Search Results for Computer security - Narrowed by: Closed Access Book SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dComputer$002bsecurity$0026qf$003dITYPE$002509Material$002bType$0025091$00253ACLS_BK$002509Closed$002bAccess$002bBook$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list 2024-05-17T13:33:52Z Securing communication on active network ent://SD_ILS/0/SD_ILS:407709 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Satria Mandala<br/>Author&#160;Satria Mandala,&#160;Abdul Hanan Abdullah,&#160;Md. Asri Ngadi,&#160;Konferensi Nasional Sistem Informasi (2005 : Indonesia)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5 S27 2005<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/> Spatial domain technique to embed visible and invisible wetermarking ent://SD_ILS/0/SD_ILS:411665 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Akram Mohd. Zeki<br/>Author&#160;Akram Mohd. Zeki,&#160;Azizah Abdul Manaf,&#160;Sayuthi Jaafar,&#160;International Conference Information and Communication Technology in Management (2005 : Melaka)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A37 2005<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/> Estimations on the security aspect of brand's electronic cash scheme ent://SD_ILS/0/SD_ILS:401697 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Chang, Yu Cheng<br/>Author&#160;Chang, Yu Cheng,&#160;Jasmy Yunus,&#160;Kamaruzzaman Seman,&#160;The IEE International Conference on Advanced Information Networking and Applications (19th : 2005 : Taiwan)<br/>Format:&#160;Books<br/>Call Number&#160;HG1710 C425 2005<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/> Proceedings of the 1st international symposium on bio-inspired computing BIC'05, 5-7 September 2005, The Puteri Pan Pacific Hotel Johor Bahru, Malaysia ent://SD_ILS/0/SD_ILS:449872 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;International Symposium on Bio-Inspired Computing (1st : 2005 : Johor Bahru, Malaysia)<br/>Author&#160;International Symposium on Bio-Inspired Computing (1st : 2005 : Johor Bahru, Malaysia),&#160;Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat,&#160;Soft Computing Research Group,&#160;Group on Artificial Immune System and Security<br/>Format:&#160;Books<br/>Call Number&#160;QA76.618 I89 2005<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/>ISBN&#160;9789834279400<br/> Applying mobile agent in distributed speech recognition using JADE ent://SD_ILS/0/SD_ILS:461514 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Emrul Hamide Md. Saaim<br/>Author&#160;Emrul Hamide Md. Saaim,&#160;Abdul Manan Ahmad,&#160;Mohamad Ashari Alias,&#160;Mohd. Fauzi Othman,&#160;International Conference on Computer, Communications and Signal Processing with Special Track on Biomedical Engineering (1st. : 2005 : Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.I58 A66 2005<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/> Estimation on the security aspect of brand's electronic chas scheme ent://SD_ILS/0/SD_ILS:396536 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Chang, Yu Cheng<br/>Author&#160;Chang, Yu Cheng,&#160;Jasmy Yunus,&#160;Kamaruzzaman Seman,&#160;Australian Telecommunications Networks and Applications Conference (2004 : Sydney, Australia)<br/>Format:&#160;Books<br/>Call Number&#160;HG1710 C424 2004<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/> Detecting outlier on intrusion detection system using data set of system calls ent://SD_ILS/0/SD_ILS:396547 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Dahliyusmanto Dahlan<br/>Author&#160;Dahliyusmanto Dahlan,&#160;Abdul Hanan Abdullah,&#160;International Conference on Information and Computer Science (2004 : Dhahran, Saudi Arabia)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D335 2004<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/> Public key crypto hardware for real-time security application ent://SD_ILS/0/SD_ILS:400165 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Mohamed Khalil Mohd. Hani<br/>Author&#160;Mohamed Khalil Mohd. Hani,&#160;Hau, Yuan Wen, 1980-,&#160;Lim, Kie Woon,&#160;National Real-Time Technology and Applications Symposium (2nd : 2004 Serdang, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M54 2004<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/> Ke arah pengurangan jurang masa sistem penindakbalasan pencerobohan melalui penggunaan pendekatan penjejakan