Search Results for Computer security - Narrowed by: Closed Access BookSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dComputer$002bsecurity$0026qf$003dITYPE$002509Material$002bType$0025091$00253ACLS_BK$002509Closed$002bAccess$002bBook$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list2024-05-17T13:33:52ZSecuring communication on active networkent://SD_ILS/0/SD_ILS:4077092024-05-17T13:33:52Z2024-05-17T13:33:52Zby Satria Mandala<br/>Author Satria Mandala, Abdul Hanan Abdullah, Md. Asri Ngadi, Konferensi Nasional Sistem Informasi (2005 : Indonesia)<br/>Format: Books<br/>Call Number TK5105.5 S27 2005<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>Spatial domain technique to embed visible and invisible wetermarkingent://SD_ILS/0/SD_ILS:4116652024-05-17T13:33:52Z2024-05-17T13:33:52Zby Akram Mohd. Zeki<br/>Author Akram Mohd. Zeki, Azizah Abdul Manaf, Sayuthi Jaafar, International Conference Information and Communication Technology in Management (2005 : Melaka)<br/>Format: Books<br/>Call Number QA76.9.A25 A37 2005<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>Estimations on the security aspect of brand's electronic cash schemeent://SD_ILS/0/SD_ILS:4016972024-05-17T13:33:52Z2024-05-17T13:33:52Zby Chang, Yu Cheng<br/>Author Chang, Yu Cheng, Jasmy Yunus, Kamaruzzaman Seman, The IEE International Conference on Advanced Information Networking and Applications (19th : 2005 : Taiwan)<br/>Format: Books<br/>Call Number HG1710 C425 2005<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>Proceedings of the 1st international symposium on bio-inspired computing BIC'05, 5-7 September 2005, The Puteri Pan Pacific Hotel Johor Bahru, Malaysiaent://SD_ILS/0/SD_ILS:4498722024-05-17T13:33:52Z2024-05-17T13:33:52Zby International Symposium on Bio-Inspired Computing (1st : 2005 : Johor Bahru, Malaysia)<br/>Author International Symposium on Bio-Inspired Computing (1st : 2005 : Johor Bahru, Malaysia), Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat, Soft Computing Research Group, Group on Artificial Immune System and Security<br/>Format: Books<br/>Call Number QA76.618 I89 2005<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>ISBN 9789834279400<br/>Applying mobile agent in distributed speech recognition using JADEent://SD_ILS/0/SD_ILS:4615142024-05-17T13:33:52Z2024-05-17T13:33:52Zby Emrul Hamide Md. Saaim<br/>Author Emrul Hamide Md. Saaim, Abdul Manan Ahmad, Mohamad Ashari Alias, Mohd. Fauzi Othman, International Conference on Computer, Communications and Signal Processing with Special Track on Biomedical Engineering (1st. : 2005 : Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.76.I58 A66 2005<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>Estimation on the security aspect of brand's electronic chas schemeent://SD_ILS/0/SD_ILS:3965362024-05-17T13:33:52Z2024-05-17T13:33:52Zby Chang, Yu Cheng<br/>Author Chang, Yu Cheng, Jasmy Yunus, Kamaruzzaman Seman, Australian Telecommunications Networks and Applications Conference (2004 : Sydney, Australia)<br/>Format: Books<br/>Call Number HG1710 C424 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Detecting outlier on intrusion detection system using data set of system callsent://SD_ILS/0/SD_ILS:3965472024-05-17T13:33:52Z2024-05-17T13:33:52Zby Dahliyusmanto Dahlan<br/>Author Dahliyusmanto Dahlan, Abdul Hanan Abdullah, International Conference on Information and Computer Science (2004 : Dhahran, Saudi Arabia)<br/>Format: Books<br/>Call Number QA76.9.A25 D335 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Public key crypto hardware for real-time security applicationent://SD_ILS/0/SD_ILS:4001652024-05-17T13:33:52Z2024-05-17T13:33:52Zby Mohamed Khalil Mohd. Hani<br/>Author Mohamed Khalil Mohd. Hani, Hau, Yuan Wen, 1980-, Lim, Kie Woon, National Real-Time Technology and Applications Symposium (2nd : 2004 Serdang, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 M54 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Ke arah pengurangan jurang masa sistem penindakbalasan pencerobohan melalui penggunaan pendekatan penjejakan pencerobohan pantasent://SD_ILS/0/SD_ILS:3536272024-05-17T13:33:52Z2024-05-17T13:33:52Zby