Search Results for Computers - Narrowed by: Computer security - Data protectionSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dComputers$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection$002509Data$002bprotection$0026ps$003d300$0026isd$003dtrue?dt=list2024-06-03T13:36:54ZFactors affecting the information security awareness in maldives customs serviceent://SD_ILS/0/SD_ILS:8593692024-06-03T13:36:54Z2024-06-03T13:36:54Zby Ibrahim Naaif, 1987-, author<br/>Author Ibrahim Naaif, 1987-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 I27 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>Factors affecting the information security awareness in maldives customs serviceent://SD_ILS/0/SD_ILS:8595642024-06-03T13:36:54Z2024-06-03T13:36:54Zby Ibrahim Naaif, 1987-, author<br/>Author Ibrahim Naaif, 1987-, author, Zuraini Ismail, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034727 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>A security awareness model of data leakage prevention in private sectorent://SD_ILS/0/SD_ILS:8598942024-06-03T13:36:54Z2024-06-03T13:36:54Zby Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author<br/>Author Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author, Mohd. Shahidan Abdullah, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 A366 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>Security policies and implementation issuesent://SD_ILS/0/SD_ILS:8391312024-06-03T13:36:54Z2024-06-03T13:36:54Zby Johnson, Robert, 1946- author<br/>Author Johnson, Robert, 1946- author<br/>Format: Books<br/>Call Number TK5105.59 J64 2015<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2015<br/>ISBN 9781284055993<br/>A security awareness model of data leakage prevention in private sectorent://SD_ILS/0/SD_ILS:8607842024-06-03T13:36:54Z2024-06-03T13:36:54Zby Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author<br/>Author Ain'natul Mardhiah Mohamad Hasbullah, 1990-, author, Mohd. Shahidan Abdullah, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034789 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>A virus disaster recovery plan framework for academic computing centerent://SD_ILS/0/SD_ILS:8254882024-06-03T13:36:54Z2024-06-03T13:36:54Zby Mohamed Ismail Gurhan, 1985-<br/>Author Mohamed Ismail Gurhan, 1985-, Norafida Ithnin, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.76.C68 M64 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Introduction to computer and network security : navigating shades of grayent://SD_ILS/0/SD_ILS:8052892024-06-03T13:36:54Z2024-06-03T13:36:54Zby Brooks, Richard R.<br/>Author Brooks, Richard R.<br/>Format: Books<br/>Call Number QA76.9.A25 B76 2014<br/>Publisher Chapman and Hall/CRC,<br/>Publication Date 2014 2013<br/>ISBN 9781439860717<br/>Information security awareness and training program study on Wahda Bank-Libyaent://SD_ILS/0/SD_ILS:8310962024-06-03T13:36:54Z2024-06-03T13:36:54Zby Abubaker Essid Abuhtera, 1966-, author<br/>Author Abubaker Essid Abuhtera, 1966-, author, Norbik Bashah Idris, Dato’ Prof. Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 A284 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Information security awareness and training program study on Wahda Bank-Libyaent://SD_ILS/0/SD_ILS:8310972024-06-03T13:36:54Z2024-06-03T13:36:54Zby Abubaker Essid Abuhtera, 1966-, author<br/>Author Abubaker Essid Abuhtera, 1966-, author, Norbik Bashah Idris, Dato’ Prof. Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034198 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>A virus disaster recovery plan framework for academic computing centerent://SD_ILS/0/SD_ILS:8255332024-06-03T13:36:54Z2024-06-03T13:36:54Zby Mohamed Ismail Gurhan, 1985-<br/>Author Mohamed Ismail Gurhan, 1985-, Norafida Ithnin<br/>Format: Books<br/>Call Number CP 050530 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Assessing the employees awareness and usage of information security policy in federal inland revenue service, Nigeriaent://SD_ILS/0/SD_ILS:8259202024-06-03T13:36:54Z2024-06-03T13:36:54Zby Wadzani Aduwamai Gadzama, 1983-<br/>Author Wadzani Aduwamai Gadzama, 1983-, Siti Hajar Othman, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 W33 2014 raf<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Assessing the employees awareness and usage of information security policy in federal inland revenue service, Nigeriaent://SD_ILS/0/SD_ILS:8259252024-06-03T13:36:54Z2024-06-03T13:36:54Zby Wadzani Aduwamai Gadzama, 1983-<br/>Author Wadzani Aduwamai Gadzama, 1983-, Siti