pencerobohan pantas ent://SD_ILS/0/SD_ILS:353627 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Mohd. Nizam Omar<br/>Author&#160;Mohd. Nizam Omar,&#160;Mohd. Aizaini Maarof,&#160;Subariah Ibrahim,&#160;Persidangan Sempena Pameran Penyelidikan dan Pembangunan IPTA (2003 : Kuala Lumpur )<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M54 2003<br/>Publication Date&#160;2003<br/> Counting the number of system calls to detect intrusion using discriminant analysis ent://SD_ILS/0/SD_ILS:386616 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Dahliyusmanto Dahlan<br/>Author&#160;Dahliyusmanto Dahlan,&#160;Abdul Hanan Abdullah,&#160;Seminar Quality in Research (2003 : Indonesia)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D334 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Enforcing multilevel security policies for network firewall ent://SD_ILS/0/SD_ILS:352173 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Cahyo Crysdian<br/>Author&#160;Cahyo Crysdian,&#160;Abdul Hanan Abdullah,&#160;Mohd. Aizaini Maarof,&#160;International Conference Information Technology in Asia (2003 : Kuching, Sarawak)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C34 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> A Benchmarking methodology for NPU-based stateful firewall ent://SD_ILS/0/SD_ILS:352612 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Lee, Eng Kean<br/>Author&#160;Lee, Eng Kean,&#160;Sulaiman Mohd. Nor,&#160;IEEE Asia Pacific Conference on Communication APCC 2003 (9th : 2003 : Penang)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 L44 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> A methodology to detect intrusion using system call base on discriminant analysis ent://SD_ILS/0/SD_ILS:353431 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Dahliyusmanto Dahlan<br/>Author&#160;Dahliyusmanto Dahlan,&#160;Abdul Hanan Abdullah,&#160;International Symposium on Information Technology (2003 : Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D33 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Steganography : random LSB insertion using discrete logarithm ent://SD_ILS/0/SD_ILS:353448 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Muhalim Mohamed Amin<br/>Author&#160;Muhalim Mohamed Amin,&#160;Mazleena Salleh,&#160;Subariah Ibrahim,&#160;Mohd. Rozi Katmin,&#160;International Conference on Information Technology in Asia (3rd : 2003 : Kuching, Sarawak)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S734 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Enhanced algorithm of decision tree techniques in data mining-based intrusion detection system ent://SD_ILS/0/SD_ILS:351693 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Masrul Amri Kamarudin<br/>Author&#160;Masrul Amri Kamarudin,&#160;Mohd. Aizaini Maarof,&#160;Subariah Ibrahim,&#160;International Symposium on Information Technology (2003 : Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D343 M37 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Detection and prevention of DoS attacks using intrusion detection system : intelligent nethost-sensor ent://SD_ILS/0/SD_ILS:352966 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Pathmenanthan Ramakrishna<br/>Author&#160;Pathmenanthan Ramakrishna,&#160;Mohd. Aizaini Maarof,&#160;International Technical Conference on Circuits, System, Computers and Communications (2003 : Kang-Won Do, Korea)<br/>Format:&#160;Books<br/>Call Number&#160;TH9739 P37 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Intrusion classification for intrusion detection system using system calls method : design and methodology for attack classification ent://SD_ILS/0/SD_ILS:353396 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Pathmenanthan Ramakrishna<br/>Author&#160;Pathmenanthan Ramakrishna,&#160;Mohd. Aizaini Maarof,&#160;International Symposium on Information Technology (2003 : Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P374 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Access controlling firewall using Bell-LaPadula security model ent://SD_ILS/0/SD_ILS:353549 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Cahyo Crysdian<br/>Author&#160;Cahyo Crysdian,&#160;Abdul Hanan Abdullah,&#160;Quality in Research Seminar (6th : 2003 : Indonesia)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C33 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Towards anomalous