/SD_ILS:1711442024-04-26T21:41:18Z2024-04-26T21:41:18Zby Abrams, Marshall D.<br/>Author Abrams, Marshall D., Podell, Harold J.<br/>Format: Books<br/>Call Number QA76.9.A25 A27 1987 f<br/>Publisher IEEE Computer Society,<br/>Publication Date 1987<br/>ISBN 9780818607561<br/>Guidelines for physical computer securityent://SD_ILS/0/SD_ILS:1639442024-04-26T21:41:18Z2024-04-26T21:41:18Zby Wood, Michael B.<br/>Author Wood, Michael B.<br/>Format: Books<br/>Call Number HF5548.2 .W663 1986<br/>Publisher NCC Pub.,<br/>Publication Date 1986<br/>ISBN 9780850125818<br/>Security of computer based information systemsent://SD_ILS/0/SD_ILS:1810032024-04-26T21:41:18Z2024-04-26T21:41:18Zby Lane, V. P.<br/>Author Lane, V. P.<br/>Format: Books<br/>Call Number HF5548.2.L35 1985<br/>Publisher Macmillan Education,<br/>Publication Date 1985<br/>ISBN 9780333364369<br/>Security of computer based information systemsent://SD_ILS/0/SD_ILS:951202024-04-26T21:41:18Z2024-04-26T21:41:18Zby Lane, V. P.<br/>Author Lane, V. P.<br/>Format: Books<br/>Call Number HF5548.2.L35 1985<br/>Publisher MacMillan Education,<br/>Publication Date 1985<br/>Management handbook of computer securityent://SD_ILS/0/SD_ILS:3525922024-04-26T21:41:18Z2024-04-26T21:41:18Zby Waring, Leslie Philip<br/>Author Waring, Leslie Philip<br/>Format: Books<br/>Call Number HF5548.2.W36 1978<br/>Publisher N C C,<br/>Publication Date 1978<br/>ISBN 9780850121858<br/>Computer security and integrity : proceedingsent://SD_ILS/0/SD_ILS:3567672024-04-26T21:41:18Z2024-04-26T21:41:18Zby Symposium on Trends and Applications (1977 : Maryland)<br/>Author Symposium on Trends and Applications (1977 : Maryland), Institute of Electrical and Electronics Engineers. Computer Society<br/>Format: Books<br/>Call Number TK7885.A1 S98 1977 f<br/>Publisher IEEE,<br/>Publication Date 1977<br/>Data base and computer systems securityent://SD_ILS/0/SD_ILS:2985402024-04-26T21:41:18Z2024-04-26T21:41:18Zby Carroll, John Millar, 1950-<br/>Author Carroll, John Millar, 1950-<br/>Format: Books<br/>Call Number QA76.9. D3 D37 1976 f<br/>Publisher Q.E.D. Information Sciences,<br/>Publication Date 1976<br/>ISBN 9780894350023<br/>Security procedures for computer systemsent://SD_ILS/0/SD_ILS:2466552024-04-26T21:41:18Z2024-04-26T21:41:18Zby Hemphill, Charles F.<br/>Author Hemphill, Charles F., Hemphill, John M.<br/>Format: Books<br/>Call Number HF5548.2.H44 1973<br/>Publisher Dow-Jones-Irwin,<br/>Publication Date 1973<br/>ISBN 9780870940583<br/>Computer security in an educational environmentent://SD_ILS/0/SD_ILS:2730482024-04-26T21:41:18Z2024-04-26T21:41:18Zby Summers, Wayne C.<br/>Author Summers, Wayne C., Institut Teknologi Malaysia. Pusat Pendidikan Persediaan<br/>Format: Books<br/>Call Number MAK 9456<br/>Computer Security : A Hands-on Approachent://SD_ILS/0/SD_ILS:8796062024-04-26T21:41:18Z2024-04-26T21:41:18Zby Du, Wenliang, author<br/>Author Du, Wenliang, author<br/>Format: Books<br/>Call Number QA76.9.A25 D89 2017<br/>ISBN 9781548367947<br/>Computer security, auditing and controlsent://SD_ILS/0/SD_ILS:5468572024-04-26T21:41:18Z2024-04-26T21:41:18ZFormat: Continuing Resources<br/>Call Number TK7885.A1 C63 12-14no1-2(1985-87)<br/>Publisher Management Advisory,<br/>Publication Date 2020 2019 2018 2017 2016<br/>ISSN 07384262<br/>Emerald : information management and computer securityent://SD_ILS/0/SD_ILS:5590192024-04-26T21:41:18Z2024-04-26T21:41:18ZFormat: Continuing Resources<br/>Call Number CP 174 CD-ROM archive 1993-1995 j1<br/>Publisher MCB University Press,<br/>Publication Date 1996<br/>Management handbook of computer securityent://SD_ILS/0/SD_ILS:3783082024-04-26T21:41:18Z2024-04-26T21:41:18ZFormat: Books<br/>Call Number HF5548.2 .W36 1978 f<br/>Systems security : the key to computer integrityent://SD_ILS/0/SD_ILS:2622992024-04-26T21:41:18Z2024-04-26T21:41:18Zby European Computer Systems Security Forum (1984)<br/>Author European Computer Systems Security Forum (1984)<br/>Format: Books<br/>Call Number HF5548.2.E97 1984<br/>Publisher Online,<br/>Publication Date 1984<br/>ISBN 9780863530180<br/>ISSUES IN COMPUTER SECURITY & NETWORKING. PART 2ent://SD_ILS/0/SD_ILS:8641122024-04-26T21:41:18Z2024-04-26T21:41:18Zby Mazleena Salleh, editor<br/>Author Mazleena Salleh, editor, Hassan Chizari, 1975-, editor, Abdul Hanan Abdullah, contributor, Behnam Dezfouli, 1982-, contributor, Kamalrulnizam Abu Bakar, contributor<br/>Format: Books<br/>Call Number QA76.9.A25 I877 2015 a<br/>Publication Date 2015<br/>ISBN 9789835209543<br/>Computer security in the age of informationent://SD_ILS/0/SD_ILS:2662192024-04-26T21:41:18Z2024-04-26T21:41:18Zby IFIP International Conference on Computer Security (5th : 1988 : Gold Coast, Queensland)<br/>Author IFIP International Conference on Computer Security (5th : 1988 : Gold Coast, Queensland), Caelli, William, International Federation for Information Processing<br/>Format: Books<br/>Call Number QA76.9.A25 I35 1988<br/>Publisher North-Holland,<br/>Publication Date 1989<br/>ISBN 9780444883247<br/>Where next for computer security? : a reportent://SD_ILS/0/SD_ILS:2443622024-04-26T21:41:18Z2024-04-26T21:41:18Zby National Computing Centre Limited National Study of Group on the Security of Computer-based Systems<br/>Author National Computing Centre Limited National Study of Group on the Security of Computer-based Systems<br/>Format: Books<br/>Call Number HF5548.2.N38 1974<br/>Publisher Manchester,<br/>Publication Date 1974<br/>ISBN 9780850121230<br/>Human factor computer security awareness conceptual frameworkent://SD_ILS/0/SD_ILS:7782652024-04-26T21:41:18Z2024-04-26T21:41:18Zby Nasrin Badie, 1982-<br/>Author Nasrin Badie, 1982-<br/>Format: Books<br/>Call Number CP 027518 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Human factor computer security awareness conceptual frameworkent://SD_ILS/0/SD_ILS:7782632024-04-26T21:41:18Z2024-04-26T21:41:18Zby Nasrin Badie, 1982-<br/>Author Nasrin Badie, 1982-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A28 N37 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>High security remote control switching for computerent://SD_ILS/0/SD_ILS:1983842024-04-26T21:41:18Z2024-04-26T21:41:18Zby Khairul Anuar Mohamed Ayoob<br/>Author Khairul Anuar Mohamed Ayoob, Abd. Jaafar Shafie, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number TK7881.2 K43 2007 raf<br/>Publication Date 2007<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2007<br/>Security of e-systems and computer networksent://SD_ILS/0/SD_ILS:2107662024-04-26T21:41:18Z2024-04-26T21:41:18Zby Obaidat, Mohammad S. (Mohammad Salameh), 1952-<br/>Author Obaidat, Mohammad S. (Mohammad Salameh), 1952-, Boudriga, Noureddine<br/>Format: Books<br/>Call Number TK5105.59 O22 2007<br/>Publisher Cambridge University Press,<br/>Publication Date 2007<br/>ISBN 9780521837644<br/>High security remote control switching for computerent://SD_ILS/0/SD_ILS:5766452024-04-26T21:41:18Z2024-04-26T21:41:18Zby Khairul Anuar Mohamed Ayoob<br/>Author Khairul Anuar Mohamed Ayoob, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number CP 018781 ra<br/>Publication Date 2007<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2007<br/>Computer security assurance using the common criteriaent://SD_ILS/0/SD_ILS:4511722024-04-26T21:41:18Z2024-04-26T21:41:18Zby Merkow, Mark S.<br/>Author Merkow, Mark S., Breithaupt, Jim<br/>Format: Books<br/>Call Number QA76.9.A25 M47 2004<br/>Publisher Thomson Delmar Learning,<br/>Publication Date 2005<br/>ISBN 9781401862657<br/>Principles of computer security security and beyondent://SD_ILS/0/SD_ILS:6115992024-04-26T21:41:18Z2024-04-26T21:41:18Zby Conklin, Wm. Arthur<br/>Author Conklin, Wm. Arthur<br/>Format: Computer file<br/>Call Number CP 6460<br/>Publisher McGraw-Hill,<br/>Publication Date 2004<br/>ISBN 9780072256444<br/>Principles of computer security : security and beyondent://SD_ILS/0/SD_ILS:4241192024-04-26T21:41:18Z2024-04-26T21:41:18Zby Conklin, Wm. Arthur<br/>Author Conklin, Wm. Arthur<br/>Format: Books<br/>Call Number QA76.9.A25 P74 2004<br/>Publisher McGraw-Hill,<br/>Publication Date 2004<br/>ISBN 9780072255096<br/>Computer security basics =Konpyūta sekyuriti no kisoent://SD_ILS/0/SD_ILS:8250542024-04-26T21:41:18Z2024-04-26T21:41:18Zby Russell, Deborah<br/>Author Russell, Deborah, Gangemi, Sr. G. T., Yamaguchi, Suguru<br/>Format: Books<br/>Call Number QA76.9.A25 R87 1994<br/>Publisher Asuki,<br/>Publication Date 1994<br/>ISBN 9784756102997<br/>Computer auditing, security and internal control manualent://SD_ILS/0/SD_ILS:4506502024-04-26T21:41:18Z2024-04-26T21:41:18Zby Kuong, Javier F.<br/>Author Kuong, Javier F.<br/>Format: Books<br/>Call Number QA76.9.A25 K86 1987<br/>Publisher Prentice-Hall,<br/>Publication Date 1987<br/>ISBN 9780131629677<br/>Modern methods for computer security and privacyent://SD_ILS/0/SD_ILS:4637312024-04-26T21:41:18Z2024-04-26T21:41:18Zby Hoffman, Lance J.<br/>Author Hoffman, Lance J.<br/>Format: Books<br/>Call Number QA76.9.A25 H63 1977<br/>Publisher Prentice-Hall,<br/>Publication Date 1977<br/>ISBN 9780135952078<br/>Security, accuracy, and privacy in computer systemsent://SD_ILS/0/SD_ILS:2466652024-04-26T21:41:18Z2024-04-26T21:41:18Zby Martin, James, 1933-<br/>Author Martin, James, 1933-<br/>Format: Books<br/>Call Number HF5548.2 .M34<br/>Publisher Prentice-Hall,<br/>Publication Date 1973<br/>ISBN 9780137989911<br/>Computer Security - ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007: Proceedingsent://SD_ILS/0/SD_ILS:6268292024-04-26T21:41:18Z2024-04-26T21:41:18Zby European Symposium on Research in Computer Security (12th : 2007 : Dresden, Germany)<br/>Author European Symposium on Research in Computer Security (12th : 2007 : Dresden, Germany), Biskup, Joachim, Lopez, Javier., SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001353<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540748359<br/><a href="http://dx.doi.org/10.1007/978-3-540-74835-9">http://dx.doi.org/10.1007/978-3-540-74835-9</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Computer Network Security Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2007, St. Petersburg, Russia, September 13-15, 2007. Proceedings.ent://SD_ILS/0/SD_ILS:5174982024-04-26T21:41:18Z2024-04-26T21:41:18Zby International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security $n(4th :$d2007 :$cSaint Petersburg, Russia)<br/>Author International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security $n(4th :$d2007 :$cSaint Petersburg, Russia), Gorodetsky, Vladimir, Kotenko, Igor, Skormin, Victor A., SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001125<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540739869 9783540739852<br/><a href="http://dx.doi.org/10.1007/978-3-540-73986-9">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Fourth Aerospace Computer Security Applications Conference : Orlando, Florida, December 12-16, 1988ent://SD_ILS/0/SD_ILS:2366272024-04-26T21:41:18Z2024-04-26T21:41:18Zby Aerospace Computer Security Applications Conference (4th : 1988 : Orlando, Fla.)<br/>Author Aerospace Computer Security Applications Conference (4th : 1988 : Orlando, Fla.)