Search Results for Computer security -- Malaysia - Narrowed by: Mazleena SallehSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dComputer$002bsecurity$002b--$002bMalaysia$0026qf$003dAUTHOR$002509Author$002509Mazleena$002bSalleh$002509Mazleena$002bSalleh$0026ps$003d300?dt=list2024-04-27T06:52:50ZSteganography : random LSB insertion using discrete logarithment://SD_ILS/0/SD_ILS:3534482024-04-27T06:52:50Z2024-04-27T06:52:50Zby Muhalim Mohamed Amin<br/>Author Muhalim Mohamed Amin, Mazleena Salleh, Subariah Ibrahim, Mohd. Rozi Katmin, International Conference on Information Technology in Asia (3rd : 2003 : Kuching, Sarawak)<br/>Format: Books<br/>Call Number QA76.9.A25 S734 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Information hiding using steganographyent://SD_ILS/0/SD_ILS:3588442024-04-27T06:52:50Z2024-04-27T06:52:50Zby Muhalim Mohamed Amin<br/>Author Muhalim Mohamed Amin, Mazleena Salleh, Subariah Ibrahim, M. R. Katmin, National Conference on Telecommunication Technology (4th : 2003 : Shah Alam, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 M83 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Secure E-voting with blind signatureent://SD_ILS/0/SD_ILS:3274562024-04-27T06:52:50Z2024-04-27T06:52:50Zby Subariah Ibrahim<br/>Author Subariah Ibrahim, Maznah Kamat, 1960-, Mazleena Salleh, Shah Rizan Abdul Aziz, National Conference on Telecommunication Technology (4th : 2003 : Shah Alam, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 S424 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Digital certificate service using LDAP directoryent://SD_ILS/0/SD_ILS:3224982024-04-27T06:52:50Z2024-04-27T06:52:50Zby Subariah Ibrahim<br/>Author Subariah Ibrahim, Son, Yeo Yiin, Mazleena Salleh, Lui, Yeok Peng, Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format: Books<br/>Call Number QA76.9.A25 D53 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Security of mobile agents in distributed environmentent://SD_ILS/0/SD_ILS:3214752024-04-27T06:52:50Z2024-04-27T06:52:50Zby Afzan Zaidi<br/>Author Afzan Zaidi, Mazleena Salleh, Abdul Hanan Abdullah, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.76.I58 A394 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Security issues of mobile agentsent://SD_ILS/0/SD_ILS:3220712024-04-27T06:52:50Z2024-04-27T06:52:50Zby Afzan Zaidi<br/>Author Afzan Zaidi, Mazleena Salleh, Abdul Hanan Abdullah, Malaysia Science and Technology Congress (2002 : Johor Bahru)<br/>Format: Books<br/>Call Number QA76.76.I58 A39 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Security guidelines of electronic academic assetsent://SD_ILS/0/SD_ILS:3220882024-04-27T06:52:50Z2024-04-27T06:52:50Zby Subariah Ibrahim<br/>Author Subariah Ibrahim, Mazleena Salleh, Shah Rizan Abdul Aziz, Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format: Books<br/>Call Number QA76.9.A25 S92 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Risk analysis guideline for IT environmentent://SD_ILS/0/SD_ILS:1232572024-04-27T06:52:50Z2024-04-27T06:52:50Zby Mazleena Salleh<br/>Author Mazleena Salleh, Rabiah Ahmad, Dr., Norafida Ithnin, Subariah Ibrahim, Symposium Kebangsaan Teknologi Maklumat (2000 : Bangi, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 R57 2000<br/>Publication Date 2000<br/>