behaviour detection for intrusion detection system ent://SD_ILS/0/SD_ILS:358822 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Pathmenanthan Ramakrishna<br/>Author&#160;Pathmenanthan Ramakrishna,&#160;Mohd. Aizaini Maarof,&#160;Seminar on Artificial Intelligence Applications in Industry (2003 : Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P375 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Information hiding using steganography ent://SD_ILS/0/SD_ILS:358844 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Muhalim Mohamed Amin<br/>Author&#160;Muhalim Mohamed Amin,&#160;Mazleena Salleh,&#160;Subariah Ibrahim,&#160;M. R. Katmin,&#160;National Conference on Telecommunication Technology (4th : 2003 : Shah Alam, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M83 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Response spectrum analysis computer program for multi-story building under earthquake ground motion ent://SD_ILS/0/SD_ILS:305820 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Azlan Adnan<br/>Author&#160;Azlan Adnan,&#160;Mohd. Nur Asmawisham Alel,&#160;International Conference on Disaster Management :Strengthening the National Security Capabilities (3rd : 2002 : Sarawak)<br/>Format:&#160;Books<br/>Call Number&#160;TA654.6 A95 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Database encrytion schemes : a comparative study ent://SD_ILS/0/SD_ILS:351511 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.,&#160;Norbik Bashah Idris,&#160;Harihodin Selamat,&#160;Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Z34 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Auditors' introduction to crytography and its application in database security ent://SD_ILS/0/SD_ILS:345848 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.,&#160;Norbik Bashah Idris,&#160;Harihodin Selamat,&#160;International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 Z34 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> A novel key recovery scheme implemented in public key infrastructure ent://SD_ILS/0/SD_ILS:316205 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Teoh, Su Chi<br/>Author&#160;Teoh, Su Chi,&#160;Norbik Bashah Idris,&#160;World Engineering Congress (2nd : 2002 : Sarawak, Malaysia)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T48 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Detection of DoS attacks using intrusion detection sensors ent://SD_ILS/0/SD_ILS:322034 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Pathmenanthan Ramakrishna<br/>Author&#160;Pathmenanthan Ramakrishna,&#160;Mohd. Aizaini Maarof,&#160;Asia Pacific Optical and Wireless Communication Conference (2002: Shanghai, China)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P37 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Detection &amp; prevention of DoS attacks using intrusion detection system : design &amp; development ent://SD_ILS/0/SD_ILS:322481 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Pathmenanthan Ramakrishna<br/>Author&#160;Pathmenanthan Ramakrishna,&#160;Mohd. Aizaini Maarof,&#160;Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P376 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Digital certificate service using LDAP directory ent://SD_ILS/0/SD_ILS:322498 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Subariah Ibrahim<br/>Author&#160;Subariah Ibrahim,&#160;Son, Yeo Yiin,&#160;Mazleena Salleh,&#160;Lui, Yeok Peng,&#160;Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D53 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Packet filtering personal firewall based on microsoft's internet protocol helper API ent://SD_ILS/0/SD_ILS:326714 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Abdul Hanan Abdullah<br/>Author&#160;Abdul Hanan Abdullah,&#160;Lau, Sei Ping,&#160;International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A32 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Cryptographic applications in database security : a survey study ent://SD_ILS/0/SD_ILS:326720 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.,&#160;Piper, Fred,&#160;Norbik Bashah Idris,&#160;Ciechanowicz, Zbigniew 'Chez',&#160;International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Z344 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Implementation of Brands' digital cash system in TCP/IP networking environment ent://SD_ILS/0/SD_ILS:327744 