<br/>Format: Books<br/>Call Number QA76.9.A25 A39 1988<br/>Publisher Computer Society Press,<br/>Publication Date 1988<br/>ISBN 9780818608957<br/>Computer security : the practical issues in a troubled worldent://SD_ILS/0/SD_ILS:1801142024-04-26T21:41:18Z2024-04-26T21:41:18Zby IFIP International Coonference on Computer Security (3rd : 1985 : Dublin, Ireland)<br/>Author IFIP International Coonference on Computer Security (3rd : 1985 : Dublin, Ireland), Grimson, Jane B., Kugler, Hans Jurgen<br/>Format: Books<br/>Call Number QA76.5 I585 1985<br/>Publisher Elsevier Sc Pub,<br/>Publication Date 1985<br/>Computer and Cyber Security : Principles, Algorithm, Applications, and Perspectivesent://SD_ILS/0/SD_ILS:8823242024-04-26T21:41:18Z2024-04-26T21:41:18Zby Gupta, Brij, Dr., 1982-, editor<br/>Author Gupta, Brij, Dr., 1982-, editor, Agrawal, Dharma P., Dr., editor, Wang, Haoxiang, Dr., editor<br/>Format: Books<br/>Call Number QA76.9.A25 C668 2019<br/>Publication Date 2019<br/>ISBN 9780815371335<br/>Machine Learning for Computer and Cyber Security : Principles, Algorithms, and Practicesent://SD_ILS/0/SD_ILS:8822682024-04-26T21:41:18Z2024-04-26T21:41:18Zby Gupta, Brij, 1982-, editor<br/>Author Gupta, Brij, 1982-, editor, Sheng, Quan Z., editor<br/>Format: Books<br/>Call Number TK5105.5 M335 2019<br/>Publication Date 2019<br/>ISBN 9781138587304<br/>Introduction to computer and network security : navigating shades of grayent://SD_ILS/0/SD_ILS:8052892024-04-26T21:41:18Z2024-04-26T21:41:18Zby Brooks, Richard R.<br/>Author Brooks, Richard R.<br/>Format: Books<br/>Call Number QA76.9.A25 B76 2014<br/>Publisher Chapman and Hall/CRC,<br/>Publication Date 2014 2013<br/>ISBN 9781439860717<br/>Computer security literacy : staying safe in a digital worldent://SD_ILS/0/SD_ILS:8372152024-04-26T21:41:18Z2024-04-26T21:41:18Zby Jacobson, Douglas, author<br/>Author Jacobson, Douglas, author, Idziorek, Joseph, author<br/>Format: Books<br/>Call Number QA76.9.A25 J334 2013<br/>Publisher CRC Press / Taylor & Francis Group,<br/>Publication Date 2013<br/>ISBN 9781439856185<br/>Encyclopaedia of cyber law and computer security : measures , controls & practicesent://SD_ILS/0/SD_ILS:8140482024-04-26T21:41:18Z2024-04-26T21:41:18Zby Moore, Paul., editor<br/>Author Moore, Paul., editor<br/>Format: Books<br/>Call Number TK7885.A2 E53 2012 re v.1<br/>Publisher Nyx Academics,<br/>Publication Date 2012<br/>ISBN 9781621580003<br/>Issues in computer security and networking : part 1ent://SD_ILS/0/SD_ILS:8113802024-04-26T21:41:18Z2024-04-26T21:41:18Zby Muhalim Mohamed Amin author<br/>Author Muhalim Mohamed Amin author, Subariah Ibrahim author, Hazinah Kutty Mammi author, Ku, Peter Soo Lin author, Nurul Badriah Abu Bakar author<br/>Format: Books<br/>Call Number QA76.9.A25 I87 2012 a<br/>Edition First edition<br/>Publisher Penerbit Universiti Teknologi Malaysia,<br/>Publication Date 2012<br/>ISBN 9789835209055<br/>Analyzing computer security : a threat/vulnerability/countermeasure approachent://SD_ILS/0/SD_ILS:7800022024-04-26T21:41:18Z2024-04-26T21:41:18Zby Pfleeger, Charles P., 1948-<br/>Author Pfleeger, Charles P., 1948-, Pfleeger, Shari Lawrence<br/>Format: Books<br/>Call Number QA76.9.A25 P45 2012<br/>Publisher Prentice Hall,<br/>Publication Date 2012<br/>ISBN 9780132789462<br/>Evaluation of user's behaviours handling computer security incident in financial institution in Klang Valleyent://SD_ILS/0/SD_ILS:8402902024-04-26T21:41:18Z2024-04-26T21:41:18Zby Nor Hidayah Mohd Jawawi<br/>Author Nor Hidayah Mohd Jawawi<br/>Format: Books<br/>Call Number CP 033975 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Evaluation of user's behaviours handling computer security incident in financial institution in Klang Valleyent://SD_ILS/0/SD_ILS:8402892024-04-26T21:41:18Z2024-04-26T21:41:18Zby Nor Hidayah Mohd Jawawi<br/>Author Nor Hidayah Mohd Jawawi, Zuraini binti Ismail, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 N678 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Securing the cloud : cloud computer security techniques and tacticsent://SD_ILS/0/SD_ILS:7488172024-04-26T21:41:18Z2024-04-26T21:41:18Zby Winkler, J. R. (Joachim R.)<br/>Author Winkler, J. R. (Joachim R.)<br/>Format: Books<br/>Call Number QA76.585 W56 2011<br/>Publisher Elsevier,<br/>Publication Date 2011<br/>ISBN 9781597495929<br/>The Stuxnet Computer Worm and industrial control system securityent://SD_ILS/0/SD_ILS:7989462024-04-26T21:41:18Z2024-04-26T21:41:18Zby Rebane, Jackson C.<br/>Author Rebane, Jackson C.<br/>Format: Books<br/>Call Number TS156.8 S78 2011<br/>Publisher Nova Science Publisher’s, Inc.,<br/>Publication Date 2011<br/>ISBN 9781612099859<br/>Analysis issues of computer network security management for disposable dishes companies in Iranent://SD_ILS/0/SD_ILS:8378852024-04-26T21:41:18Z2024-04-26T21:41:18Zby Fatemeh Honarjoo<br/>Author Fatemeh Honarjoo<br/>Format: Books<br/>Call Number CP 034161 ra<br/>Publication Date 2011<br/>Thesis (Sarjana Sains (Pengurusan Teknologi Maklumat)) - Universiti Teknologi Malaysia, 2011<br/>Analysis issues of computer network security management for disposable dishes companies in Iranent://SD_ILS/0/SD_ILS:8378842024-04-26T21:41:18Z2024-04-26T21:41:18Zby Fatemeh Honarjoo<br/>Author Fatemeh Honarjoo, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 F38 2011 raf<br/>Publication Date 2011<br/>Thesis (Sarjana Sains (Pengurusan Teknologi Maklumat)) - Universiti Teknologi Malaysia, 2011<br/>Principles of computer security : CompTIA security+ and beyondent://SD_ILS/0/SD_ILS:6434452024-04-26T21:41:18Z2024-04-26T21:41:18Zby Conklin, Wm. Arthur (William Arthur)<br/>Author Conklin, Wm. Arthur (William Arthur)<br/>Format: Books<br/>Call Number QA76.3 P75 2010 f<br/>Edition 2nd ed.<br/>Publisher McGraw-Hill,<br/>Publication Date 2010<br/>ISBN 9780071633758<br/>Principles of computer security CompTIA security+ and beyondent://SD_ILS/0/SD_ILS:7957752024-04-26T21:41:18Z2024-04-26T21:41:18Zby Conklin, Wm. Arthur (William Arthur)<br/>Author Conklin, Wm. Arthur (William Arthur)<br/>Format: Books<br/>Call Number CP 028414<br/>Edition 2nd ed.<br/>Publisher McGraw-Hill,<br/>Publication Date 2010<br/>ISBN 9780071633789<br/>Principles of computer security: CompTIA security+ and beyondent://SD_ILS/0/SD_ILS:8359612024-04-26T21:41:18Z2024-04-26T21:41:18Zby Conklin, Wm. Arthur (William Arthur)<br/>Author Conklin, Wm. Arthur (William Arthur)<br/>Format: Books<br/>Call Number CP 033498<br/>Edition 2nd ed.<br/>Publisher McGraw-Hill Osborne Media,<br/>Publication Date 2010<br/>ISBN 9780071633758<br/>Enhancing information security awareness and computer ethics for non-information technology company using integrated modelent://SD_ILS/0/SD_ILS:3966272024-04-26T21:41:18Z2024-04-26T21:41:18Zby Mohd. Eyzuan Zainudin, 1975-<br/>Author Mohd. Eyzuan Zainudin, 1975-, Zuraini Ismail, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M494 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Development of computer ethical framework for information security (education context)ent://SD_ILS/0/SD_ILS:5905882024-04-26T21:41:18Z2024-04-26T21:41:18Zby Meysam Namayandeh, 1981-<br/>Author Meysam Namayandeh, 1981-, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 019836 ra<br/>Publication Date 2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/>Comprehensive analysis on the influences of computer ethics on information securityent://SD_ILS/0/SD_ILS:5905912024-04-26T21:41:18Z2024-04-26T21:41:18Zby Fiza Abdul Rahim, 1983-<br/>Author Fiza Abdul Rahim, 1983-, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 017321 ra<br/>Publication Date 2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/>Comprehensive analysis on the influences of computer ethics on information securityent://SD_ILS/0/SD_ILS:3225632024-04-26T21:41:18Z2024-04-26T21:41:18Zby Fiza Abdul Rahim, 1983-<br/>Author Fiza Abdul Rahim, 1983-, Zuraini Ismail, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.D314 F59 2009 raf<br/>Publication Date 2009<br/><a href="http://eprints.utm.my/5324">Full text thesis via UTM-IR</a><br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/>Development of computer ethical framework for information security (educational context)ent://SD_ILS/0/SD_ILS:3225542024-04-26T21:41:18Z2024-04-26T21:41:18Zby Meysam Namayandeh, 1981-<br/>Author Meysam Namayandeh, 1981-, Maslin Masrom, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number HD30.2 M494 2009 raf<br/>Publication Date 2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/>Visualization for computer security : 5th International Workshop, VizSec 2008, Cambridge, MA, USA, September 15, 2008, Proceedingsent://SD_ILS/0/SD_ILS:2929442024-04-26T21:41:18Z2024-04-26T21:41:18Zby VizSec 2008 2008 : Cambridge, Mass.)<br/>Author VizSec 2008 2008 : Cambridge, Mass.), Goodall, John R., Conti, Greg, Ma, Kwan-liu<br/>Format: Books<br/>Call Number QA76.9.A25 V59 2008<br/>Publisher Springer,<br/>Publication Date 2008<br/>ISBN 9783540859314<br/>Hardware-based computer security : from biometrics to quantum cryptographyent://SD_ILS/0/SD_ILS:2900712024-04-26T21:41:18Z2024-04-26T21:41:18Zby Dube, Roger R.<br/>Author Dube, Roger R.<br/>Format: Books<br/>Call Number QA76.9.A25 D82 2008<br/>Publisher Wiley,<br/>Publication Date 2008<br/>ISBN 9780470193396<br/>Computer Safety, Reliability, and Security 26th International Conference, SAFECOMP 2007, Nuremberg, Germany, September 18-21, 2007: Proceedingsent://SD_ILS/0/SD_ILS:6282012024-04-26T21:41:18Z2024-04-26T21:41:18Zby SAFECOMP 2007 (2007 : Nuremberg, Germany)<br/>Author SAFECOMP 2007 (2007 : Nuremberg, Germany), Saglietti, Francesca, Oster, Norbert, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001370<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540751014<br/><a href="http://dx.doi.org/10.1007/978-3-540-75101-4">http://dx.doi.org/10.1007/978-3-540-75101-4</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007: Proceedingsent://SD_ILS/0/SD_ILS:5167122024-04-26T21:41:18Z2024-04-26T21:41:18Zby International Workshop on Security (2nd : 2007 : Nara-shi, Japan)<br/>Author International Workshop on Security (2nd : 2007 : Nara-shi, Japan), Miyaji, Atsuko, Kikuchi, Hiroaki, Rannenberg, Kai, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000582<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540756514<br/><a href="http://dx.doi.org/10.1007/978-3-540-75651-4">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Computer system security : basic concepts and solved exercisesent://SD_ILS/0/SD_ILS:3283722024-04-26T21:41:18Z2024-04-26T21:41:18Zby Avoine, Gildas<br/>Author Avoine, Gildas, Junod, Pascal, Oechslin, Philippe<br/>Format: Books<br/>Call Number QA76.9.A25 A96 2004<br/>Publisher EFPL Press,<br/>Publication Date 2007<br/>ISBN 9781420046205<br/>Advances in computer science--ASIAN 2007 computer and network security : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5175492024-04-26T21:41:18Z2024-04-26T21:41:18Zby Asian Computing Science Conference (12th : 2007 : Daw?{rcub}hah, Qatar)<br/>Author Asian Computing Science Conference (12th : 2007 : Daw?