Mohd. Nizam Omar<br/>Author Mohd. Nizam Omar, Mohd. Aizaini Maarof, Subariah Ibrahim, Persidangan Sempena Pameran Penyelidikan dan Pembangunan IPTA (2003 : Kuala Lumpur )<br/>Format: Books<br/>Call Number TK5105.59 M54 2003<br/>Publication Date 2003<br/>Counting the number of system calls to detect intrusion using discriminant analysisent://SD_ILS/0/SD_ILS:3866162024-05-17T13:33:52Z2024-05-17T13:33:52Zby Dahliyusmanto Dahlan<br/>Author Dahliyusmanto Dahlan, Abdul Hanan Abdullah, Seminar Quality in Research (2003 : Indonesia)<br/>Format: Books<br/>Call Number QA76.9.A25 D334 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Enforcing multilevel security policies for network firewallent://SD_ILS/0/SD_ILS:3521732024-05-17T13:33:52Z2024-05-17T13:33:52Zby Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, Mohd. Aizaini Maarof, International Conference Information Technology in Asia (2003 : Kuching, Sarawak)<br/>Format: Books<br/>Call Number TK5105.59 C34 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>A Benchmarking methodology for NPU-based stateful firewallent://SD_ILS/0/SD_ILS:3526122024-05-17T13:33:52Z2024-05-17T13:33:52Zby Lee, Eng Kean<br/>Author Lee, Eng Kean, Sulaiman Mohd. Nor, IEEE Asia Pacific Conference on Communication APCC 2003 (9th : 2003 : Penang)<br/>Format: Books<br/>Call Number TK5105.59 L44 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>A methodology to detect intrusion using system call base on discriminant analysisent://SD_ILS/0/SD_ILS:3534312024-05-17T13:33:52Z2024-05-17T13:33:52Zby Dahliyusmanto Dahlan<br/>Author Dahliyusmanto Dahlan, Abdul Hanan Abdullah, International Symposium on Information Technology (2003 : Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.9.A25 D33 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Steganography : random LSB insertion using discrete logarithment://SD_ILS/0/SD_ILS:3534482024-05-17T13:33:52Z2024-05-17T13:33:52Zby Muhalim Mohamed Amin<br/>Author Muhalim Mohamed Amin, Mazleena Salleh, Subariah Ibrahim, Mohd. Rozi Katmin, International Conference on Information Technology in Asia (3rd : 2003 : Kuching, Sarawak)<br/>Format: Books<br/>Call Number QA76.9.A25 S734 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Enhanced algorithm of decision tree techniques in data mining-based intrusion detection systement://SD_ILS/0/SD_ILS:3516932024-05-17T13:33:52Z2024-05-17T13:33:52Zby Masrul Amri Kamarudin<br/>Author Masrul Amri Kamarudin, Mohd. Aizaini Maarof, Subariah Ibrahim, International Symposium on Information Technology (2003 : Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.9.D343 M37 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Detection and prevention of DoS attacks using intrusion detection system : intelligent nethost-sensorent://SD_ILS/0/SD_ILS:3529662024-05-17T13:33:52Z2024-05-17T13:33:52Zby Pathmenanthan Ramakrishna<br/>Author Pathmenanthan Ramakrishna, Mohd. Aizaini Maarof, International Technical Conference on Circuits, System, Computers and Communications (2003 : Kang-Won Do, Korea)<br/>Format: Books<br/>Call Number TH9739 P37 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Intrusion classification for intrusion detection system using system calls method : design and methodology for attack classificationent://SD_ILS/0/SD_ILS:3533962024-05-17T13:33:52Z2024-05-17T13:33:52Zby Pathmenanthan Ramakrishna<br/>Author Pathmenanthan Ramakrishna, Mohd. Aizaini Maarof, International Symposium on Information Technology (2003 : Kuala Lumpur)<br/>Format: Books<br/>Call Number TK5105.59 P374 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Access controlling firewall using Bell-LaPadula security modelent://SD_ILS/0/SD_ILS:3535492024-05-17T13:33:52Z2024-05-17T13:33:52Zby Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, Quality in Research Seminar (6th : 2003 : Indonesia)<br/>Format: Books<br/>Call Number TK5105.59 C33 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Towards anomalous behaviour detection for intrusion detection systement://SD_ILS/0/SD_ILS:3588222024-05-17T13:33:52Z2024-05-17T13:33:52Zby Pathmenanthan Ramakrishna<br/>Author