Hajar Othman<br/>Format: Books<br/>Call Number CP 050841 ra<br/>Publication Date 2014<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2014<br/>Analyzing security, trust, and crime in the digital worldent://SD_ILS/0/SD_ILS:8412042024-06-03T13:36:54Z2024-06-03T13:36:54Zby Nemati, Hamid R., 1958- editor<br/>Author Nemati, Hamid R., 1958- editor<br/>Format: Books<br/>Call Number HF5548.37 A53 2014 f<br/>Publisher Information Science Reference,<br/>Publication Date 2014<br/>ISBN 9781466648562<br/>Framework of human behavior to mitigate the insider threatent://SD_ILS/0/SD_ILS:8034832024-06-03T13:36:54Z2024-06-03T13:36:54Zby Jihad Wajeeh Badawi, 1988-<br/>Author Jihad Wajeeh Badawi, 1988-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 J54 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Credential purpose-based access control for personal data protection in web-based applicationsent://SD_ILS/0/SD_ILS:8091062024-06-03T13:36:54Z2024-06-03T13:36:54Zby Norjihan Abdul Ghani, 1977- , author<br/>Author Norjihan Abdul Ghani, 1977- , author, Harihodin Selamat, Zailani Mohamed Sidek, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 N676 2013 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2013<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Kesedaran keselamatan maklumat terhadap pengguna dan amalan yang selamat berkaitan pengguna rangkaian sosial Facebookent://SD_ILS/0/SD_ILS:8114292024-06-03T13:36:54Z2024-06-03T13:36:54Zby Ahmad Syahrul Anuar Saidi, 1986-<br/>Author Ahmad Syahrul Anuar Saidi, 1986-, Norafida Ithnin, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 A36 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Kesedaran keselamatan maklumat terhadap pengguna dan amalan yang selamat berkaitan pengguna rangkaian sosial Facebookent://SD_ILS/0/SD_ILS:8114322024-06-03T13:36:54Z2024-06-03T13:36:54Zby Ahmad Syahrul Anuar Saidi, 1986-<br/>Author Ahmad Syahrul Anuar Saidi, 1986-<br/>Format: Books<br/>Call Number CP 031199 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Development of metamodel for information security risk managementent://SD_ILS/0/SD_ILS:8116462024-06-03T13:36:54Z2024-06-03T13:36:54Zby Mohammed Salem Mohammed Ba Muqabel, 1988-<br/>Author Mohammed Salem Mohammed Ba Muqabel, 1988-, Siti Hajar Othman, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 M648 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Komputer Sains (Pengawalan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Steganography in GIF animated grayscale imagesent://SD_ILS/0/SD_ILS:8116692024-06-03T13:36:54Z2024-06-03T13:36:54Zby Massalin Yerlan, 1976-<br/>Author Massalin Yerlan, 1976-, Majid Bakhtiari, Dr., Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 M379 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Steganography in GIF animated grayscale imagesent://SD_ILS/0/SD_ILS:8116702024-06-03T13:36:54Z2024-06-03T13:36:54Zby Massalin Yerlan, 1976-<br/>Author Massalin Yerlan, 1976-<br/>Format: Books<br/>Call Number CP 031190 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Framework of human behavior to mitigate the insider threatent://SD_ILS/0/SD_ILS:8034862024-06-03T13:36:54Z2024-06-03T13:36:54Zby Jihad Wajeeh Badawi, 1988-<br/>Author Jihad Wajeeh Badawi, 1988-<br/>Format: Books<br/>Call Number CP 029824 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:8052872024-06-03T13:36:54Z2024-06-03T13:36:54Zby Williams, Barry L.<br/>Author Williams, Barry L.<br/>Format: Books<br/>Call Number QA76.9.A25 W55 2013<br/>Publisher CRC Press, Taylor & Francis Group,<br/>Publication Date 2013<br/>ISBN 9781466580589<br/>A new steganography technique using Knight's Tour algorithm, Affine Cipher and Huffman Codingent://SD_ILS/0/SD_ILS:8117442024-06-03T13:36:54Z2024-06-03T13:36:54Zby Alla Talib Mohsin, 1986-<br/>Author Alla Talib Mohsin, 1986-, Ghazali Sulong, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 A453 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>A new steganography technique using Knight's Tour algorithm, Affine Cipher and Huffman Codingent://SD_ILS/0/SD_ILS:8117462024-06-03T13:36:54Z2024-06-03T13:36:54Zby Alla Talib Mohsin, 1986-<br/>Author Alla Talib Mohsin, 1986-<br/>Format: Books<br/>Call Number CP 031153 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Data hiding : exposing concealed data in multimedia, operating systems, mobile devices and network protocolsent://SD_ILS/0/SD_ILS:8184482024-06-03T13:36:54Z2024-06-03T13:36:54Zby Raggo, Michael T., author<br/>Author Raggo, Michael T., author, Hosmer, Chet, author, McGrew, Wesley, editor<br/>Format: Books<br/>Call Number QA76.9.A25 R346 2013<br/>Edition 1st ed.