{rcub}hah, Qatar), Cervesato, Iliano, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000522<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540769293 9783540769279<br/><a href="http://dx.doi.org/10.1007/978-3-540-76929-3">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Biometrics, computer security systems and artificial intelligence applicationsent://SD_ILS/0/SD_ILS:1912802024-04-26T21:41:18Z2024-04-26T21:41:18Zby Saeed, Khalid<br/>Author Saeed, Khalid, Pejas, Jerzy, 1954-, Mosdorf, Romuald<br/>Format: Books<br/>Call Number QA76.9.A25 B56 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9780387362328<br/>Minoli-Cordovana's authoritative computer & network security dictionaryent://SD_ILS/0/SD_ILS:1379022024-04-26T21:41:18Z2024-04-26T21:41:18Zby Minoli, Daniel, 1952-<br/>Author Minoli, Daniel, 1952-, Cordovana, James, 1973-<br/>Format: Books<br/>Call Number QA76.9.A25 M565 2006<br/>Publisher Wiley-Interscience,<br/>Publication Date 2006<br/>ISBN 9780471782636<br/>Advances in information and computer security : first International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006 : proceedingsent://SD_ILS/0/SD_ILS:1422202024-04-26T21:41:18Z2024-04-26T21:41:18Zby International Workshop on Security (1st : 2006 : Kyoto, Japan)<br/>Author International Workshop on Security (1st : 2006 : Kyoto, Japan), Yoshiura, Hiroshi<br/>Format: Books<br/>Call Number QA76.9.A25 I575 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9783540476993<br/>Network control and engineering for QoS, security and mobility, V : IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20-25, 2006, Santiago, Chileent://SD_ILS/0/SD_ILS:1163862024-04-26T21:41:18Z2024-04-26T21:41:18Zby IFIP International Conference on Network Control and Engineering for QoS, Security, and Mobility (5th : 2006 : Santiago, Chile)<br/>Author IFIP International Conference on Network Control and Engineering for QoS, Security, and Mobility (5th : 2006 : Santiago, Chile), Gaiti, Dominique, IFIP World Computer Congress (19th : 2006 : Santiago, Chile)<br/>Format: Books<br/>Call Number TK5105.5 I34 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9780387348254<br/>Designing security framework for computer science Faculty of Al - Qassim Universityent://SD_ILS/0/SD_ILS:1316762024-04-26T21:41:18Z2024-04-26T21:41:18Zby Habeeb Saleh Alhabeeb<br/>Author Habeeb Saleh Alhabeeb<br/>Format: Books<br/>Call Number QA76.9.A25 H32 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2006<br/>Designing security framework for computer science Faculty of Al - Qassim Universityent://SD_ILS/0/SD_ILS:7838742024-04-26T21:41:18Z2024-04-26T21:41:18Zby Fakulti Sains Komputer dan Sistem Maklumat<br/>Author Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number XX(783874.1)<br/>Publication Date 2006<br/>Thesis (Sarjana) - Universiti Teknologi Malaysia, 2006<br/>Machine learning and data mining for computer security : methods and applicationsent://SD_ILS/0/SD_ILS:4705192024-04-26T21:41:18Z2024-04-26T21:41:18Zby Maloof , Marcus A.<br/>Author Maloof , Marcus A.<br/>Format: Books<br/>Call Number QA76.9.A25 M34 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9781846280290<br/>Defeating the hacker : a non-technical guide to computer securityent://SD_ILS/0/SD_ILS:2867832024-04-26T21:41:18Z2024-04-26T21:41:18Zby Schifreen, Robert<br/>Author Schifreen, Robert<br/>Format: Books<br/>Call Number QA76.9.A25 S335 2006<br/>Publisher John Wiley & Sons,<br/>Publication Date 2006<br/>ISBN 9780470025550<br/>Risk management for computer security : Protecting your network and information assetsent://SD_ILS/0/SD_ILS:1045702024-04-26T21:41:18Z2024-04-26T21:41:18Zby Jones, Andy, 1952-<br/>Author Jones, Andy, 1952-, Ashenden, Debi<br/>Format: Books<br/>Call Number T55 J66 2005<br/>Publisher Elsevier Butterworth-Heinemann,<br/>Publication Date 2005<br/>ISBN 9780750677950<br/>Real digital forensics : computer security and incident responseent://SD_ILS/0/SD_ILS:4704502024-04-26T21:41:18Z2024-04-26T21:41:18Zby Jones, Keith J. (Keith John)<br/>Author Jones, Keith J. (Keith John), Bejtlich, Richard, Rose, Curtis W.<br/>Format: Books<br/>Call Number HV8079.C65 J66 2005<br/>Publisher Addison-Wesley,<br/>Publication Date 2005<br/>ISBN 9780321240699<br/>Computer security : 20 things every employee should knowent://SD_ILS/0/SD_ILS:4671172024-04-26T21:41:18Z2024-04-26T21:41:18Zby Rothke, Ben<br/>Author Rothke, Ben<br/>Format: Books<br/>Call Number HF5548.37 R67 2005<br/>Edition 2nd ed.<br/>Publisher McGraw-Hill,<br/>Publication Date 2005<br/>ISBN 9780072262827<br/>Computer security : 20 things every employee should knowent://SD_ILS/0/SD_ILS:3632972024-04-26T21:41:18Z2024-04-26T21:41:18Zby Rothke, Ben<br/>Author Rothke, Ben<br/>Format: Books<br/>Call Number HF5548.37 R67 2004<br/>Publisher McGraw-Hill Osborne,<br/>Publication Date 2004<br/>ISBN 9780072230833<br/>Certification and security in e-services : from e-government to e-business : IFIP 17th World Computer Congress, TC11 stream on security in e-services, August 26-29, 2002, Montr�eal, Qu�ebec, Canadaent://SD_ILS/0/SD_ILS:3486792024-04-26T21:41:18Z2024-04-26T21:41:18Zby IFIP World Computer Congress (17th : 2002 : Montreal, Quebec)<br/>Author IFIP World Computer Congress (17th : 2002 : Montreal, Quebec), Nardelli, Enrico, Posadziejewski, Sabina, Talamo, Maurizio<br/>Format: Books<br/>Call Number QA76.9.A25 I36 2003<br/>Publisher Kluwer Academic Pubs,<br/>Publication Date 2003<br/>ISBN 9781402074936<br/>Integrating security services into computer supported cooperative workent://SD_ILS/0/SD_ILS:1217262024-04-26T21:41:18Z2024-04-26T21:41:18Zby Mohd. Aizaini Maarof<br/>Author Mohd. Aizaini Maarof<br/>Format: Books<br/>Call Number TK5105.59 M34 2000 raf<br/>Publisher Aston University,<br/>Publication Date 2000<br/>Thesis (Doctor of Philosophy) - Aston University, 2000<br/>Mengkaji perlakuan peralatan voltan tinggi bagi sistem bekalan elektrik di Kampus UTM, Skudai, Johor; Prosedur dalaman penentukuran penjana voltan tinggi arus terus dan arus ulangalik institut voltan dan arus tinggi Fakulti Kejuruteraan Elektrik; Security analysis using power software (etc. ERACS and CYMES); Kesan voltan pusuan pensuisan terhadap peralatan perlindungan sistem kuasa; Computer aided design for the measurement of impulse generator parametersent://SD_ILS/0/SD_ILS:76072024-04-26T21:41:18Z2024-04-26T21:41:18Zby Ahmad Fuad Md. Kasim<br/>Author Ahmad Fuad Md. Kasim, Azlan Mohd. Anwar, Mohd. Radhi Hamzah, Mohd. Rizal Ramlan, Rudzaba Mohd Jidin<br/>Format: Visual Materials<br/>Call Number MFL 8899 ra<br/>Publisher UTM,<br/>Publication Date 1996<br/>Kertas Projek (Sarjana Muda Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 1996<br/>Commonsense computer security : your practical guide to information protectionent://SD_ILS/0/SD_ILS:3511832024-04-26T21:41:18Z2024-04-26T21:41:18Zby Smith, Martin<br/>Author Smith, Martin<br/>Format: Books<br/>Call Number QA76.9.A25 S64 1993<br/>Edition 2nd ed<br/>Publisher McGraw-Hill,<br/>Publication Date 1993<br/>ISBN 9780077078058<br/>Internode router for hypercube parallel computer; Multiarchitecture back-end distribution processing task scheduling development; An investigationof an object-oriented design implementation of a speech recognition system based on N-tuple algorithm; Static stimulus testing; Smart employee identification card; Basic micropeocessor learning system; Micro controller based data logger; Security access system using smart cardent://SD_ILS/0/SD_ILS:3339832024-04-26T21:41:18Z2024-04-26T21:41:18Zby Chen, Yen Kuang<br/>Author Chen, Yen Kuang, Hussaini Nordin Ali, Mas'od Mustafa, Norhilal Hashim, Ong, Weng Hang<br/>Format: Books<br/>Call Number MFL 7920 ra<br/>Publisher UTM,<br/>Publication Date 1993<br/>Project paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1993<br/>Security for computer networks : an introduction to data security in teleprocessing and electronic funds transferent://SD_ILS/0/SD_ILS:1149892024-04-26T21:41:18Z2024-04-26T21:41:18Zby Davies, D. W.<br/>Author Davies, D. W., Price, W. L.<br/>Format: Books<br/>Call Number TK5105 D35 1989<br/>Edition 2nd ed.<br/>Publisher John Wiley & Sons,<br/>Publication Date 1989<br/>ISBN 9780471921370<br/>Computer and communications security : strategies for the 1990sent://SD_ILS/0/SD_ILS:4546272024-04-26T21:41:18Z2024-04-26T21:41:18Zby Cooper, James Arlin<br/>Author Cooper, James Arlin<br/>Format: Books<br/>Call Number QA76.9.A25 C67 1989<br/>Publisher McGraw-Hill,<br/>Publication Date 1989<br/>ISBN 9780070129269<br/>Auditing computer security : a manual with case studiesent://SD_ILS/0/SD_ILS:1048612024-04-26T21:41:18Z2024-04-26T21:41:18Zby Vallabhaneni, S. Rao<br/>Author Vallabhaneni, S. Rao<br/>Format: Books<br/>Call Number QA76.9.A25 V35 1989 f<br/>Publisher Wiley,<br/>Publication Date 1989<br/>ISBN 9780471626046<br/>Data & computer security : dictionary of standards, concepts and termsent://SD_ILS/0/SD_ILS:1909472024-04-26T21:41:18Z2024-04-26T21:41:18Zby Longley, Dennis<br/>Author Longley, Dennis, Shain, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 L67 1987 rd<br/>Publisher Stockton Pr,<br/>Publication Date 1987<br/>ISBN 9780333429358<br/>Foiling the systems breakers : computer security and access controlent://SD_ILS/0/SD_ILS:4603882024-04-26T21:41:18Z2024-04-26T21:41:18Zby Lobel, Jerome<br/>Author Lobel, Jerome<br/>Format: Books<br/>Call Number QA76.9.A25 L62 1986<br/>Publisher McGraw-Hill,<br/>Publication Date 1986<br/>ISBN 9780070383579<br/>Power supply filters and regulators; Computer assisted prediction of transient response; Load flow for distribution planning; Security sistem kuasa; Algebraic coding of signals; Kaji selidik mengenai gayalaku pecahtebat elektrik dalam hampagas; Model sistem untuk kawalan komputerent://SD_ILS/0/SD_ILS:1646032024-04-26T21:41:18Z2024-04-26T21:41:18Zby Muthelilan Murasu Nedumaran<br/>Author Muthelilan Murasu Nedumaran, Alias Hasan, Nik Azhari Nik Abdul Rahman, Azuhar Ismail, Mohamad Basiron Mohd. Othman<br/>Format: Books<br/>Call Number MFL 4654-4660 ra<br/>Publication Date 1984<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1985<br/>Security for computer networks : an introduction to data security in teleprocessing and electronic funds transferent://SD_ILS/0/SD_ILS:1380112024-04-26T21:41:18Z2024-04-26T21:41:18Zby Davies, D. W.<br/>Author Davies, D. W., Price, W. L.<br/>Format: Books<br/>Call Number TK5105 D35 1984<br/>Publisher John Wiley,<br/>Publication Date 1984<br/>ISBN 9780471900634<br/>Computer security management : a framework for effective management involvementent://SD_ILS/0/SD_ILS:4628932024-04-26T21:41:18Z2024-04-26T21:41:18Zby Solms, R. Von<br/>Author Solms, R. Von, Eloff, J. H. P., Solms, S. H. Von<br/>Format: Books<br/>Call Number MAK 10032<br/>Computer security : computer crime is a threat to be recognized by everyoneent://SD_ILS/0/SD_ILS:3905932024-04-26T21:41:18Z2024-04-26T21:41:18Zby Mohd. Daud Kasmuni<br/>Author Mohd. Daud Kasmuni, Seminar on EDP Audit and Controls a Better Realization of EDP Audit and Controls in Malaysia (1992 : Kuala Lumpur)<br/>Format: Books<br/>Call Number MAK 11739 a<br/>Cryptography : a new dimension in computer data security : a guide for the design and implementation of secure systemsent://SD_ILS/0/SD_ILS:3420982024-04-26T21:41:18Z2024-04-26T21:41:18Zby Meyer, Carl H.<br/>Author Meyer, Carl H., Matyas, Stephen M.