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Teo, Pock Chueng<br/>Author&#160;Teo, Pock Chueng,&#160;Ahmad Zuri Sha'ameri,&#160;Zulkarnain Mohd. Yusof,&#160;International Symposium on Information and Communications Technologies (2002 : Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;HG1710 T46 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Security of mobile agents in distributed environment ent://SD_ILS/0/SD_ILS:321475 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Afzan Zaidi<br/>Author&#160;Afzan Zaidi,&#160;Mazleena Salleh,&#160;Abdul Hanan Abdullah,&#160;Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.I58 A394 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> DoS attacks detection using intrusion detection system and system calls ent://SD_ILS/0/SD_ILS:321462 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Mohd. Aizaini Maarof<br/>Author&#160;Mohd. Aizaini Maarof,&#160;Pathmenanthan Ramakrishna,&#160;Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M346 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Security issues of mobile agents ent://SD_ILS/0/SD_ILS:322071 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Afzan Zaidi<br/>Author&#160;Afzan Zaidi,&#160;Mazleena Salleh,&#160;Abdul Hanan Abdullah,&#160;Malaysia Science and Technology Congress (2002 : Johor Bahru)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.I58 A39 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Security guidelines of electronic academic assets ent://SD_ILS/0/SD_ILS:322088 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Subariah Ibrahim<br/>Author&#160;Subariah Ibrahim,&#160;Mazleena Salleh,&#160;Shah Rizan Abdul Aziz,&#160;Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S92 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Authentication protocol : methods review ent://SD_ILS/0/SD_ILS:326821 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Cahyo Crysdian<br/>Author&#160;Cahyo Crysdian,&#160;Abdul Hanan Abdullah,&#160;International Technical Conference on Circuits, Systems, Computer and Communications (2002 : Thailand)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C35 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Implementing advance encryption standard (AES) in virtual private network environment ent://SD_ILS/0/SD_ILS:316193 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Nik Shahidah Afifi Md. Taujuddin<br/>Author&#160;Nik Shahidah Afifi Md. Taujuddin,&#160;Abdul Hanan Abdullah,&#160;Mohd. Aizaini Maarof,&#160;World Engineering Congress (2nd : 2002 : Sarawak, Malaysia)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N73 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Towards solving time gap problems through the optimization of packet capture techniques ent://SD_ILS/0/SD_ILS:353376 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Mohd. Nizam Omar<br/>Author&#160;Mohd. Nizam Omar,&#160;Mohd. Aizaini Maarof,&#160;Subariah Ibrahim,&#160;Conference on Information Technology in Asia (3rd : 2001 : Kuching, Sarawak)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5 M545 2001<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/> Mobile agent in intrusion detection system ent://SD_ILS/0/SD_ILS:301702 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Azrinda Hassan Mohamad<br/>Author&#160;Azrinda Hassan Mohamad,&#160;Abdul Hanan Abdullah,&#160;Mohd. Aizaini Maarof,&#160;International Conference on Information Technology and Multimedia (2001 : UNITEN, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.I58 A97 2001<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/> Virtual private network security ent://SD_ILS/0/SD_ILS:301707 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Nik Shahidah Afifi Md. Taujuddin<br/>Author&#160;Nik Shahidah Afifi Md. Taujuddin,&#160;Abdul Hanan Abdullah,&#160;Mohd. Aizaini Maarof,&#160;Shamsul Sahibuddin,&#160;International Conference on Information Technology and Multimedia (2001 : UNITEN, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 V57 2001<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/> Rekabentuk rangkaian dan keselamatan ent://SD_ILS/0/SD_ILS:312201 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Abdul Hanan Abdullah<br/>Author&#160;Abdul Hanan Abdullah<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A32 2001<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/> Virtual private network tunneling