<br/>Publisher Syngress,<br/>Publication Date 2013<br/>ISBN 9781597497435<br/>Pragmatic security metrics : applying metametrics to information securityent://SD_ILS/0/SD_ILS:8211582024-06-03T13:36:54Z2024-06-03T13:36:54Zby Brotby, W. Krag<br/>Author Brotby, W. Krag, Hinson, Gary, Kabay, M.E.<br/>Format: Books<br/>Call Number QA76.9.A25 B76 2013<br/>Publisher CRC Press,<br/>Publication Date 2013<br/>ISBN 9781439881521<br/>Analyzing computer security : a threat/vulnerability/countermeasure approachent://SD_ILS/0/SD_ILS:7800022024-06-03T13:36:54Z2024-06-03T13:36:54Zby Pfleeger, Charles P., 1948-<br/>Author Pfleeger, Charles P., 1948-, Pfleeger, Shari Lawrence<br/>Format: Books<br/>Call Number QA76.9.A25 P45 2012<br/>Publisher Prentice Hall,<br/>Publication Date 2012<br/>ISBN 9780132789462<br/>Cyber security standards, practices and industrial applications : systems and methodologiesent://SD_ILS/0/SD_ILS:7729752024-06-03T13:36:54Z2024-06-03T13:36:54Zby Zubairi, Junaid Ahmed, 1961-<br/>Author Zubairi, Junaid Ahmed, 1961-, Mahboob, Athar, 1971-<br/>Format: Books<br/>Call Number TK5105.59 C93 2012 f<br/>Publisher Information Science Reference,<br/>Publication Date 2012<br/>ISBN 9781609608514 9781609608521 9781609608538<br/>Information security behaviours in enhancing awarenessent://SD_ILS/0/SD_ILS:8375902024-06-03T13:36:54Z2024-06-03T13:36:54Zby Sasan Karami Zadeh<br/>Author Sasan Karami Zadeh, Zuraini Ismail, supervisor, Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number QA76.9.A25 S273 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Information security awareness framework among clerical staff in islamic religious councilent://SD_ILS/0/SD_ILS:8376852024-06-03T13:36:54Z2024-06-03T13:36:54Zby Mohd Talhah Anuar<br/>Author Mohd Talhah Anuar, Bharanidharan Shanmugam, Dr., Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M6438 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Information security awareness framework among clerical staff in islamic religious councilent://SD_ILS/0/SD_ILS:8376862024-06-03T13:36:54Z2024-06-03T13:36:54Zby Mohd Talhah Anuar<br/>Author Mohd Talhah Anuar<br/>Format: Books<br/>Call Number CP 034141 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Information security behaviours in enhancing awarenessent://SD_ILS/0/SD_ILS:8375922024-06-03T13:36:54Z2024-06-03T13:36:54Zby Sasan Karami Zadeh<br/>Author Sasan Karami Zadeh<br/>Format: Books<br/>Call Number CP 034152 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Analyzing security behaviour in managing passwords among staffs of community collegesent://SD_ILS/0/SD_ILS:8405052024-06-03T13:36:54Z2024-06-03T13:36:54Zby Hazila Hasan, 1981-<br/>Author Hazila Hasan, 1981-, Mohd. Shahidan Abdullah, Dr., Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number QA76.9.A25 H396 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Information assurance and security ethics in complex systems : interdisciplinary perspectivesent://SD_ILS/0/SD_ILS:6304272024-06-03T13:36:54Z2024-06-03T13:36:54Zby Dark, Melissa Jane, 1961-<br/>Author Dark, Melissa Jane, 1961-<br/>Format: Books<br/>Call Number QA76.9.A25 I545 2011 f<br/>Publisher Information Science Reference,<br/>Publication Date 2011<br/>ISBN 9781616922450 9781616922467<br/>Online consecutive secure multi-party computation algorithm for preserving privacyent://SD_ILS/0/SD_ILS:7762672024-06-03T13:36:54Z2024-06-03T13:36:54Zby Abdolreza Rasouli Kenari, 1979-<br/>Author Abdolreza Rasouli Kenari, 1979-, Mohd. Aizaini Maarof, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A23 2011 raf<br/>Publication Date 2011<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2011<br/>Online consecutive secure multi-party computation algorithm for preserving privacyent://SD_ILS/0/SD_ILS:7778612024-06-03T13:36:54Z2024-06-03T13:36:54Zby Abdolreza Rasouli Kenari<br/>Author Abdolreza Rasouli Kenari<br/>Format: Books<br/>Call Number CP 028869 ra<br/>Publication Date 2011<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2011<br/>Information security evaluation : a holistic approachent://SD_ILS/0/SD_ILS:7811512024-06-03T13:36:54Z2024-06-03T13:36:54Zby Tashi, Igli<br/>Author Tashi, Igli, Ghernaouti-Helie, Solange<br/>Format: Books<br/>Call Number TK5105.59 T374 2011<br/>Publisher EFPL Pr.,<br/>Publication Date 2011<br/>ISBN 9781439879153<br/>Collaborative computer security and trust managementent://SD_ILS/0/SD_ILS:6319942024-06-03T13:36:54Z2024-06-03T13:36:54Zby Seigneur, Jean-Marc<br/>Author Seigneur, Jean-Marc, Slagell, Adam, 1977-<br/>Format: Books<br/>Call Number QA76.9.A25 C656 2010 f<br/>Publisher Information Science Reference,<br/>Publication Date 2010<br/>ISBN 9781605664149 9781605664156<br/>Journal of computer securityent://SD_ILS/0/SD_ILS:6402072024-06-03T13:36:54Z2024-06-03T13:36:54Zby Jajodia, Sushil<br/>Author Jajodia, Sushil, Millen, Jonathan<br/>Format: Books<br/>Call Number QA76.9.A25 J684 2010<br/>Publisher IOS Pr.,<br/>Publication Date 2010<br/>ISBN 9781607500889<br/>The executive MBA in information securityent://SD_ILS/0/SD_ILS:6403462024-06-03T13:36:54Z2024-06-03T13:36:54Zby Trinckes, John J.