<br/>Format: Books<br/>Call Number Z103.M49 1982<br/>ISBN 9780471048923<br/>Security, Privacy and Reliability in Computer Communications and Networksent://SD_ILS/0/SD_ILS:8669672024-04-26T21:41:18Z2024-04-26T21:41:18Zby Sha, Kewei<br/>Author Sha, Kewei, Striegel, Aaron, Song, Min<br/>Format: Books<br/>Call Number TK5105.59 S43 2017<br/>ISBN 9788793379893<br/>Security and the 1984 data protection : guidance for computer usersent://SD_ILS/0/SD_ILS:1654142024-04-26T21:41:18Z2024-04-26T21:41:18ZFormat: Books<br/>Call Number KD1957.C65 S42 1987<br/>Publisher National Computing Centre,<br/>Publication Date 1987<br/>ISBN 9780850126952<br/>European Computer Systems Security: the key to computer integrityent://SD_ILS/0/SD_ILS:2295182024-04-26T21:41:18Z2024-04-26T21:41:18ZFormat: Books<br/>Call Number HF5548.2 .E97 1984 f<br/>Publisher Online,<br/>Publication Date 1984<br/>ISBN 9780863530180<br/>Commonsense computer security : your practical guide to preventing accidental and deliberate electronic data lossent://SD_ILS/0/SD_ILS:4614542024-04-26T21:41:18Z2024-04-26T21:41:18ZFormat: Books<br/>Call Number QA76.9.A25 S44 1989<br/>Privacy protection and computer forensicsent://SD_ILS/0/SD_ILS:4203022024-04-26T21:41:18Z2024-04-26T21:41:18Zby Caloyannides, Michael A.<br/>Author Caloyannides, Michael A.<br/>Format: Books<br/>Call Number QA76.9.A25 C345 2004<br/>Edition 2nd ed.<br/>Publisher Artech House,<br/>Publication Date 2004<br/>ISBN 9781580538305<br/>Implementing electronic card payment systemsent://SD_ILS/0/SD_ILS:3401472024-04-26T21:41:18Z2024-04-26T21:41:18Zby Radu, Cristian<br/>Author Radu, Cristian<br/>Format: Books<br/>Call Number HG1710 R33 2003<br/>Publisher Artech House,<br/>Publication Date 2003<br/>ISBN 9781580533058<br/>Role-based access controlent://SD_ILS/0/SD_ILS:3401532024-04-26T21:41:18Z2024-04-26T21:41:18Zby Ferraiolo, David F.<br/>Author Ferraiolo, David F., Kuhn, D. Richard, Chandramouli, Ramaswamy<br/>Format: Books<br/>Call Number QA76.9.A25 F47 2003<br/>Publisher Artech House,<br/>Publication Date 2003<br/>ISBN 9781580533706<br/>Firewall design and analysis /cAlex X. Liuent://SD_ILS/0/SD_ILS:7640642024-04-26T21:41:18Z2024-04-26T21:41:18Zby Liu, Alex X.<br/>Author Liu, Alex X.<br/>Format: Books<br/>Call Number TK5105.59 L57 2011<br/>Publisher World Scientific,<br/>Publication Date 2010<br/>ISBN 9789814261654<br/>Trust and security in collaborative computingent://SD_ILS/0/SD_ILS:2321872024-04-26T21:41:18Z2024-04-26T21:41:18Zby Zou, Xukai, 1963-<br/>Author Zou, Xukai, 1963-, Dai, Yuan-Shun, Pan, Yi, 1960-<br/>Format: Books<br/>Call Number QA76.9.A25 Z68 2008<br/>Publisher World Scientific,<br/>Publication Date 2008<br/>ISBN 9789812703682<br/>Securing information and communications systems : principles, technologies, and applicationsent://SD_ILS/0/SD_ILS:2637952024-04-26T21:41:18Z2024-04-26T21:41:18Zby Furnell, Steven M.<br/>Author Furnell, Steven M.<br/>Format: Books<br/>Call Number QA76.9.A25 S4244 2008<br/>Publisher Artech House Publishers,<br/>Publication Date 2008<br/>ISBN 9781596932289<br/>User's guide to cryptography and standardsent://SD_ILS/0/SD_ILS:4180342024-04-26T21:41:18Z2024-04-26T21:41:18Zby Dent, Alexander W.<br/>Author Dent, Alexander W., Mitchell, Chris J.<br/>Format: Books<br/>Call Number QA76.9.A25 D464 2005<br/>Publisher Artech House,<br/>Publication Date 2005<br/>ISBN 9781580535304<br/>Defense and detection strategies against Internet wormsent://SD_ILS/0/SD_ILS:4178392024-04-26T21:41:18Z2024-04-26T21:41:18Zby Nazario, Jose<br/>Author Nazario, Jose<br/>Format: Books<br/>Call Number QA76.9.A25 N394 2004<br/>Publisher Artech House,<br/>Publication Date 2004<br/>ISBN 9781580535373<br/>Implementing security for ATM networksent://SD_ILS/0/SD_ILS:3124532024-04-26T21:41:18Z2024-04-26T21:41:18Zby Tarman, Thomas D.<br/>Author Tarman, Thomas D., Witzke, Edward L.<br/>Format: Books<br/>Call Number TK5105.59 T37 2002<br/>Publisher Artech House,<br/>Publication Date 2002<br/>ISBN 9781580532938<br/>Security in wireless LANs and MANsent://SD_ILS/0/SD_ILS:4705552024-04-26T21:41:18Z2024-04-26T21:41:18Zby Hardjono, Thomas<br/>Author Hardjono, Thomas, Dondeti, Lakshminath R.<br/>Format: Books<br/>Call Number TK5103.2 H374 2005<br/>Publisher Artech House,<br/>Publication Date 2005<br/>ISBN 9781580537551<br/>Contemporary cryptographyent://SD_ILS/0/SD_ILS:4542992024-04-26T21:41:18Z2024-04-26T21:41:18Zby Oppliger, Rolf<br/>Author Oppliger, Rolf<br/>Format: Books<br/>Call Number Z103 O66 2005<br/>Publisher Artech House,<br/>Publication Date 2005<br/>ISBN 9781580536424<br/>The German enigma cipher machine : beginnings, success, and ultimate failureent://SD_ILS/0/SD_ILS:1412252024-04-26T21:41:18Z2024-04-26T21:41:18Zby Winkel, Brian J.<br/>Author Winkel, Brian J.<br/>Format: Books<br/>Call Number D810.C88 G47 2005<br/>Publisher Artech House,<br/>Publication Date 2005<br/>ISBN 9781580539968<br/>Bluetooth securityent://SD_ILS/0/SD_ILS:4192762024-04-26T21:41:18Z2024-04-26T21:41:18Zby Gehrmann, Christian<br/>Author Gehrmann, Christian, Persson, Joakim, Smeets, Ben<br/>Format: Books<br/>Call Number TK5103.3 G43 2004<br/>Publisher Artech House,<br/>Publication Date 2004<br/>ISBN 9781580535045<br/>Developing secure distributed systems with CORBAent://SD_ILS/0/SD_ILS:3174752024-04-26T21:41:18Z2024-04-26T21:41:18Zby Lang, Ulrich<br/>Author Lang, Ulrich, Schreiner, Rudolf<br/>Format: Books<br/>Call Number QA76.9.A73 L36 2002<br/>Publisher Artech House,<br/>Publication Date 2002<br/>ISBN 9781580532952<br/>Java card for e-payment applicationsent://SD_ILS/0/SD_ILS:3175572024-04-26T21:41:18Z2024-04-26T21:41:18Zby Hassler, Vesna<br/>Author Hassler, Vesna<br/>Format: Books<br/>Call Number QA76.73.J38 J37 2002<br/>Publisher Artech House,<br/>Publication Date 2002<br/>ISBN 9781580532914<br/>Non-repudiation in electronic commerceent://SD_ILS/0/SD_ILS:3170732024-04-26T21:41:18Z2024-04-26T21:41:18Zby Zhou, Jianying<br/>Author Zhou, Jianying<br/>Format: Books<br/>Call Number HF5548.32 Z49 2001<br/>Publisher Artech House,<br/>Publication Date 2001<br/>ISBN 9781580532471<br/>Electronic payment systems for e-commerceent://SD_ILS/0/SD_ILS:3174712024-04-26T21:41:18Z2024-04-26T21:41:18Zby O'Mahony, Donal, 1961-<br/>Author O'Mahony, Donal, 1961-, Peirce, M. A. (Michael A.)<br/>Format: Books<br/>Call Number HG1710 O45 2001<br/>Edition 2nd ed.<br/>Publisher Artech House,<br/>Publication Date 2001<br/>ISBN 9781580532686<br/>Demystifying the IPsec puzzleent://SD_ILS/0/SD_ILS:3174772024-04-26T21:41:18Z2024-04-26T21:41:18Zby Frankel, Sheila<br/>Author Frankel, Sheila<br/>Format: Books<br/>Call Number TK5105.567 F73 2001<br/>Publisher Artech House,<br/>Publication Date 2001<br/>ISBN 9781580530798<br/>Protecting intellectual property in spaceent://SD_ILS/0/SD_ILS:3330382024-04-26T21:41:18Z2024-04-26T21:41:18Zby Aerospace Computer Security Conference (1985 : McLean, Virginia)<br/>Author Aerospace Computer Security Conference (1985 : McLean, Virginia)<br/>Format: Books<br/>Call Number QA76 A37 1985<br/>Publisher IEEE Computer Society,<br/>Publication Date 1985<br/>ISBN 9780818606267<br/>Security and protection in information systement://SD_ILS/0/SD_ILS:4546232024-04-26T21:41:18Z2024-04-26T21:41:18Zby IFIP TC 11 International Conference on Computer Security (4th : 1986 : Monte Carlo, Monaco)<br/>Author IFIP TC 11 International Conference on Computer Security (4th : 1986 : Monte Carlo, Monaco), Grissonnanche, Andre<br/>Format: Books<br/>Call Number QA76.9.A25 I34 1986<br/>Publisher North-Holland,<br/>Publication Date 1989<br/>ISBN 9780444873453<br/>The need for securityent://SD_ILS/0/SD_ILS:1041142024-04-26T21:41:18Z2024-04-26T21:41:18Zby The Housley Computer Network Security Seminar (1987 : Melbourne)<br/>Author The Housley Computer Network Security Seminar (1987 : Melbourne), Davies, D. W.<br/>Format: Books<br/>Call Number QA76.9.A25 H68 1987 f<br/>Swarm Based features selection for text summarizationent://SD_ILS/0/SD_ILS:7817572024-04-26T21:41:18Z2024-04-26T21:41:18Zby Mohammed Salem Binwahtan, author<br/>Author Mohammed Salem Binwahtan, author, Naomei Salim, author, Ladda Suanmali, author, DCSNS International Journal of Computer Science and Network Security<br/>Format: Books<br/>Call Number XX(781757.1) 1<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2009<br/>Real-time crowd simulations for interactive virtual environmentsent://SD_ILS/0/SD_ILS:2516562024-04-26T21:41:18Z2024-04-26T21:41:18Zby Mohd. Shahrizal Sunar<br/>Author Mohd. Shahrizal Sunar, Mohamed 'Adi Mohamed Azahar, Daut Daman, Abdullah Bade, International Conference & Industry Symposium on Computer Games : Animation, Multimedia, IPTV, Entertainment and Security (2008 : Singapore)<br/>Format: Books<br/>Call Number QA76.9.C65 R424 2008<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2008<br/>Bounding volume Hierarchies for detecting collision in Urban simulationent://SD_ILS/0/SD_ILS:2516592024-04-26T21:41:18Z2024-04-26T21:41:18Zby Abdullah Bade, author<br/>Author Abdullah Bade, author, Hamzah Asyrani Sulaiman, 1985-, author, Daut Daman, author, Mohd. Shahrizal Sunar, author, International Conference Industry Symposium on Computer Games : Animation, Multimedia, IPTV, Edutainment & Security (2008 : Singapore)<br/>Format: Books<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2008 2007<br/>Quadtree spatial indexing use to make faster showing geographical map in mobile geographical information system technology using an oracle 10g application server and mapviewer applicationent://SD_ILS/0/SD_ILS:3599442024-04-26T21:41:18Z2024-04-26T21:41:18Zby Maruto Masserie Sardadi, 1982-, author<br/>Author Maruto Masserie Sardadi, 1982-, author, Mohd. Shafry Mohd. Rahim, author, Zahabidin Jupri, supervisor, author, Daut Daman, author, International Journal of Computer Science and Network Security (2008)i<br/>Format: Books<br/>Call Number MAK<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2008<br/>Evaluation of new collaboration method in virtual reality game based on human haptic emotion for artificial life simulationent://SD_ILS/0/SD_ILS:3638502024-04-26T21:41:18Z2024-04-26T21:41:18Zby Ahmad Hoirul Basori, author<br/>Author Ahmad Hoirul Basori, author, Daut Daman, author, Mohd. Shahrizal Sunar, author, Abdullah Bade, author, International Conference & Industry Symposium on Computer Games, Animation, Multimedia, IPTV, Edutainment& Security (2008: Singapore)<br/>Format: Books<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2008<br/>Geometric modelling in 3D computer graphics and visualisationent://SD_ILS/0/SD_ILS:2605272024-04-26T21:41:18Z2024-04-26T21:41:18Zby Rabiatul Adawiyah A. Rahman, author<br/>Author Rabiatul Adawiyah A. Rahman, author, Abdullah Bade, author, Daut Daman, author, Mohd. Shahrizal Sunar, author, International Conference & Industry Symposium on Computer Games : Animation, Multimedia, IPTV, Entertainment and Security (2008 : Singapore)<br/>Format: Books<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/>Proceedings of a symposium on trends and applicationsent://SD_ILS/0/SD_ILS:3489122024-04-26T21:41:18Z2024-04-26T21:41:18Zby Symposium on Trends and Applications (1976-)<br/>Author Symposium on Trends and Applications (1976-), Institute of Electrical and Electronics Engineers. Computer Society<br/>Format: Books<br/>Call Number TK7885.A1 S98 1976 f<br/>Publisher IEEE,<br/>Publication Date 2020 2019 2018 2017 2016<br/>Cybersecurity Analyticsent://SD_ILS/0/SD_ILS:8872462024-04-26T21:41:18Z2024-04-26T21:41:18Zby Verma, Rakesh M., author<br/>Author Verma, Rakesh M., author, Marchette, David J., author<br/>Format: Books<br/>Call Number QA76.9.A25 V47 2020<br/>Publication Date 2020<br/>ISBN 9780367346010<br/>CYBER