Pathmenanthan Ramakrishna, Mohd. Aizaini Maarof, Seminar on Artificial Intelligence Applications in Industry (2003 : Kuala Lumpur)<br/>Format: Books<br/>Call Number TK5105.59 P375 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Information hiding using steganographyent://SD_ILS/0/SD_ILS:3588442024-05-17T13:33:52Z2024-05-17T13:33:52Zby Muhalim Mohamed Amin<br/>Author Muhalim Mohamed Amin, Mazleena Salleh, Subariah Ibrahim, M. R. Katmin, National Conference on Telecommunication Technology (4th : 2003 : Shah Alam, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 M83 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Response spectrum analysis computer program for multi-story building under earthquake ground motionent://SD_ILS/0/SD_ILS:3058202024-05-17T13:33:52Z2024-05-17T13:33:52Zby Azlan Adnan<br/>Author Azlan Adnan, Mohd. Nur Asmawisham Alel, International Conference on Disaster Management :Strengthening the National Security Capabilities (3rd : 2002 : Sarawak)<br/>Format: Books<br/>Call Number TA654.6 A95 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Database encrytion schemes : a comparative studyent://SD_ILS/0/SD_ILS:3515112024-05-17T13:33:52Z2024-05-17T13:33:52Zby Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author Zailani Mohamed Sidek, Assoc.Prof.Dr., Norbik Bashah Idris, Harihodin Selamat, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.9.A25 Z34 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Auditors' introduction to crytography and its application in database securityent://SD_ILS/0/SD_ILS:3458482024-05-17T13:33:52Z2024-05-17T13:33:52Zby Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author Zailani Mohamed Sidek, Assoc.Prof.Dr., Norbik Bashah Idris, Harihodin Selamat, International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format: Books<br/>Call Number QA76.9.D314 Z34 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>A novel key recovery scheme implemented in public key infrastructureent://SD_ILS/0/SD_ILS:3162052024-05-17T13:33:52Z2024-05-17T13:33:52Zby Teoh, Su Chi<br/>Author Teoh, Su Chi, Norbik Bashah Idris, World Engineering Congress (2nd : 2002 : Sarawak, Malaysia)<br/>Format: Books<br/>Call Number QA76.9.A25 T48 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Detection of DoS attacks using intrusion detection sensorsent://SD_ILS/0/SD_ILS:3220342024-05-17T13:33:52Z2024-05-17T13:33:52Zby Pathmenanthan Ramakrishna<br/>Author Pathmenanthan Ramakrishna, Mohd. Aizaini Maarof, Asia Pacific Optical and Wireless Communication Conference (2002: Shanghai, China)<br/>Format: Books<br/>Call Number TK5105.59 P37 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Detection & prevention of DoS attacks using intrusion detection system : design & developmentent://SD_ILS/0/SD_ILS:3224812024-05-17T13:33:52Z2024-05-17T13:33:52Zby Pathmenanthan Ramakrishna<br/>Author Pathmenanthan Ramakrishna, Mohd. Aizaini Maarof, Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format: Books<br/>Call Number TK5105.59 P376 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Digital certificate service using LDAP directoryent://SD_ILS/0/SD_ILS:3224982024-05-17T13:33:52Z2024-05-17T13:33:52Zby Subariah Ibrahim<br/>Author Subariah Ibrahim, Son, Yeo Yiin, Mazleena Salleh, Lui, Yeok Peng, Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format: Books<br/>Call Number QA76.9.A25 D53 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Packet filtering personal firewall based on microsoft's internet protocol helper APIent://SD_ILS/0/SD_ILS:3267142024-05-17T13:33:52Z2024-05-17T13:33:52Zby Abdul Hanan Abdullah<br/>Author Abdul Hanan Abdullah, Lau, Sei Ping, International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format: Books<br/>Call Number TK5105.59 A32 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Cryptographic applications in database security : a survey studyent://SD_ILS/0/SD_ILS:3267202024-05-17T13:33:52Z2024-05-17T13:33:52Zby Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author Zailani Mohamed Sidek, Assoc.Prof.Dr., Piper, Fred, Norbik Bashah Idris, Ciechanowicz, Zbigniew 