<br/>Author Trinckes, John J.<br/>Format: Books<br/>Call Number HF5548.37 T75 2010<br/>Publisher CRC Press,<br/>Publication Date 2010<br/>ISBN 9781439810071<br/>Mobile device security : a comprehensive guide to securing your information in a moving worldent://SD_ILS/0/SD_ILS:6404922024-06-03T13:36:54Z2024-06-03T13:36:54Zby Fried, Stephen, 1962-<br/>Author Fried, Stephen, 1962-<br/>Format: Books<br/>Call Number HF5548.37 F75 2010<br/>Publisher Auerbach Publications,<br/>Publication Date 2010<br/>ISBN 9781439820162<br/>Data protection : governance, risk management, and complianceent://SD_ILS/0/SD_ILS:7363972024-06-03T13:36:54Z2024-06-03T13:36:54Zby Hill, David G. (David Gary), 1943-<br/>Author Hill, David G. (David Gary), 1943-<br/>Format: Books<br/>Call Number QA76.9.A25 H52 2009<br/>Publisher Taylor & Francis,<br/>Publication Date 2009<br/>ISBN 9781439806920<br/>Hacking exposed 6 : network security secrets and solutionsent://SD_ILS/0/SD_ILS:2874802024-06-03T13:36:54Z2024-06-03T13:36:54Zby McClure, Stuart<br/>Author McClure, Stuart, Scambray, Joel, Kurtz, George<br/>Format: Books<br/>Call Number QA76.9.A25 M325 2009<br/>Publisher McGraw-Hill,<br/>Publication Date 2009<br/>ISBN 9780071613743<br/>Information security management metrics : a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:2828952024-06-03T13:36:54Z2024-06-03T13:36:54Zby Brotby, W. Krag<br/>Author Brotby, W. Krag<br/>Format: Books<br/>Call Number HD30.2 B78 2009<br/>Publisher CRC Press,<br/>Publication Date 2009<br/>ISBN 9781420052855<br/>Techniques and applications for advanced information privacy and security : emerging organizational, ethical, and human issuesent://SD_ILS/0/SD_ILS:3314432024-06-03T13:36:54Z2024-06-03T13:36:54Zby Nemati, Hamid R., 1958-<br/>Author Nemati, Hamid R., 1958-<br/>Format: Books<br/>Call Number HF5548.37 T43 2009<br/>Publisher Information Science Reference,<br/>Publication Date 2009<br/>ISBN 9781605662107<br/>CISO soft skills : securing organizations impaired by employee politics, apathy, and intolerant perspectivesent://SD_ILS/0/SD_ILS:3281292024-06-03T13:36:54Z2024-06-03T13:36:54Zby Collette, Ronald D.<br/>Author Collette, Ronald D., Gentile, Michael, Gentile, Skye<br/>Format: Books<br/>Call Number HF5548.37 C64 2009<br/>Publisher CRC Press,<br/>Publication Date 2009<br/>ISBN 9781420089103<br/>Information assurance architectureent://SD_ILS/0/SD_ILS:2828922024-06-03T13:36:54Z2024-06-03T13:36:54Zby WIllett, Keith D.<br/>Author WIllett, Keith D.<br/>Format: Books<br/>Call Number QA76.9.A25 W54 2008<br/>Publisher CRC Press,<br/>Publication Date 2008<br/>ISBN 9780849380679<br/>Mastering system center data protection manager 2007ent://SD_ILS/0/SD_ILS:2866192024-06-03T13:36:54Z2024-06-03T13:36:54Zby Ganger, Devin L.<br/>Author Ganger, Devin L., Femling, Ryan, 1975-<br/>Format: Books<br/>Call Number QA76.9.A25 G36 2008<br/>Publisher Wiley Publishing,<br/>Publication Date 2008<br/>ISBN 9780470181522<br/>Privacy-preserving data mining : models and algorithmsent://SD_ILS/0/SD_ILS:2924092024-06-03T13:36:54Z2024-06-03T13:36:54Zby Aggarwal, Charu C.<br/>Author Aggarwal, Charu C., Yu, Philip S.<br/>Format: Books<br/>Call Number QA76.9.D343 P74 2008<br/>Publisher Springer,<br/>Publication Date 2008<br/>ISBN 9780387709918<br/>Computational intelligence in information assurance and securityent://SD_ILS/0/SD_ILS:1967122024-06-03T13:36:54Z2024-06-03T13:36:54Zby Nedjah, Nadia<br/>Author Nedjah, Nadia, Abraham, Ajith, 1968-, Mourelle, Luiza de Macedo<br/>Format: Books<br/>Call Number Q342 C657 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9783540710776<br/><a href="http://dx.doi.org/10.1007/978-3-540-71078-3">Full Text</a><br/>Simple computer security : disinfect your PCent://SD_ILS/0/SD_ILS:1709522024-06-03T13:36:54Z2024-06-03T13:36:54Zby Geier, Eric, 1984-<br/>Author Geier, Eric, 1984-, Geier, James T.