INFLUENCE AND COGNITIVE THREATSent://SD_ILS/0/SD_ILS:8879352024-04-26T21:41:18Z2024-04-26T21:41:18Zby Benson, Vladlena, editor<br/>Author Benson, Vladlena, editor, McAlaney, John, editor<br/>Format: Books<br/>Call Number QA76.9.A25 C933 2020<br/>Publication Date 2020<br/>ISBN 9780128192047<br/>Digital Image Watermarking : Theoretical and Computational Advancesent://SD_ILS/0/SD_ILS:8821972024-04-26T21:41:18Z2024-04-26T21:41:18Zby Borra, Surekha, author<br/>Author Borra, Surekha, author, Thanki, Rohit, author, Dey, Nilanjan, 1984-, author<br/>Format: Books<br/>Call Number QA76.9.A25 B673 2019<br/>Publication Date 2019<br/>ISBN 9781138390638<br/>Security in IoT-Enabled Spaceent://SD_ILS/0/SD_ILS:8822842024-04-26T21:41:18Z2024-04-26T21:41:18Zby Al-Turjman, Fadi, author<br/>Author Al-Turjman, Fadi, author<br/>Format: Books<br/>Call Number TK5105.8857 A48 2019<br/>Publication Date 2019<br/>ISBN 9780367111236<br/>Advances of DNA computing in cryptographyent://SD_ILS/0/SD_ILS:8823842024-04-26T21:41:18Z2024-04-26T21:41:18Zby Namasudra, Suyel, editor<br/>Author Namasudra, Suyel, editor, Deka, Ganesh Chandra, 1969- editor<br/>Format: Books<br/>Call Number QA76.9 .A25 A378 2019<br/>Publication Date 2019<br/>ISBN 9780815385325<br/>AWS Certified Cloud Practitioner Study Guide : CLF-C01 Exament://SD_ILS/0/SD_ILS:8871222024-04-26T21:41:18Z2024-04-26T21:41:18Zby Piper, Ben, author<br/>Author Piper, Ben, author, Clinton, David, author<br/>Format: Books<br/>Call Number QA76.3 P57 2019<br/>Publication Date 2019<br/>ISBN 9781119490708<br/>CRYPTOLOGY : Classical and Modernent://SD_ILS/0/SD_ILS:8823292024-04-26T21:41:18Z2024-04-26T21:41:18Zby Klima, Richard E., author<br/>Author Klima, Richard E., author, Sigmon, Neil, author<br/>Format: Books<br/>Call Number TK5102.94 K55 2019<br/>Edition Second Edition<br/>Publication Date 2019<br/>ISBN 9781138047624<br/>GUIDE TO COMPUTER FORENSICS AND INVESTIGATIONSent://SD_ILS/0/SD_ILS:8881522024-04-26T21:41:18Z2024-04-26T21:41:18Zby Nelson, Bill, author<br/>Author Nelson, Bill, author, Phillips, Amelia, author, Steuart, Christopher, author<br/>Format: Books<br/>Call Number QA76.9.A25 G84 2019<br/>Edition Sixth edition<br/>Publication Date 2019<br/>ISBN 9781337568944<br/>Automated image based CAPTCHA Solverent://SD_ILS/0/SD_ILS:8703602024-04-26T21:41:18Z2024-04-26T21:41:18Zby Choong, Kai Bin, 1993-, author<br/>Author Choong, Kai Bin, 1993-, author, Usman Ullah Sheikh, 1981-, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number QA76.9.A25 C466 2018 raf<br/>Publication Date 2018<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2018<br/>CompTIA security+ guide to network security fundamentalsent://SD_ILS/0/SD_ILS:8732292024-04-26T21:41:18Z2024-04-26T21:41:18Zby Ciampa, Mark D., author<br/>Author Ciampa, Mark D., author<br/>Format: Books<br/>Call Number TK5105.59 C574 2018<br/>Edition Sixth edition<br/>Publication Date 2018<br/>ISBN 9781337288781<br/>Security and Privacy in Cyber-Physical Systems : Foundations, Principles, and Applicationsent://SD_ILS/0/SD_ILS:8732412024-04-26T21:41:18Z2024-04-26T21:41:18Zby Song, Houbing, editor<br/>Author Song, Houbing, editor, Fink, Glenn A., editor, Jeschke, Sabina, editor<br/>Format: Books<br/>Call Number TK5105.59 S434 2018<br/>Edition First edition<br/>Publication Date 2018<br/>ISBN 9781119226048<br/>Automated image based CAPTCHA Solverent://SD_ILS/0/SD_ILS:8703632024-04-26T21:41:18Z2024-04-26T21:41:18Zby Choong, Kai Bin, 1993-, author<br/>Author Choong, Kai Bin, 1993-, author, Usman Ullah Sheikh, 1981-, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number CP 265430 ra<br/>Publication Date 2018<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2018<br/>CYBERSECURITY ESSENTIALSent://SD_ILS/0/SD_ILS:8823362024-04-26T21:41:18Z2024-04-26T21:41:18Zby Brooks, Charles J., author<br/>Author Brooks, Charles J., author, Grow, Christophe, author, Craig, Philip, author, Short, Donald, author<br/>Format: Books<br/>Call Number TK5105.59 B76 2018<br/>Publication Date 2018<br/>ISBN 9781119362395<br/>Digital Forensics and Investigations : People, Processes, and Technologies to Defend the Enterpriseent://SD_ILS/0/SD_ILS:8872562024-04-26T21:41:18Z2024-04-26T21:41:18Zby Sachowski, Jason, author<br/>Author Sachowski, Jason, author<br/>Format: Books<br/>Call Number HV8079.C65 S23 2018<br/>Publication Date 2018<br/>ISBN 9781138720930<br/>Advanced Persistent Security : A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategiesent://SD_ILS/0/SD_ILS:8732362024-04-26T21:41:18Z2024-04-26T21:41:18Zby Winkler, Ira, author<br/>Author Winkler, Ira, author, Gomes, Araceli Treu, author, Shackleford, Dave, editor<br/>Format: Books<br/>Call Number TK5105.59 W56 2017<br/>Publication Date 2017<br/>ISBN 9780128093160<br/>Advanced Penetration Testing : Hacking the World's Most Secure Networksent://SD_ILS/0/SD_ILS:8732382024-04-26T21:41:18Z2024-04-26T21:41:18Zby Allsopp, Wil, author<br/>Author Allsopp, Wil, author<br/>Format: Books<br/>Call Number QA76.9.A25 A4544 2017<br/>Publication Date 2017<br/>ISBN 9781119367680<br/>Privacy and Security Policies in Big Dataent://SD_ILS/0/SD_ILS:8667302024-04-26T21:41:18Z2024-04-26T21:41:18Zby Tamane, Sharvari, 1973-, editor<br/>Author Tamane, Sharvari, 1973-, editor, Solanki, Vijender Kumar, 1980-, editor, Dey, Nilanjan, 1984-, editor<br/>Format: Books<br/>Call Number QA76.9.B45 P75 2017 f<br/>Publisher IGI Global, Information Science Reference,<br/>Publication Date 2017<br/>ISBN 9781522524861<br/>Network Forensicsent://SD_ILS/0/SD_ILS:8731732024-04-26T21:41:18Z2024-04-26T21:41:18Zby Messier, Ric, author<br/>Author Messier, Ric, author<br/>Format: Books<br/>Call Number TK5105.59 M47 2017<br/>Publication Date 2017<br/>ISBN 9781119328285<br/>Malaysia Perlu Pakar Serangan Untuk Keselamatan Sistem Komputerent://SD_ILS/0/SD_ILS:8748302024-04-26T21:41:18Z2024-04-26T21:41:18Zby Universiti Teknologi Malaysia. Perpustakaan. Unit Pembangunan dan Pengurusan Multimedia<br/>Author Universiti Teknologi Malaysia. Perpustakaan. Unit Pembangunan dan Pengurusan Multimedia<br/>Format: Visual Materials<br/>Call Number CP 080656 a<br/>Publication Date 2017<br/>Discovering Computers 2017 : Tools, Apps, Devices, and the Impact of Technologyent://SD_ILS/0/SD_ILS:8861462024-04-26T21:41:18Z2024-04-26T21:41:18Zby Vermaat, Misty, author<br/>Author Vermaat, Misty, author, Sebok, Susan L., author, Freund, Steven M., author, Campbell, Jennifer T.,, author, Frydenberg, Mark (Mark E.), author<br/>Format: Books<br/>Call Number QA76.5 V47 2017 f<br/>Edition Enhanced edition<br/>Publication Date 2017<br/>ISBN 9781305657458<br/>Anonymous authentication mechanism based on group signature and pseudonym public key infrastructure for safety application of vehicular ad hoc networkent://SD_ILS/0/SD_ILS:8635482024-04-26T21:41:18Z2024-04-26T21:41:18Zby Ali Asadi, 1979-, author<br/>Author Ali Asadi, 1979-, author, Abdul Samad Ismail, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number XX(863548.2)<br/>Publication Date 2016<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2016<br/>CYBER-RISK INFORMATICS : Engineering Evaluation with Data Scienceent://SD_ILS/0/SD_ILS:8667932024-04-26T21:41:18Z2024-04-26T21:41:18Zby Sahinoglu, Mehmet, 1951-, author<br/>Author Sahinoglu, Mehmet, 1951-, author<br/>Format: Books<br/>Call Number QA76.9.A25 S246 2016<br/>Publication Date 2016<br/>ISBN 9781119087519<br/>Anonymous authentication mechanism based on group signature and pseudonym public key infrastructure for safety application of vehicular ad hoc networkent://SD_ILS/0/SD_ILS:8684292024-04-26T21:41:18Z2024-04-26T21:41:18Zby Ali Asadi, 1979-, author<br/>Author Ali Asadi, 1979-, author<br/>Format: Electronic Resources<br/>Call Number CP 064612 ra<br/>Publication Date 2016<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2016<br/>Cloud computing three-factor user authentication framework and protocols for telecare medical information systement://SD_ILS/0/SD_ILS:8491742024-04-26T21:41:18Z2024-04-26T21:41:18Zby Zeeshan Siddiqui, 1979-, author<br/>Author Zeeshan Siddiqui, 1979-, author, Abdul Hanan Abdullah, supervisor, Muhammad Khurram Khan, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number R858 Z33 2015 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Online psychographic model for insider identificationent://SD_ILS/0/SD_ILS:8491882024-04-26T21:41:18Z2024-04-26T21:41:18Zby Ikuesan Richard Adeyemi, 1983-, author<br/>Author Ikuesan Richard Adeyemi, 1983-, author, Shukor Abdul Razak, supervisor, Mazleena Salleh, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number XX(849188.1)<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Enhanced framework for alert processing using clustering approach based on artifical immune systement://SD_ILS/0/SD_ILS:8492042024-04-26T21:41:18Z2024-04-26T21:41:18Zby Ashara Banu Mohamed, 1969-, author<br/>Author Ashara Banu Mohamed, 1969-, author, Norbik Bashah Idris, Dato’ Prof. Dr., supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number XX(849204.1)<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer) - Universiti Teknologi Malaysia, 2015<br/>Gravitational search algorithm-based anomly intrusion detection systement://SD_ILS/0/SD_ILS:8493412024-04-26T21:41:18Z2024-04-26T21:41:18Zby Salima Omar M. Hamad, 1963-, author<br/>Author Salima Omar M. Hamad, 1963-, author, Md. Asri Ngadi, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number XX(849341.1)<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Enhanced framework for alert processing using clustering approach based on artifical immune systement://SD_ILS/0/SD_ILS:8513622024-04-26T21:41:18Z2024-04-26T21:41:18Zby Ashara Banu Mohamed, 1969-, author<br/>Author Ashara Banu Mohamed, 1969-, author<br/>Format: Books<br/>Call Number CP 054731 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Gravitational search algorithm-based anomly intrusion detection systement://SD_ILS/0/SD_ILS:8515022024-04-26T21:41:18Z2024-04-26T21:41:18Zby Salima Omar M. Hamad, 1963- , author<br/>Author Salima Omar M. Hamad, 1963- , author<br/>Format: Books<br/>Call Number CP 054786 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Cloud computing three-factor user authentication framework and protocols for telecare medical information systement://SD_ILS/0/SD_ILS:8515232024-04-26T21:41:18Z2024-04-26T21:41:18Zby Zeeshan Siddiqui, 1979-, author<br/>Author Zeeshan Siddiqui, 1979-, author<br/>Format: Books<br/>Call Number CP 054792 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Trusted connection decision support mechanism using TOPSIS methodent://SD_ILS/0/SD_ILS:8542322024-04-26T21:41:18Z2024-04-26T21:41:18Zby Ahmad Kamal Kamarun Hamidy, 1986-, author<br/>Author Ahmad Kamal Kamarun Hamidy, 1986-, author, Hassan Chizari, upervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number HM742 A46 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>Trusted connection decision support mechanism using TOPSIS methodent://SD_ILS/0/SD_ILS:8542332024-04-26T21:41:18Z2024-04-26T21:41:18Zby Ahmad Kamal Kamarun Hamidy, 1986-<br/>Author Ahmad Kamal Kamarun Hamidy, 1986-<br/>Format: Books<br/>Call Number CP 057166 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>Secure development for mobile apps : how to design and code secure mobile applications with PHP and javascriptent://SD_ILS/0/SD_ILS:8225122024-04-26T21:41:18Z2024-04-26T21:41:18Zby Glaser, J. D.