'Chez', International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format: Books<br/>Call Number QA76.9.A25 Z344 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Implementation of Brands' digital cash system in TCP/IP networking environmentent://SD_ILS/0/SD_ILS:3277442024-05-17T13:33:52Z2024-05-17T13:33:52Zby Teo, Pock Chueng<br/>Author Teo, Pock Chueng, Ahmad Zuri Sha'ameri, Zulkarnain Mohd. Yusof, International Symposium on Information and Communications Technologies (2002 : Selangor)<br/>Format: Books<br/>Call Number HG1710 T46 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Security of mobile agents in distributed environmentent://SD_ILS/0/SD_ILS:3214752024-05-17T13:33:52Z2024-05-17T13:33:52Zby Afzan Zaidi<br/>Author Afzan Zaidi, Mazleena Salleh, Abdul Hanan Abdullah, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.76.I58 A394 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>DoS attacks detection using intrusion detection system and system callsent://SD_ILS/0/SD_ILS:3214622024-05-17T13:33:52Z2024-05-17T13:33:52Zby Mohd. Aizaini Maarof<br/>Author Mohd. Aizaini Maarof, Pathmenanthan Ramakrishna, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number TK5105.59 M346 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Security issues of mobile agentsent://SD_ILS/0/SD_ILS:3220712024-05-17T13:33:52Z2024-05-17T13:33:52Zby Afzan Zaidi<br/>Author Afzan Zaidi, Mazleena Salleh, Abdul Hanan Abdullah, Malaysia Science and Technology Congress (2002 : Johor Bahru)<br/>Format: Books<br/>Call Number QA76.76.I58 A39 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Security guidelines of electronic academic assetsent://SD_ILS/0/SD_ILS:3220882024-05-17T13:33:52Z2024-05-17T13:33:52Zby Subariah Ibrahim<br/>Author Subariah Ibrahim, Mazleena Salleh, Shah Rizan Abdul Aziz, Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format: Books<br/>Call Number QA76.9.A25 S92 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Authentication protocol : methods reviewent://SD_ILS/0/SD_ILS:3268212024-05-17T13:33:52Z2024-05-17T13:33:52Zby Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, International Technical Conference on Circuits, Systems, Computer and Communications (2002 : Thailand)<br/>Format: Books<br/>Call Number QA76.9.A25 C35 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Implementing advance encryption standard (AES) in virtual private network environmentent://SD_ILS/0/SD_ILS:3161932024-05-17T13:33:52Z2024-05-17T13:33:52Zby Nik Shahidah Afifi Md. Taujuddin<br/>Author Nik Shahidah Afifi Md. Taujuddin, Abdul Hanan Abdullah, Mohd. Aizaini Maarof, World Engineering Congress (2nd : 2002 : Sarawak, Malaysia)<br/>Format: Books<br/>Call Number TK5105.59 N73 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Towards solving time gap problems through the optimization of packet capture techniquesent://SD_ILS/0/SD_ILS:3533762024-05-17T13:33:52Z2024-05-17T13:33:52Zby Mohd. Nizam Omar<br/>Author Mohd. Nizam Omar, Mohd. Aizaini Maarof, Subariah Ibrahim, Conference on Information Technology in Asia (3rd : 2001 : Kuching, Sarawak)<br/>Format: Books<br/>Call Number TK5105.5 M545 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Mobile agent in intrusion detection systement://SD_ILS/0/SD_ILS:3017022024-05-17T13:33:52Z2024-05-17T13:33:52Zby Azrinda Hassan Mohamad<br/>Author Azrinda Hassan Mohamad, Abdul Hanan Abdullah, Mohd. Aizaini Maarof, International Conference on Information Technology and Multimedia (2001 : UNITEN, Selangor)<br/>Format: Books<br/>Call Number QA76.76.I58 A97 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Virtual private network securityent://SD_ILS/0/SD_ILS:3017072024-05-17T13:33:52Z2024-05-17T13:33:52Zby Nik Shahidah Afifi Md. Taujuddin<br/>Author Nik Shahidah Afifi Md. Taujuddin, Abdul Hanan Abdullah, Mohd. Aizaini Maarof, Shamsul Sahibuddin, International Conference on Information Technology and Multimedia (2001 : UNITEN, Selangor)<br/>Format: Books<br/>Call Number TK5105.59 V57 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Rekabentuk rangkaian dan keselamatanent://SD_ILS/0/SD_ILS:3122012024-05-17T13:33:52Z2024-05-17T13:33:52Zby