<br/>Format: Books<br/>Call Number QA76.9.A25 G44 2007<br/>Publisher Wiley Publishing,<br/>Publication Date 2007<br/>ISBN 9780470068540<br/>Information assurance for the enterprise : a roadmap to information securityent://SD_ILS/0/SD_ILS:1034172024-06-03T13:36:54Z2024-06-03T13:36:54Zby Schou, Corey<br/>Author Schou, Corey, Shoemaker, Dan<br/>Format: Books<br/>Call Number QA76.9.A25 S365 2007<br/>Publisher McGraw-Hill/Irwin,<br/>Publication Date 2007<br/>ISBN 9780072255249<br/>Conceptualising and developing information security awareness and training programme. Case study : Malaysian financial sectorent://SD_ILS/0/SD_ILS:1495662024-06-03T13:36:54Z2024-06-03T13:36:54Zby Norashikin Shariff<br/>Author Norashikin Shariff<br/>Format: Books<br/>Call Number QA76.9.A25 N679 2007 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2007<br/>K9 web protectionent://SD_ILS/0/SD_ILS:5799382024-06-03T13:36:54Z2024-06-03T13:36:54Zby Geier, Eric, 1984-<br/>Author Geier, Eric, 1984-, Geier, James T.<br/>Format: Computer file<br/>Call Number CP 11500<br/>Publisher Wiley Publishing,<br/>Publication Date 2007<br/>Advances in enterprise information technology securityent://SD_ILS/0/SD_ILS:3011122024-06-03T13:36:54Z2024-06-03T13:36:54Zby Khadraoui, Djamel<br/>Author Khadraoui, Djamel, Herrmann, Francine<br/>Format: Books<br/>Call Number HF5548.37 A38 2007<br/>Publisher IGI Global,<br/>Publication Date 2007<br/>ISBN 9781599040905<br/>Information security : design, implementation, measurement and complianceent://SD_ILS/0/SD_ILS:1021872024-06-03T13:36:54Z2024-06-03T13:36:54Zby Layton, Timothy P.<br/>Author Layton, Timothy P.<br/>Format: Books<br/>Call Number HF5548.37 L39 2007<br/>Publisher Auerbach Pub.,<br/>Publication Date 2007<br/>ISBN 9780849370878<br/>Cybersecurity for SCADA systemsent://SD_ILS/0/SD_ILS:1950262024-06-03T13:36:54Z2024-06-03T13:36:54Zby Shaw, William T.<br/>Author Shaw, William T.<br/>Format: Books<br/>Call Number TJ222 S52 2006<br/>Publisher PennWell Corporation,<br/>Publication Date 2006<br/>ISBN 9781593700683<br/>Privacy protection for e-servicesent://SD_ILS/0/SD_ILS:1079012024-06-03T13:36:54Z2024-06-03T13:36:54Zby Yee, George<br/>Author Yee, George<br/>Format: Books<br/>Call Number HF5548.37 P74 2006<br/>Publisher Idea Group Publishing,<br/>Publication Date 2006<br/>ISBN 9781591409144<br/>The Ciso handbook : a practical guide to securing your companyent://SD_ILS/0/SD_ILS:1566492024-06-03T13:36:54Z2024-06-03T13:36:54Zby Gentile, Mike<br/>Author Gentile, Mike, Collette, Ronald D., August, Thomas D.<br/>Format: Books<br/>Call Number HF5548.37 G46 2006<br/>Publisher Auerbach Publications,<br/>Publication Date 2006<br/>ISBN 9780849319525<br/>Securing SCADA systemsent://SD_ILS/0/SD_ILS:1121462024-06-03T13:36:54Z2024-06-03T13:36:54Zby Krutz, Ronald L., 1938-<br/>Author Krutz, Ronald L., 1938-<br/>Format: Books<br/>Call Number TS156.8 K78 2006<br/>Publisher Wiley Publishing,<br/>Publication Date 2006<br/>ISBN 9780764597879<br/>Developing information security policy : case study of Biruni Remote Sensing Center (BRSC)ent://SD_ILS/0/SD_ILS:1316702024-06-03T13:36:54Z2024-06-03T13:36:54Zby Mohamed. K. Bayoud<br/>Author Mohamed. K. Bayoud<br/>Format: Books<br/>Call Number QA76.9.A25 M525 2006 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Thesis (Sarjana Sains Komputer - Keselamatan Maklumat)) - Fakulti Sains Komputer dan Sistem Maklumat, Universiti Teknologi Malaysia, 2006<br/>Towards a more managable and secure desktop systemsent://SD_ILS/0/SD_ILS:1316882024-06-03T13:36:54Z2024-06-03T13:36:54Zby Shaharin Sulaiman<br/>Author Shaharin Sulaiman<br/>Format: Books<br/>Call Number QA76.9.A25 S526 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2006<br/>Information technology securityent://SD_ILS/0/SD_ILS:4900442024-06-03T13:36:54Z2024-06-03T13:36:54Zby Siti Rahayu Selamat<br/>Author Siti Rahayu Selamat<br/>Format: Books<br/>Call Number QA76.9 A25 I53 2006<br/>Publisher Prentice Hall,<br/>Publication Date 2006<br/>ISBN 9789833655472<br/>The security risk assessment handbook : a complete guide for performing security risk assessmentsent://SD_ILS/0/SD_ILS:4240282024-06-03T13:36:54Z2024-06-03T13:36:54Zby Landoll, Douglas J.<br/>Author Landoll, Douglas J.