<br/>Author Glaser, J. D.<br/>Format: Books<br/>Call Number QA76.9.A25 G535 2015<br/>Publisher CRC Press, Taylor & Francis Group, CRC Press is an imprint of the Taylor & Francis Group, an informa business,<br/>Publication Date 2015<br/>ISBN 9781482209037<br/>Cybersecurity : engineering a secure information technology organizationent://SD_ILS/0/SD_ILS:8282762024-04-26T21:41:18Z2024-04-26T21:41:18Zby Shoemaker, Dan<br/>Author Shoemaker, Dan, Sigler, Kenneth, author<br/>Format: Books<br/>Call Number QA76.9.A25 S49 2015 f<br/>Publisher Cengage Learning,<br/>Publication Date 2015<br/>ISBN 9781285169903<br/>Computing security & cryptography handbookent://SD_ILS/0/SD_ILS:8347472024-04-26T21:41:18Z2024-04-26T21:41:18Zby Mason, Stephen<br/>Author Mason, Stephen<br/>Format: Books<br/>Call Number QA76.9.A25 C667 2015<br/>Publisher Clanrye International,<br/>Publication Date 2015<br/>ISBN 9781632401137<br/>Biometric technology : authentication, biocryptography, and cloud-based architectureent://SD_ILS/0/SD_ILS:8348782024-04-26T21:41:18Z2024-04-26T21:41:18Zby Das, Ravindra, author<br/>Author Das, Ravindra, author<br/>Format: Books<br/>Call Number TK7882.B56 D37 2015<br/>Publisher CRC Press/Taylor & Francis,<br/>Publication Date 2015<br/>ISBN 9781466592452<br/>Applications of cryptography and network securityent://SD_ILS/0/SD_ILS:8369342024-04-26T21:41:18Z2024-04-26T21:41:18Zby Mason, Stephen<br/>Author Mason, Stephen<br/>Format: Books<br/>Call Number TK5102.94 A675 2015<br/>Publisher Clanrye Intl.,<br/>Publication Date 2015<br/>ISBN 9781632400659<br/>Ethical hacking and penetration testing guideent://SD_ILS/0/SD_ILS:8372182024-04-26T21:41:18Z2024-04-26T21:41:18Zby Baloch, Rafay<br/>Author Baloch, Rafay<br/>Format: Books<br/>Call Number QA76.9.A25 B35 2015<br/>Publisher CRC Press, Taylor & Francis Group,<br/>Publication Date 2015<br/>ISBN 9781482231618<br/>Legal issues in information securityent://SD_ILS/0/SD_ILS:8391302024-04-26T21:41:18Z2024-04-26T21:41:18Zby Grama, Joanna Lyn<br/>Author Grama, Joanna Lyn<br/>Format: Books<br/>Call Number KF1263.C65 G73 2015<br/>Edition 2nd ed.<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2015<br/>ISBN 9781284054743<br/>Industrial network security : securing critical infrastructure networks for smart grid, SCADA, and other industrial control systemsent://SD_ILS/0/SD_ILS:8410372024-04-26T21:41:18Z2024-04-26T21:41:18Zby Knapp, Eric D.<br/>Author Knapp, Eric D., Langill, Joel Thomas<br/>Format: Books<br/>Call Number TS156.8 K53 2015<br/>Edition 2nd ed.<br/>Publisher Syngress ,<br/>Publication Date 2015<br/>ISBN 9780124201149<br/>Information hiding in speech signals for secure communicationent://SD_ILS/0/SD_ILS:8410382024-04-26T21:41:18Z2024-04-26T21:41:18Zby Wu, Zhijun<br/>Author Wu, Zhijun<br/>Format: Books<br/>Call Number TK7882.S65 W8 2015<br/>Publisher Syngress ,<br/>Publication Date 2015<br/>ISBN 9780128013281<br/>CHFI computer hacking forensic investigator : exam guideent://SD_ILS/0/SD_ILS:8431592024-04-26T21:41:18Z2024-04-26T21:41:18Zby Brooks, Charles L.<br/>Author Brooks, Charles L.<br/>Format: Books<br/>Call Number QA76.9.A25 B766 2015<br/>Publisher McGraw-Hill Education ,<br/>Publication Date 2015<br/>ISBN 9780071831567<br/>CHFI computer hacking forensic investigator certification exam guideent://SD_ILS/0/SD_ILS:8480842024-04-26T21:41:18Z2024-04-26T21:41:18Zby Brooks, Charles L.<br/>Author Brooks, Charles L.<br/>Format: Books<br/>Call Number CP 034575<br/>Publisher McGraw-Hill Education ,<br/>Publication Date 2015<br/>ISBN 9780071831567<br/>Online psychographic model for insider identificationent://SD_ILS/0/SD_ILS:8513602024-04-26T21:41:18Z2024-04-26T21:41:18Zby Ikuesan Richard Adeyemi, 1983-<br/>Author Ikuesan Richard Adeyemi, 1983-<br/>Format: Books<br/>Call Number CP 054732 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2015<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Factors affecting the information security awareness in maldives customs serviceent://SD_ILS/0/SD_ILS:8593692024-04-26T21:41:18Z2024-04-26T21:41:18Zby Ibrahim Naaif, 1987-, author<br/>Author Ibrahim Naaif, 1987-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 I27 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>A Model Of Security Awareness In Cloud Computingent://SD_ILS/0/SD_ILS:8593722024-04-26T21:41:18Z2024-04-26T21:41:18Zby Abdul Ghafar Jaafar, 1985-, author<br/>Author Abdul Ghafar Jaafar, 1985-, author, Rasimah Che Mohd. Yusoff, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.585 A238 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>Integration of verification in otp cryptography for highly critical embedded systement://SD_ILS/0/SD_ILS:8593802024-04-26T21:41:18Z2024-04-26T21:41:18Zby Muhammad Maharoff, 1980- , author<br/>Author Muhammad Maharoff, 1980- , author, Saiful Adli Ismail, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 M846 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Kejuruteraan Sistem Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Performance evaluation of snort intrusion detection system over IPV4/IPV6 networks using PF_ring clusterent://SD_ILS/0/SD_ILS:8593852024-04-26T21:41:18Z2024-04-26T21:41:18Zby Kaveh Khosravi, 1987-, author<br/>Author Kaveh Khosravi, 1987-, author, Saiful Adli Ismail, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number TK5105.59 K38 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>Feasibility study of the acceptance of e-assessment by lecturers from security perspectiveent://SD_ILS/0/SD_ILS:8594592024-04-26T21:41:18Z2024-04-26T21:41:18Zby Kavitha Thamadharan, 1989-, author<br/>Author Kavitha Thamadharan, 1989-, author, Nurazean Maarop, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number LB1028.5 K38 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>Feasibility study of the acceptance of e-assessment by lecturers from security perspectiveent://SD_ILS/0/SD_ILS:8594602024-04-26T21:41:18Z2024-04-26T21:41:18Zby Kavitha Thamadharan, 1989-, author<br/>Author Kavitha Thamadharan, 1989-, author, Nurazean Maarop, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034748 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>Developing network vulnerability prediction and detection applicationent://SD_ILS/0/SD_ILS:8594482024-04-26T21:41:18Z2024-04-26T21:41:18Zby Mehran Janfeshan, 1987-, author<br/>Author Mehran Janfeshan, 1987-, author, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number TK5105.59 M44 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>Public key infrastructure authentication framework (PKIAF) for Malaysian public sectorent://SD_ILS/0/SD_ILS:8594772024-04-26T21:41:18Z2024-04-26T21:41:18Zby Noraida Aman Nor, 1985-, author<br/>Author Noraida Aman Nor, 1985-, author, Ganthan Narayana Samy, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 N6735 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>Public key infrastructure authentication framework (PKIAF) for Malaysian public sectorent://SD_ILS/0/SD_ILS:8594782024-04-26T21:41:18Z2024-04-26T21:41:18Zby Noraida Aman Nor, 1985-, author<br/>Author Noraida Aman Nor, 1985-, author, Ganthan Narayana Samy, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034722 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>Factors affecting the information security awareness in maldives customs serviceent://SD_ILS/0/SD_ILS:8595642024-04-26T21:41:18Z2024-04-26T21:41:18Zby Ibrahim Naaif, 1987-, author<br/>Author Ibrahim Naaif, 1987-, author, Zuraini Ismail, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034727 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>A security awareness model of data leakage prevention in private sectorent://SD_ILS/0/SD_ILS:8598942024-04-26T21:41:18Z2024-04-26T21:41:18Zby Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author<br/>Author Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author, Mohd. Shahidan Abdullah, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 A366 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>Detection of spam on feature selection using cuckoo's search algorithment://SD_ILS/0/SD_ILS:8607362024-04-26T21:41:18Z2024-04-26T21:41:18Zby Maznif Arahin Mujail, 1991-, author<br/>Author Maznif Arahin Mujail, 1991-, author, Anazida Zainal, Dr., supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number XX(860736.1)<br/>Publication Date 2015<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Detection of spam on feature selection using cuckoo's search algorithment://SD_ILS/0/SD_ILS:8607372024-04-26T21:41:18Z2024-04-26T21:41:18Zby Maznif Arahin Mujail, 1991-, author<br/>Author Maznif Arahin Mujail, 1991-, author, Anazida Zainal, Dr., supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number CP 061247 ra<br/>Publication Date 2015<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Pervasive Computing and Communications. Part II : QOS & SECURITYent://SD_ILS/0/SD_ILS:8647142024-04-26T21:41:18Z2024-04-26T21:41:18Zby Yahaya Coulibaly, editor<br/>Author Yahaya Coulibaly, editor, Mohammad Abdur Razzaque, editor, Adekemi Adedokun, contributor, Chong, Yuh Chwen, contributor, Fauziah Abdul Razak, contributor<br/>Format: Books<br/>Call Number QA76.9.A25 P473 2015 a<br/>Edition First Edition 2015<br/>Publication Date 2015<br/>ISBN 9789835210501<br/>SECURITY IN COMPUTING & NETWORKING. PART IIent://SD_ILS/0/SD_ILS:8658392024-04-26T21:41:18Z2024-04-26T21:41:18Zby Hassan Chizari, 1975-, editor<br/>Author Hassan Chizari, 1975-, editor, Hazinah Kutty Mammi, editor, Hassan Chizari, 1975-, contributor, Mahnoush Babaeizadeh, 1988-, contributor, Majid Bakhtiari, 1961-, contributor<br/>Format: Books<br/>Call Number QA76.9.A25 S439 2015 a<br/>Edition First Edition 2015<br/>Publication Date 2015<br/>ISBN 9789835211515<br/>Protocols and procedures of cryptography and network securityent://SD_ILS/0/SD_ILS:8351562024-04-26T21:41:18Z2024-04-26T21:41:18Zby Mason, Stephen<br/>Author Mason, Stephen<br/>Format: Books<br/>Call Number TK5105.59 P768 2015<br/>Publisher Clanrye International,<br/>Publication Date 2015<br/>ISBN 9781632404237<br/>Introduction to modern cryptographyent://SD_ILS/0/SD_ILS:8358552024-04-26T21:41:18Z2024-04-26T21:41:18Zby Katz, Jonathan, 1974- author<br/>Author Katz, Jonathan, 1974- author, Lindell, Yehuda, author<br/>Format: Books<br/>Call Number QA76.9.A25 K38 2015<br/>Edition Second edition<br/>Publisher CRC Press/Taylor & Francis,<br/>Publication Date 2015<br/>ISBN 9781466570269<br/>Web security : a WhiteHat perspectiveent://SD_ILS/0/SD_ILS:8358692024-04-26T21:41:18Z2024-04-26T21:41:18Zby Hanqing, Wu, author<br/>Author Hanqing, Wu, author, Zhao, Liz, author<br/>Format: Books<br/>Call Number TK5105.59 H363 2015<br/>Publisher CRC Press is an imprint of Taylor & Francis ; Publishing House of Electronics Industry,<br/>Publication Date 2015<br/>ISBN 9781466592612<br/>Case studies in secure computing : achievements and trendsent://SD_ILS/0/SD_ILS:8358812024-04-26T21:41:18Z2024-04-26T21:41:18Zby Issac, Biju, editor<br/>Author Issac, Biju, editor, Israr, Nauman, editor<br/>Format: Books<br/>Call Number QA76.9.A25 C375 2015<br/>Publisher Taylor & Francis, CRC Press,<br/>Publication Date 2015<br/>ISBN 9781482207064<br/>Information security : principles and new