Abdul Hanan Abdullah<br/>Author Abdul Hanan Abdullah<br/>Format: Books<br/>Call Number QA76.9.A25 A32 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Virtual private network tunneling protocolent://SD_ILS/0/SD_ILS:3221342024-05-17T13:33:52Z2024-05-17T13:33:52Zby Nik Shahidah Afifi Md. Taujuddin<br/>Author Nik Shahidah Afifi Md. Taujuddin, Abdul Hanan Abdullah, Mohd. Aizaini Maarof, Malaysian Science and Technology Congress (2001 : Universiti Sains Malaysia, Pulau Pinang)<br/>Format: Books<br/>Call Number TK5105.59 N74 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>A traceable proactive anonymous electronic cashent://SD_ILS/0/SD_ILS:1395382024-05-17T13:33:52Z2024-05-17T13:33:52Zby Chang, Yu Cheng<br/>Author Chang, Yu Cheng, Kamaruzzaman Seman, Jasmy Yunus, National Conference on Telecommunication Technology 2000 (2000 : Johor Bahru)<br/>Format: Books<br/>Call Number TK5102.94 C42 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>iPRO agentent://SD_ILS/0/SD_ILS:1465912024-05-17T13:33:52Z2024-05-17T13:33:52Zby Fazidah Othman<br/>Author Fazidah Othman, Abdul Hanan Abdullah, Malaysian Science and Technology Congress (2000 : Genting Highlands, Pahang)<br/>Format: Books<br/>Call Number TK5105.59 F38 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Risk analysis guideline for IT environmentent://SD_ILS/0/SD_ILS:1232572024-05-17T13:33:52Z2024-05-17T13:33:52Zby Mazleena Salleh<br/>Author Mazleena Salleh, Rabiah Ahmad, Dr., Norafida Ithnin, Subariah Ibrahim, Symposium Kebangsaan Teknologi Maklumat (2000 : Bangi, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 R57 2000<br/>Publication Date 2000<br/>Cryptographic protocol for payment transactionent://SD_ILS/0/SD_ILS:1361822024-05-17T13:33:52Z2024-05-17T13:33:52Zby Chang, Yu Cheng<br/>Author Chang, Yu Cheng, Kamaruzzaman Seman, Jasmy Yunus, TENCON '2000 (2000 : Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.9.A25 C42 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Fairness in electronic commerceent://SD_ILS/0/SD_ILS:1118112024-05-17T13:33:52Z2024-05-17T13:33:52Zby Chang, Yu Cheng<br/>Author Chang, Yu Cheng, Kamaruzzaman Seman, Jasmy Yunus<br/>Format: Books<br/>Call Number HF5548.32 C42<br/>Publisher Universiti Teknologi malaysia,<br/>Publication Date 1999 1998 1997 1996 1995<br/>Improving the effectiveness of a firewall authentication management /Abdul Hanan Abdullah, Kamarulnizam Abu Bakar, Ismandy Alient://SD_ILS/0/SD_ILS:1225672024-05-17T13:33:52Z2024-05-17T13:33:52Zby Abdul Hanan Abdullah<br/>Author Abdul Hanan Abdullah, Kamarulnizam Abu Bakar, Ismandy Ali, IASTED International Conference of a Firewall Authentication Management (1999 : Santa Barbara, California)<br/>Format: Books<br/>Call Number QA76.9.A25 A324 1999<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Practical UNIX and Internet securityent://SD_ILS/0/SD_ILS:4169842024-05-17T13:33:52Z2024-05-17T13:33:52Zby Garfinkel, Simson<br/>Author Garfinkel, Simson, Spafford, Gene<br/>Format: Books<br/>Call Number QA76.76.O63 G37 1996<br/>Edition 2nd ed., expanded & updated<br/>Publisher O'Reilly & Associates,<br/>Publication Date 1996<br/>ISBN 9781565921481<br/>Financial transaction cards - security architecture of financial transaction systems using integrated circuit cardsent://SD_ILS/0/SD_ILS:4437622024-05-17T13:33:52Z2024-05-17T13:33:52Zby British Standards Institution<br/>Author British Standards Institution<br/>Format: Books<br/>Call Number PIA BS ISO 10202 : 1991<br/>Publication Date 1991<br/>Key management to achieve security for financial institutions engaged in financial transactions (wholesale)ent://SD_ILS/0/SD_ILS:4174492024-05-17T13:33:52Z2024-05-17T13:33:52Zby British Standards Institution<br/>Author British Standards Institution<br/>Format: Books<br/>Call Number PIA BS 7205 : 1990<br/>Publisher British Standards Institutions,<br/>Publication Date 1990<br/>Algorithms for use in banking message authenticationent://SD_ILS/0/SD_ILS:4352992024-05-17T13:33:52Z2024-05-17T13:33:52Zby British Standards Institution<br/>Author British Standards Institution<br/>Format: Books<br/>Call Number PIA BS 7102 : 1989<br/>