<br/>Format: Books<br/>Call Number HE5548.37 L36 2006<br/>Publisher Auerbach Publications,<br/>Publication Date 2006<br/>ISBN 9780849329982<br/>Information technology security & risk managementent://SD_ILS/0/SD_ILS:4671512024-06-03T13:36:54Z2024-06-03T13:36:54Zby Slay, Jill<br/>Author Slay, Jill, Koronios, Andy<br/>Format: Books<br/>Call Number QA76.9.A25 S54 2006<br/>Publisher John Wiley & Sons Australia,<br/>Publication Date 2006<br/>ISBN 9780470805749<br/>Information security risk assessment at JHEV-ATM develop and implementation of risk assessment methodent://SD_ILS/0/SD_ILS:4768772024-06-03T13:36:54Z2024-06-03T13:36:54Zby Nik Zalbiha Nik Mat<br/>Author Nik Zalbiha Nik Mat<br/>Format: Books<br/>Call Number HF5548.37 N92 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2006<br/>Data security and privacy law : combating cyberthreatsent://SD_ILS/0/SD_ILS:1342162024-06-03T13:36:54Z2024-06-03T13:36:54Zby Cronin, Kevin P.<br/>Author Cronin, Kevin P., Weikers, Ronald N.<br/>Format: Books<br/>Call Number KF1263.C65 C76 2006<br/>Publisher Thomson/West,<br/>Publication Date 2006<br/>Information assurance : security in the information environmentent://SD_ILS/0/SD_ILS:945472024-06-03T13:36:54Z2024-06-03T13:36:54Zby Blyth, Andrew, 1966-<br/>Author Blyth, Andrew, 1966-, Kovacich, Gerald L.<br/>Format: Books<br/>Call Number QA76.9.A25 B59 2006<br/>Edition 2nd ed.<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9781846282669<br/>IT governance : a managers guide to data security and BS 7799/ISO 17799ent://SD_ILS/0/SD_ILS:1269642024-06-03T13:36:54Z2024-06-03T13:36:54Zby Calder, Alan, 1957-<br/>Author Calder, Alan, 1957-, Watkins, Steve, 1970-<br/>Format: Books<br/>Call Number QA76.9.A25 C346 2005<br/>Edition 3rd ed.<br/>Publisher Kogan Page,<br/>Publication Date 2005<br/>ISBN 9780749446505<br/>A practical guide to security assessmentsent://SD_ILS/0/SD_ILS:1566642024-06-03T13:36:54Z2024-06-03T13:36:54Zby Kairab, Sudhanshu<br/>Author Kairab, Sudhanshu<br/>Format: Books<br/>Call Number HF5548.32 K344 2005<br/>Publisher Auerbach Publications,<br/>Publication Date 2005<br/>ISBN 9780849317064<br/>Spatial domain technique to embed visible and invisible wetermarkingent://SD_ILS/0/SD_ILS:4116652024-06-03T13:36:54Z2024-06-03T13:36:54Zby Akram Mohd. Zeki<br/>Author Akram Mohd. Zeki, Azizah Abdul Manaf, Sayuthi Jaafar, International Conference Information and Communication Technology in Management (2005 : Melaka)<br/>Format: Books<br/>Call Number QA76.9.A25 A37 2005<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>Assessing and managing security risk in IT systems : a structured methodologyent://SD_ILS/0/SD_ILS:4230802024-06-03T13:36:54Z2024-06-03T13:36:54Zby McCumber, John, 1956-<br/>Author McCumber, John, 1956-<br/>Format: Books<br/>Call Number QA76.9.A25 M324 2005<br/>Publisher Auerbach Publications,<br/>Publication Date 2005 2004<br/>ISBN 9780849322327<br/>The business case for network security : advocacy, governance, and ROIent://SD_ILS/0/SD_ILS:4442242024-06-03T13:36:54Z2024-06-03T13:36:54Zby Paquet, Cathrine<br/>Author Paquet, Cathrine, Saxe, Warren<br/>Format: Books<br/>Call Number TK5105.59 P36 2005<br/>Publisher Cisco Press,<br/>Publication Date 2005<br/>ISBN 9781587201219<br/>Comparing image quality of different steganographic techniquesent://SD_ILS/0/SD_ILS:4435122024-06-03T13:36:54Z2024-06-03T13:36:54Zby Azizah Abdul Manaf<br/>Author Azizah Abdul Manaf, Akram Mohd. Zeki, Sayuthi Jaafar, Salehuddin A. Kadir, International Conference on Information Technology and Multimedia (2005 : UNITEN, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 C655 2005<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>Implementing database security and auditing : a guide for DBAs, information security administrators and auditorsent://SD_ILS/0/SD_ILS:4544162024-06-03T13:36:54Z2024-06-03T13:36:54Zby Ben-Natan, Ron<br/>Author Ben-Natan, Ron<br/>Format: Books<br/>Call Number QA76.9.A25 B46 2005<br/>Publisher Elsevier Digital Press,<br/>Publication Date 2005<br/>ISBN 9781555583347<br/>Information security policies and procedures : a practitioner's referenceent://SD_ILS/0/SD_ILS:4140452024-06-03T13:36:54Z2024-06-03T13:36:54Zby Peltier, Thomas R.<br/>Author Peltier, Thomas R.<br/>Format: Books<br/>Call Number QA 76.9.A25P448 2004<br/>Edition 2nd ed.<br/>Publisher Auerbach Publications,<br/>Publication Date 2005 2004<br/>ISBN 9780849319587<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:4155112024-06-03T13:36:54Z2024-06-03T13:36:54Zby Peltier, Thomas R.<br/>Author Peltier, Thomas R., Peltier, Justin, Blackley, John A.<br/>Format: Books<br/>Call Number QA76.9.A25 P444 2005<br/>Publisher CRC Press,<br/>Publication Date 2005<br/>ISBN 9780849319570<br/>Analysis of image quality for steganographic softwareent://SD_ILS/0/SD_ILS:4547702024-06-03T13:36:54Z2024-06-03T13:36:54Zby Azizah Abd. Manaf, Prof. Dr.