protocol ent://SD_ILS/0/SD_ILS:322134 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Nik Shahidah Afifi Md. Taujuddin<br/>Author&#160;Nik Shahidah Afifi Md. Taujuddin,&#160;Abdul Hanan Abdullah,&#160;Mohd. Aizaini Maarof,&#160;Malaysian Science and Technology Congress (2001 : Universiti Sains Malaysia, Pulau Pinang)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N74 2001<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/> A traceable proactive anonymous electronic cash ent://SD_ILS/0/SD_ILS:139538 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Chang, Yu Cheng<br/>Author&#160;Chang, Yu Cheng,&#160;Kamaruzzaman Seman,&#160;Jasmy Yunus,&#160;National Conference on Telecommunication Technology 2000 (2000 : Johor Bahru)<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 C42 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/> iPRO agent ent://SD_ILS/0/SD_ILS:146591 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Fazidah Othman<br/>Author&#160;Fazidah Othman,&#160;Abdul Hanan Abdullah,&#160;Malaysian Science and Technology Congress (2000 : Genting Highlands, Pahang)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 F38 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/> Risk analysis guideline for IT environment ent://SD_ILS/0/SD_ILS:123257 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Mazleena Salleh<br/>Author&#160;Mazleena Salleh,&#160;Rabiah Ahmad, Dr.,&#160;Norafida Ithnin,&#160;Subariah Ibrahim,&#160;Symposium Kebangsaan Teknologi Maklumat (2000 : Bangi, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R57 2000<br/>Publication Date&#160;2000<br/> Cryptographic protocol for payment transaction ent://SD_ILS/0/SD_ILS:136182 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Chang, Yu Cheng<br/>Author&#160;Chang, Yu Cheng,&#160;Kamaruzzaman Seman,&#160;Jasmy Yunus,&#160;TENCON '2000 (2000 : Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C42 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/> Fairness in electronic commerce ent://SD_ILS/0/SD_ILS:111811 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Chang, Yu Cheng<br/>Author&#160;Chang, Yu Cheng,&#160;Kamaruzzaman Seman,&#160;Jasmy Yunus<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 C42<br/>Publisher&#160;Universiti Teknologi malaysia,<br/>Publication Date&#160;1999&#160;1998&#160;1997&#160;1996&#160;1995<br/> Improving the effectiveness of a firewall authentication management /Abdul Hanan Abdullah, Kamarulnizam Abu Bakar, Ismandy Ali ent://SD_ILS/0/SD_ILS:122567 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Abdul Hanan Abdullah<br/>Author&#160;Abdul Hanan Abdullah,&#160;Kamarulnizam Abu Bakar,&#160;Ismandy Ali,&#160;IASTED International Conference of a Firewall Authentication Management (1999 : Santa Barbara, California)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A324 1999<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1999<br/> Practical UNIX and Internet security ent://SD_ILS/0/SD_ILS:416984 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;Garfinkel, Simson<br/>Author&#160;Garfinkel, Simson,&#160;Spafford, Gene<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.O63 G37 1996<br/>Edition&#160;2nd ed., expanded &amp; updated<br/>Publisher&#160;O'Reilly &amp; Associates,<br/>Publication Date&#160;1996<br/>ISBN&#160;9781565921481<br/> Financial transaction cards - security architecture of financial transaction systems using integrated circuit cards ent://SD_ILS/0/SD_ILS:443762 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;British Standards Institution<br/>Author&#160;British Standards Institution<br/>Format:&#160;Books<br/>Call Number&#160;PIA BS ISO 10202 : 1991<br/>Publication Date&#160;1991<br/> Key management to achieve security for financial institutions engaged in financial transactions (wholesale) ent://SD_ILS/0/SD_ILS:417449 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;British Standards Institution<br/>Author&#160;British Standards Institution<br/>Format:&#160;Books<br/>Call Number&#160;PIA BS 7205 : 1990<br/>Publisher&#160;British Standards Institutions,<br/>Publication Date&#160;1990<br/> Algorithms for use in banking message authentication ent://SD_ILS/0/SD_ILS:435299 2024-05-17T13:33:52Z 2024-05-17T13:33:52Z by&#160;British Standards Institution<br/>Author&#160;British Standards Institution<br/>Format:&#160;Books<br/>Call Number&#160;PIA BS 7102 : 1989<br/>