conceptsent://SD_ILS/0/SD_ILS:8370582024-04-26T21:41:18Z2024-04-26T21:41:18Zby Hobbs, Fiona, editor<br/>Author Hobbs, Fiona, editor<br/>Format: Books<br/>Call Number QA76.9.A25 I549 2015 f v.1<br/>Publisher Clanrye Intl.,<br/>Publication Date 2015<br/>ISBN 9781632403063 9781632403070 9781632403087 9781632403094<br/>Integrated researh in steganographyent://SD_ILS/0/SD_ILS:8371022024-04-26T21:41:18Z2024-04-26T21:41:18Zby Coon, Audrey, editor<br/>Author Coon, Audrey, editor<br/>Format: Books<br/>Call Number TK5102.94 I58 2015<br/>Publisher Clanrye Intl.,<br/>Publication Date 2015<br/>ISBN 9781632403131<br/>Hardware security : design, threats, and safeguardsent://SD_ILS/0/SD_ILS:8372192024-04-26T21:41:18Z2024-04-26T21:41:18Zby Mukhopadhyay, Debdeep, author<br/>Author Mukhopadhyay, Debdeep, author, Chakraborty, Rajat Subhra, author<br/>Format: Books<br/>Call Number QA76.9.A25 M85 2015<br/>Publisher CRC Press,<br/>Publication Date 2015<br/>ISBN 9781439895832<br/>CSA guide to cloud computing : implementing cloud privacy and securityent://SD_ILS/0/SD_ILS:8383622024-04-26T21:41:18Z2024-04-26T21:41:18Zby Samani, Raj author<br/>Author Samani, Raj author, Honan, Brian author, Reavis, Jim author, Jirasek, Vladimir author, CSA (Organization)<br/>Format: Books<br/>Call Number QA76.585 S26 2015<br/>Publisher Elsevier/Syngress, an imprint of Elsevier,<br/>Publication Date 2015<br/>ISBN 9780124201255<br/>Designing and building security operations centerent://SD_ILS/0/SD_ILS:8383652024-04-26T21:41:18Z2024-04-26T21:41:18Zby Nathans, David<br/>Author Nathans, David<br/>Format: Books<br/>Call Number HV8290 N38 2015<br/>Publisher Syngress ,<br/>Publication Date 2015<br/>ISBN 9780128008997<br/>Information security analytics : finding security insights, patterns, and anomalies in big dataent://SD_ILS/0/SD_ILS:8383662024-04-26T21:41:18Z2024-04-26T21:41:18Zby Talabis, Mark, author<br/>Author Talabis, Mark, author, McPherson, Robert, author, Miyamoto, I., author, Martin, Jason L., author<br/>Format: Books<br/>Call Number QA76.9.A25 T355 2015<br/>Publisher Syngress,<br/>Publication Date 2015<br/>ISBN 9780128002070<br/>Computational network science : an algorithmic approachent://SD_ILS/0/SD_ILS:8383722024-04-26T21:41:18Z2024-04-26T21:41:18Zby Hexmoor, Henry, author<br/>Author Hexmoor, Henry, author<br/>Format: Books<br/>Call Number TK5105.59 H49 2015<br/>Publisher Morgan Kaufmann,<br/>Publication Date 2015<br/>ISBN 9780128008911<br/>Cyberwarfare : information operations in a connected worldent://SD_ILS/0/SD_ILS:8391262024-04-26T21:41:18Z2024-04-26T21:41:18Zby Chapple, Mike, author<br/>Author Chapple, Mike, author, Seidl, David, author<br/>Format: Books<br/>Call Number QA76.9.A25 C437 2015<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2015<br/>ISBN 9781284058482<br/>Managing risk in information systemsent://SD_ILS/0/SD_ILS:8391282024-04-26T21:41:18Z2024-04-26T21:41:18Zby Gibson, Darril, author<br/>Author Gibson, Darril, author<br/>Format: Books<br/>Call Number QA76.9.A25 G53 2015<br/>Edition Second edition<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2015<br/>ISBN 9781284055955<br/>Security policies and implementation issuesent://SD_ILS/0/SD_ILS:8391312024-04-26T21:41:18Z2024-04-26T21:41:18Zby Johnson, Robert, 1946- author<br/>Author Johnson, Robert, 1946- author<br/>Format: Books<br/>Call Number TK5105.59 J64 2015<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2015<br/>ISBN 9781284055993<br/>Face recognition based security robot incorporating omnidirectional visionent://SD_ILS/0/SD_ILS:8467832024-04-26T21:41:18Z2024-04-26T21:41:18Zby Mohamed Tahir Ahmed Shoani, 1968-<br/>Author Mohamed Tahir Ahmed Shoani, 1968-, Shamsudin H. M. Amin, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number TA1650 M64 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Kejuruteraan (Elektrik)) - Universiti Teknologi Malaysia, 2015<br/>A graphics processing unit based network intrusion detection system with bloom filter pattern matching algorithment://SD_ILS/0/SD_ILS:8468552024-04-26T21:41:18Z2024-04-26T21:41:18Zby Ong, Wen Jian, 1987-, author<br/>Author Ong, Wen Jian, 1987-, author, Usman Ullah Sheikh, 1981-, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number TK5105.59 O54 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2015<br/>A graphics processing unit based network intrusion detection system with bloom filter pattern matching algorithment://SD_ILS/0/SD_ILS:8468572024-04-26T21:41:18Z2024-04-26T21:41:18Zby Ong, Wen Jian, 1987-, author<br/>Author Ong, Wen Jian, 1987-, author<br/>Format: Books<br/>Call Number CP 052944 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Komputer dan Sistem Mikroelektronik)) - Universiti Teknologi Malaysia, 2015<br/>Developing network vulnerability prediction and detection applicationent://SD_ILS/0/SD_ILS:8594492024-04-26T21:41:18Z2024-04-26T21:41:18Zby Mehran Janfeshan, 1987-, author<br/>Author Mehran Janfeshan, 1987-, author, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034751 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>Security implementation approach for the use of bring your own device in government agenciesent://SD_ILS/0/SD_ILS:8594632024-04-26T21:41:18Z2024-04-26T21:41:18Zby Mohamad Roshidi Rozali, 1980-, author<br/>Author Mohamad Roshidi Rozali, 1980-, author, Zuraini Ismail, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number TK5102.85 M64 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>Security implementation approach for the use of bring your own device in government agenciesent://SD_ILS/0/SD_ILS:8594642024-04-26T21:41:18Z2024-04-26T21:41:18Zby Mohamad Roshidi Rozali, 1980-<br/>Author Mohamad Roshidi Rozali, 1980-, Zuraini Ismai, author?UNAUTHORIZED, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034749 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>Integration of verification in otp cryptography for highly critical embedded systement://SD_ILS/0/SD_ILS:8596252024-04-26T21:41:18Z2024-04-26T21:41:18Zby Muhammad Maharoff, 1980- , author<br/>Author Muhammad Maharoff, 1980- , author, Saiful Adli Ismail, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034740 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Kejuruteraan Sistem Komputer))-Universiti Teknologi Malaysia, 2015<br/>Performance evaluation of snort intrusion detection system over IPV4/IPV6 networks using PF_ring clusterent://SD_ILS/0/SD_ILS:8596362024-04-26T21:41:18Z2024-04-26T21:41:18Zby Kaveh Khosravi, 1987-, author<br/>Author Kaveh Khosravi, 1987-, author, Saiful Adli Ismail, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034742 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>A model of security awareness in cloud computingent://SD_ILS/0/SD_ILS:8596452024-04-26T21:41:18Z2024-04-26T21:41:18Zby Abdul Ghafar Jaafar, 1985-, author<br/>Author Abdul Ghafar Jaafar, 1985-, author, Rasimah Che Mohd. Yusoff, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034746 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>Enhancing password storage securityent://SD_ILS/0/SD_ILS:8603072024-04-26T21:41:18Z2024-04-26T21:41:18Zby Yeoh, Soon Yau, 1991-, author<br/>Author Yeoh, Soon Yau, 1991-, author, Mazleena Salleh, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 Y46 2015 raf<br/>Publication Date 2015<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Enhancing password storage securityent://SD_ILS/0/SD_ILS:8603372024-04-26T21:41:18Z2024-04-26T21:41:18Zby Yeoh, Soon Yau, 1991-, author<br/>Author Yeoh, Soon Yau, 1991-, author, Mazleena Salleh, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number CP 061137 ra<br/>Publication Date 2015<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2015<br/>A security awareness model of data leakage prevention in private sectorent://SD_ILS/0/SD_ILS:8607842024-04-26T21:41:18Z2024-04-26T21:41:18Zby Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author<br/>Author Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author, Mohd. Shahidan Abdullah, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034789 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>SECURITY IN COMPUTING & NETWORKING. PART 1ent://SD_ILS/0/SD_ILS:8643802024-04-26T21:41:18Z2024-04-26T21:41:18Zby Hassan Chizari, 1975-, editor<br/>Author Hassan Chizari, 1975-, editor, Hazinah Kutty Mammi, editor, A. Ahmed Ibrahim Alkilary, contributor, Affandi Husain, contributor, Hassan Chizari, 1975-, contributor<br/>Format: Books<br/>Call Number QA76.9.A25 S438 2015 a<br/>Edition First Edition 2015<br/>Publication Date 2015<br/>ISBN 35000000012313<br/>Cybersecurity : managing systems, conducting testing, and investigating intrusionsent://SD_ILS/0/SD_ILS:8225492024-04-26T21:41:18Z2024-04-26T21:41:18Zby Mowbray, Thomas J.<br/>Author Mowbray, Thomas J.<br/>Format: Books<br/>Call Number QA76.9.A25 M69 2014<br/>Publisher John Wiley and Sons,<br/>Publication Date 2014 2013<br/>ISBN 9781118697115<br/>Guide to network defense and countermeasuresent://SD_ILS/0/SD_ILS:8225862024-04-26T21:41:18Z2024-04-26T21:41:18Zby Weaver, Randy, author<br/>Author Weaver, Randy, author, Weaver, Dawn, author, Farwood, Dean, author<br/>Format: Books<br/>Call Number TK5105.59 W424 2014<br/>Edition Third edition<br/>Publisher Cengage Learning,<br/>Publication Date 2014<br/>ISBN 9781133727941<br/>A virus disaster recovery plan framework for academic computing centerent://SD_ILS/0/SD_ILS:8254882024-04-26T21:41:18Z2024-04-26T21:41:18Zby Mohamed Ismail Gurhan, 1985-<br/>Author Mohamed Ismail Gurhan, 1985-, Norafida Ithnin, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.76.C68 M64 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Firewall for mitigation relay attack in near field communication in smartphonesent://SD_ILS/0/SD_ILS:8254902024-04-26T21:41:18Z2024-04-26T21:41:18Zby Mehdi Hossein Zadeh, 1983-<br/>Author Mehdi Hossein Zadeh, 1983-, Abdul Hanan Abdullah, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 M44 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Security management of next generation telecommunications networks and servicesent://SD_ILS/0/SD_ILS:8257332024-04-26T21:41:18Z2024-04-26T21:41:18Zby Jacobs, Stuart<br/>Author Jacobs, Stuart<br/>Format: Books<br/>Call Number TK5105.59 J334 2014<br/>Publisher IEEE Press/Wiley,<br/>Publication Date 2014<br/>ISBN 9780470565131<br/>Digital communication : communication, multimedia, securityent://SD_ILS/0/SD_ILS:8257862024-04-26T21:41:18Z2024-04-26T21:41:18Zby Meinel, Christoph, 1954-, author<br/>Author Meinel, Christoph, 1954-, author, Sack, Harald, author<br/>Format: Books<br/>Call Number TK5103.7 M45 2014<br/>Publisher Springer,<br/>Publication Date 2014<br/>ISBN 9783642543302<br/>Analysis of DoS attacks effects on cloud computing performanceent://SD_ILS/0/SD_ILS:8259702024-04-26T21:41:18Z2024-04-26T21:41:18Zby Ahmed Kadhim Noor, 1989-<br/>Author Ahmed Kadhim Noor, 1989-, Mohammad Abdur Razzaque, Fakulti Komputeran<br/>Format: Books<br/>Call Number TK5105.59 A46 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Hands-on information security lab manualent://SD_ILS/0/SD_ILS:8282872024-04-26T21:41:18Z2024-04-26T21:41:18Zby Whitman, Michael E., 1964-, author<br/>Author Whitman, Michael E., 1964-, author, Mattord, Herbert J., author, Green, Andrew, author<br/>Format: Books<br/>Call Number HD30.38 W45 2014 f<br/>Publisher Cengage Learning,<br/>Publication Date 2014<br/>ISBN 9781285167572<br/>Image encryption : a communication perspectiveent://SD_ILS/0/SD_ILS:8289342024-04-26T21:41:18Z2024-04-26T21:41:18Zby Abd el-Samie, Fathi E.