<br/>Author Azizah Abd. Manaf, Prof. Dr., M. Z. Akram, K. Salehuddin, Sayuthi Jaafar, Brunei International Conference on Engineering and Technology (2005 : Brunei Darussalam)<br/>Format: Books<br/>Call Number QA76.9.A25 A53 2005<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>Keselamatan pelbagai aras dan capaian tanpa wayar bagi laman web e-lelong warga UTM menggunakan teknologi asp. netent://SD_ILS/0/SD_ILS:6054442024-06-03T13:36:54Z2024-06-03T13:36:54Zby Mohd. Syaiful Adli Mohd<br/>Author Mohd. Syaiful Adli Mohd<br/>Format: Computer file<br/>Call Number CP 013937<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2004<br/>Information security intelligence : cryptographic principles and applicationsent://SD_ILS/0/SD_ILS:6079342024-06-03T13:36:54Z2024-06-03T13:36:54Zby Calabrese, Thomas<br/>Author Calabrese, Thomas<br/>Format: Computer file<br/>Call Number CP 5816<br/>Publisher Thomson Delmar Learning,<br/>Publication Date 2004<br/>ISBN 9781401837273<br/>Keselamatan pelbagai aras dan capaian tanpa wayar bagi laman web e-lelong warga UTM menggunakan teknologi asp. netent://SD_ILS/0/SD_ILS:4078992024-06-03T13:36:54Z2024-06-03T13:36:54Zby Mohd. Syaiful Adli Mohd<br/>Author Mohd. Syaiful Adli Mohd<br/>Format: Books<br/>Call Number QA76.9.A25 M79 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2004<br/>Malicious cryptography : exposing cryptovirologyent://SD_ILS/0/SD_ILS:3955292024-06-03T13:36:54Z2024-06-03T13:36:54Zby Young, Adam, 1972-<br/>Author Young, Adam, 1972-, Yung, Moti<br/>Format: Books<br/>Call Number QA 76.9 .A25 Y68 2004<br/>Publisher Wiley Pub.,<br/>Publication Date 2004<br/>ISBN 9780764549755<br/>Software forensics : collecting evidence from the scene of a digital crimeent://SD_ILS/0/SD_ILS:3961822024-06-03T13:36:54Z2024-06-03T13:36:54Zby Slade, Robert M.<br/>Author Slade, Robert M.<br/>Format: Books<br/>Call Number QA76.9.A25 S524 2004<br/>Publisher McGraw-Hill,<br/>Publication Date 2004<br/>ISBN 9780071428040<br/>The shellcoder's handbook : discovering and exploiting security holesent://SD_ILS/0/SD_ILS:4041252024-06-03T13:36:54Z2024-06-03T13:36:54Zby Koziol, Jack<br/>Author Koziol, Jack<br/>Format: Books<br/>Call Number QA 76.9.A25 S534 2004<br/>Publisher Wiley Pubs,<br/>Publication Date 2004<br/>ISBN 9780764544682<br/>Information security intelligence : cryptographic principles and applicationsent://SD_ILS/0/SD_ILS:4201472024-06-03T13:36:54Z2024-06-03T13:36:54Zby Calabrese, Thomas<br/>Author Calabrese, Thomas<br/>Format: Books<br/>Call Number QA76.9.A25 C344 2004<br/>Publisher Thomson Delmar Learning,<br/>Publication Date 2004<br/>ISBN 9781401837273<br/>Privacy protection and computer forensicsent://SD_ILS/0/SD_ILS:4203022024-06-03T13:36:54Z2024-06-03T13:36:54Zby Caloyannides, Michael A.<br/>Author Caloyannides, Michael A.<br/>Format: Books<br/>Call Number QA76.9.A25 C345 2004<br/>Edition 2nd ed.<br/>Publisher Artech House,<br/>Publication Date 2004<br/>ISBN 9781580538305<br/>Digital defence what you should know about protecting your company's assetsent://SD_ILS/0/SD_ILS:2266372024-06-03T13:36:54Z2024-06-03T13:36:54Zby Parenty, Thomas J.<br/>Author Parenty, Thomas J.<br/>Format: Books<br/>Call Number HD30.38 P37<br/>Publisher Harvard Business School Press,<br/>Publication Date 2003<br/>ISBN 9781578517794<br/>Sistem penilaian permarkahan latihan praktik (FSKSM) secara atas talianent://SD_ILS/0/SD_ILS:70712024-06-03T13:36:54Z2024-06-03T13:36:54Zby Farrah Maslina Umar<br/>Author Farrah Maslina Umar<br/>Format: Visual Materials<br/>Call Number MFL 12994<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/>Ke arah pengurangan jurang masa sistem penindakbalasan pencerobohan melalui penggunaan pendekatan penjejakan pencerobohan pantasent://SD_ILS/0/SD_ILS:3536272024-06-03T13:36:54Z2024-06-03T13:36:54Zby Mohd. Nizam Omar<br/>Author Mohd. Nizam Omar, Mohd. Aizaini Maarof, Subariah Ibrahim, Persidangan Sempena Pameran Penyelidikan dan Pembangunan IPTA (2003 : Kuala Lumpur )<br/>Format: Books<br/>Call Number TK5105.59 M54 2003<br/>Publication Date 2003<br/>Sistem maklumat dan kehadiran guru bercirikan keselamatan data menggunakan kaedah penyulitan dan teknik kawalan capaian berasaskan peranan (RBAC)ent://SD_ILS/0/SD_ILS:3621282024-06-03T13:36:54Z2024-06-03T13:36:54Zby Kamal Azizi Mohd. Yasin<br/>Author Kamal Azizi Mohd. Yasin<br/>Format: Books<br/>Call Number QA76.9.A25 K35 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2003<br/>Perisian keselamatan data menggunakan gabungan teknik penyulitan data dan teknik pemampatan dataent://SD_ILS/0/SD_ILS:3623822024-06-03T13:36:54Z2024-06-03T13:36:54Zby