<br/>Author Abd el-Samie, Fathi E., Ahmed, Hossam Eldin H., author, Elashry, Ibrahim F., author, Shahieen, Mai H., author, Faragallah, Osama S., author<br/>Format: Books<br/>Call Number TA1637 A23 2014<br/>Publisher CRC Press, Tayllor & Francis Group,<br/>Publication Date 2014<br/>ISBN 9781466576988<br/>Introduction to information security : a strategic-based approachent://SD_ILS/0/SD_ILS:8291242024-04-26T21:41:18Z2024-04-26T21:41:18Zby Shimeall, Timothy J.<br/>Author Shimeall, Timothy J., Spring, Jonathan M.<br/>Format: Books<br/>Call Number TK5102.85 S55 2014<br/>Publisher Syngress ,<br/>Publication Date 2014<br/>ISBN 9781597499699<br/>Developing a guideline for adopting byod in a higher learning institutionent://SD_ILS/0/SD_ILS:8309942024-04-26T21:41:18Z2024-04-26T21:41:18Zby Jayaseelan Vejayon<br/>Author Jayaseelan Vejayon, Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number CP 033638 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>A secure model to mitigate bypassing web-based wireless authenticationent://SD_ILS/0/SD_ILS:8310212024-04-26T21:41:18Z2024-04-26T21:41:18Zby Jamil Salem Bajamil, 1987-, author<br/>Author Jamil Salem Bajamil, 1987-, author, Mazdak Zamani, 1979-, supervisor, Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number TK5103.2 B35 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>A secure model to mitigate bypassing web-based wireless authenticationent://SD_ILS/0/SD_ILS:8310222024-04-26T21:41:18Z2024-04-26T21:41:18Zby Jamil Salem Bajamil, 1987-, author<br/>Author Jamil Salem Bajamil, 1987-, author<br/>Format: Books<br/>Call Number CP 033623 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Emerging trends in ICT securityent://SD_ILS/0/SD_ILS:8310312024-04-26T21:41:18Z2024-04-26T21:41:18Zby Akhgar, Babak, editor<br/>Author Akhgar, Babak, editor, Arabnia, Hamid R., editor<br/>Format: Books<br/>Call Number QA76.9.A25 E46 2014<br/>Publisher Elsevier,<br/>Publication Date 2014<br/>ISBN 9780124114746<br/>Managing information securityent://SD_ILS/0/SD_ILS:8310362024-04-26T21:41:18Z2024-04-26T21:41:18Zby Vacca, John R., editor<br/>Author Vacca, John R., editor<br/>Format: Books<br/>Call Number QA76.9.A25 M36 2014<br/>Edition 2nd ed.<br/>Publisher Elsevier,<br/>Publication Date 2014<br/>ISBN 9780124166882<br/>Business continuity and disaster recovery planning for IT professionalsent://SD_ILS/0/SD_ILS:8310372024-04-26T21:41:18Z2024-04-26T21:41:18Zby Snedaker, Susan<br/>Author Snedaker, Susan, Rima, Chris<br/>Format: Books<br/>Call Number HF5548.37 S67 2014<br/>Edition 2nd edition.<br/>Publisher Syngress,<br/>Publication Date 2014<br/>ISBN 9780124105263<br/>The basics of IT audit : purposes, processes, and practical informationent://SD_ILS/0/SD_ILS:8310382024-04-26T21:41:18Z2024-04-26T21:41:18Zby Gantz, Stephen D.<br/>Author Gantz, Stephen D., Maske, Steve<br/>Format: Books<br/>Call Number T58.5 G37 2014<br/>Publisher Syngress, an imprint of Elsevier,<br/>Publication Date 2014<br/>ISBN 9780124171596<br/>Social media security : leveraging social networking while mitigating riskent://SD_ILS/0/SD_ILS:8310392024-04-26T21:41:18Z2024-04-26T21:41:18Zby Cross, Michael, 1965-<br/>Author Cross, Michael, 1965-<br/>Format: Books<br/>Call Number HM742 C77 2013<br/>Publisher Elsevier,<br/>Publication Date 2014 2013<br/>ISBN 9781597499866<br/>Identity and access management : business performanve through connected intelligenceent://SD_ILS/0/SD_ILS:8312282024-04-26T21:41:18Z2024-04-26T21:41:18Zby Osmanoglu, Ertem<br/>Author Osmanoglu, Ertem<br/>Format: Books<br/>Call Number QA76.9.A25 O78 2013<br/>Publisher Syngress, an imprint of Elsevier,<br/>Publication Date 2014<br/>ISBN 9780124081406<br/>Cyber security and IT infrastructure protectionent://SD_ILS/0/SD_ILS:8312392024-04-26T21:41:18Z2024-04-26T21:41:18Zby Vacca, John R., editor<br/>Author Vacca, John R., editor<br/>Format: Books<br/>Call Number QA76.9.A25 C934 2014<br/>Publisher Elsevier,<br/>Publication Date 2014<br/>ISBN 9780124166813<br/>Network and system securityent://SD_ILS/0/SD_ILS:8312412024-04-26T21:41:18Z2024-04-26T21:41:18Zby Vacca, John R., editor<br/>Author Vacca, John R., editor<br/>Format: Books<br/>Call Number TK5105.59 N486 2014<br/>Edition 2nd ed.<br/>Publisher Elsevier,<br/>Publication Date 2014<br/>ISBN 9780124166899<br/>The basics of digital privacy : simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:8312662024-04-26T21:41:18Z2024-04-26T21:41:18Zby Cherry, Denny<br/>Author Cherry, Denny, Larock, Thomas, technical editor<br/>Format: Books<br/>Call Number QA76.9.A25 C444 2014<br/>Publisher Elsevier,<br/>Publication Date 2014<br/>ISBN 9780128000113<br/>Hacking with Kali : practical penetration testing techniquesent://SD_ILS/0/SD_ILS:8312782024-04-26T21:41:18Z2024-04-26T21:41:18Zby Broad, James<br/>Author Broad, James, Bindner, Andrew<br/>Format: Books<br/>Call Number QA76.9.A25 B764 2014<br/>Publisher Elsevier Science,<br/>Publication Date 2014<br/>ISBN 9780124077492<br/>System forensics, investigation and responseent://SD_ILS/0/SD_ILS:8314082024-04-26T21:41:18Z2024-04-26T21:41:18Zby Easttom, Chuck<br/>Author Easttom, Chuck<br/>Format: Books<br/>Call Number HV8079.C65 E27 2014<br/>Edition 2nd ed.<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2014<br/>ISBN 9781284031058<br/>Fundamentals of information systems securityent://SD_ILS/0/SD_ILS:8314092024-04-26T21:41:18Z2024-04-26T21:41:18Zby Kim, David<br/>Author Kim, David, Solomon, Michael G.<br/>Format: Books<br/>Call Number QA76.9.A25 K564 2014<br/>Edition 2nd ed.<br/>Publisher Jones & Bartlett Learning ,<br/>Publication Date 2014<br/>ISBN 9781284031621<br/>Network security firewalls, and VPNsent://SD_ILS/0/SD_ILS:8314122024-04-26T21:41:18Z2024-04-26T21:41:18Zby Stewart, J. Michael<br/>Author Stewart, J. Michael<br/>Format: Books<br/>Call Number TK5105.59 S74 2014<br/>Edition 2nd ed.<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2014<br/>ISBN 9781284031676<br/>Security strategies in windows platforms and applicationsent://SD_ILS/0/SD_ILS:8314142024-04-26T21:41:18Z2024-04-26T21:41:18Zby Solomon, Michael G.<br/>Author Solomon, Michael G.<br/>Format: Books<br/>Call Number QA76.76.O63 S656 2014<br/>Edition 2nd ed.<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2014<br/>ISBN 9781284031652<br/>Hacker techniques, tools, and incident handlingent://SD_ILS/0/SD_ILS:8314152024-04-26T21:41:18Z2024-04-26T21:41:18Zby Oriyano, Sean-Philip<br/>Author Oriyano, Sean-Philip<br/>Format: Books<br/>Call Number TK5105.59 O75 2014<br/>Edition 2nd ed.<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2014<br/>ISBN 9781284031713<br/>Learning nessus for penetration testing : master how to perfom IT infrastructure security vulnerability assessments using nessus with tips and insights from real-world challenges faced during vulnerability assessmentent://SD_ILS/0/SD_ILS:8314362024-04-26T21:41:18Z2024-04-26T21:41:18Zby Kumar, Himanshu<br/>Author Kumar, Himanshu<br/>Format: Books<br/>Call Number QA76.9.A25 K864 2014<br/>Publisher Packt Publiching,<br/>Publication Date 2014<br/>ISBN 9781783550999<br/>Conducting network penetration and espionage in a global environmentent://SD_ILS/0/SD_ILS:8330942024-04-26T21:41:18Z2024-04-26T21:41:18Zby Middleton, Bruce, 1953-, author<br/>Author Middleton, Bruce, 1953-, author<br/>Format: Books<br/>Call Number TK5105.59 M53 2014<br/>Publisher CRC Press,<br/>Publication Date 2014<br/>ISBN 9781482206470<br/>Simplified computer incident response model for premium pension limited Nigeriaent://SD_ILS/0/SD_ILS:8433642024-04-26T21:41:18Z2024-04-26T21:41:18Zby Abubakar Mohammed, 1989-<br/>Author Abubakar Mohammed, 1989-, Norafida Ithnin, Fakulti Komputeran<br/>Format: Books<br/>Call Number CP 051607 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia,2014<br/>Improvement scalar multiplication in elliptic curve cryptographyent://SD_ILS/0/SD_ILS:8434142024-04-26T21:41:18Z2024-04-26T21:41:18Zby Sui, Tao, 1988- author<br/>Author Sui, Tao, 1988- author, Majid Bakhtiari, Dr., Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 S85 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>A comparison study of particale swarm optimizzation and differential evolution for feature selection intrusion detection systement://SD_ILS/0/SD_ILS:8434152024-04-26T21:41:18Z2024-04-26T21:41:18Zby Mohamud Sheikh Ali Hussein, 1988- author<br/>Author Mohamud Sheikh Ali Hussein, 1988- author, Anazida Zainal, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number TK5105.59 M647 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Improvement scalar multiplication in elliptic curve cryptographyent://SD_ILS/0/SD_ILS:8434182024-04-26T21:41:18Z2024-04-26T21:41:18Zby Sui, Tao, 1988- author<br/>Author Sui, Tao, 1988- author<br/>Format: Books<br/>Call Number CP 052054 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia,2014<br/>A comparison study of particale swarm optimizzation and differential evolution for feature selection intrusion detection systement://SD_ILS/0/SD_ILS:8436452024-04-26T21:41:18Z2024-04-26T21:41:18Zby Mohamud Sheikh Ali Hussein, 1988- author<br/>Author Mohamud Sheikh Ali Hussein, 1988- author, Anazida Zainal, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number CP 052066 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>A cloud security audit quality model for a commercial bank in Malaysiaent://SD_ILS/0/SD_ILS:8438712024-04-26T21:41:18Z2024-04-26T21:41:18Zby Mariana Md. Hashim, 1982-, author<br/>Author Mariana Md. Hashim, 1982-, author, Mazdak Zamani, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.585 M375 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>A cloud security audit quality model for a commercial bank in Malaysiaent://SD_ILS/0/SD_ILS:8438722024-04-26T21:41:18Z2024-04-26T21:41:18Zby Mariana Md. Hashim, 1982-, author<br/>Author Mariana Md. Hashim, 1982-, author, Mazdak Zamani, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034206 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Preferred methodologies of penetration testing from information security professionals perspectiveent://SD_ILS/0/SD_ILS:8439022024-04-26T21:41:18Z2024-04-26T21:41:18Zby Mohd. Irzani Wahid, 1985-, author<br/>Author Mohd. Irzani Wahid, 1985-, author, Bharanidharan Shanmugam, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 M6439 2014 raf<br/>Publication Date 2014<br/>Thesis Sarjana Sains (Jaminan Maklumat) - Universiti Teknologi Malaysia, 2014<br/>Databased encrytpion/decryption using AES/DESent://SD_ILS/0/SD_ILS:8440002024-04-26T21:41:18Z2024-04-26T21:41:18Zby Abdul Kadir Abukar Sufi, 1985- author<br/>Author Abdul Kadir Abukar Sufi, 1985- author, Ismail Fauzi Isnin, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 A23 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Optimize perceptuality of digital image from encryption based on quadtreeent://SD_ILS/0/SD_ILS:8440962024-04-26T21:41:18Z2024-04-26T21:41:18Zby Hussein A. Hussein, 1983- author<br/>Author Hussein A. Hussein, 1983- author, Dzulkifli Mohamed, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number CP 052393 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2014<br/>