Norfadzila Mohd. Yusof<br/>Author Norfadzila Mohd. Yusof<br/>Format: Books<br/>Call Number QA76.9.A25 N674 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=57193">Full text</a><br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/>Sistem maklumat dan kehadiran guru bercirikan keselamatan data menggunakan kaedah penyulitan dan teknik kawalan capaian berasaskan peranan (RBAC)ent://SD_ILS/0/SD_ILS:5980132024-06-03T13:36:54Z2024-06-03T13:36:54Zby Kamal Azizi Mohd. Yasin<br/>Author Kamal Azizi Mohd. Yasin<br/>Format: Computer file<br/>Call Number CP 5533<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2003<br/>Perisian keselamatan data menggunakan gabungan teknik penyulitan data dan teknik pemampatan dataent://SD_ILS/0/SD_ILS:5999532024-06-03T13:36:54Z2024-06-03T13:36:54Zby Norfadzila Mohd. Yusof<br/>Author Norfadzila Mohd. Yusof<br/>Format: Computer file<br/>Call Number CP 5544<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/>Hacking exposed : network security secrets and solutionsent://SD_ILS/0/SD_ILS:6033422024-06-03T13:36:54Z2024-06-03T13:36:54Zby McClure, Stuart<br/>Author McClure, Stuart, Scambray, Joel, Kurtz, George<br/>Format: Computer file<br/>Call Number CP 4128<br/>Edition 4th ed.<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2003<br/>Hacking exposed : network security secrets & solutionsent://SD_ILS/0/SD_ILS:3473952024-06-03T13:36:54Z2024-06-03T13:36:54Zby McClure, Stuart<br/>Author McClure, Stuart, Scambray, Joel, Kurtz, George<br/>Format: Books<br/>Call Number TK5105.59 M48 2003<br/>Edition 4th ed.<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2003<br/>ISBN 9780072227420<br/>Security in computingent://SD_ILS/0/SD_ILS:3401732024-06-03T13:36:54Z2024-06-03T13:36:54Zby Pfleeger, Charles P.<br/>Author Pfleeger, Charles P., Pfleeger, Shari Lawrence<br/>Format: Books<br/>Call Number QA76.9.A25 P44 2003<br/>Edition 3rd ed.<br/>Publisher Prentice Hall,<br/>Publication Date 2003<br/>ISBN 9780130355485 9780131201996<br/>Prototaip pengesahan dan penyahkodan watermarking dalam imej digitalent://SD_ILS/0/SD_ILS:3412942024-06-03T13:36:54Z2024-06-03T13:36:54Zby Lee, Chin Keong<br/>Author Lee, Chin Keong<br/>Format: Books<br/>Call Number QA76.9.A25 L43 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/>Information hiding using steganographyent://SD_ILS/0/SD_ILS:3588442024-06-03T13:36:54Z2024-06-03T13:36:54Zby Muhalim Mohamed Amin<br/>Author Muhalim Mohamed Amin, Mazleena Salleh, Subariah Ibrahim, M. R. Katmin, National Conference on Telecommunication Technology (4th : 2003 : Shah Alam, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 M83 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Network security for dummiesent://SD_ILS/0/SD_ILS:3259402024-06-03T13:36:54Z2024-06-03T13:36:54Zby Cobb, Chey<br/>Author Cobb, Chey<br/>Format: Books<br/>Call Number TK5105 C63 2003<br/>Publisher Wiley Publishing,<br/>Publication Date 2003<br/>ISBN 9780764516795<br/>Computer and intrusion forensicsent://SD_ILS/0/SD_ILS:3415452024-06-03T13:36:54Z2024-06-03T13:36:54Zby Mohay, George M., 1945-<br/>Author Mohay, George M., 1945-<br/>Format: Books<br/>Call Number QA76.9.A25 C633 2003<br/>Publisher Artech House,<br/>Publication Date 2003<br/>ISBN 9781580533690<br/>Sistem diagnosis penyakit kulit menggunakan pendekatan berasaskan peraturanent://SD_ILS/0/SD_ILS:82842024-06-03T13:36:54Z2024-06-03T13:36:54Zby Kuang, Yee Ling<br/>Author Kuang, Yee Ling<br/>Format: Visual Materials<br/>Call Number MFL 12984<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/>Information security policies, procedures, and standards : guidelines for effective information security managementent://SD_ILS/0/SD_ILS:1679792024-06-03T13:36:54Z2024-06-03T13:36:54Zby Peltier, Thomas R.<br/>Author Peltier, Thomas R.<br/>Format: Books<br/>Call Number QA76.9.A25 P447 2002<br/>Publisher Auerbach Publications,<br/>Publication Date 2002<br/>ISBN 9780849311376<br/>Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohanent://SD_ILS/0/SD_ILS:111802024-06-03T13:36:54Z2024-06-03T13:36:54Zby Ali Yusny Daud<br/>Author Ali Yusny Daud<br/>Format: Visual Materials<br/>Call Number MFL 13917<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/>Key recovery in public key insfrastructureent://SD_ILS/0/SD_ILS:3604842024-06-03T13:36:54Z2024-06-03T13:36:54Zby Teoh, Su Chi<br/>Author Teoh, Su Chi<br/>Format: Books<br/>Call Number QA76.9.A.25 T464 2002 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Thesis (Master of Science (Computer Science)) - Universiti Teknologi Malaysia, 2002<br/>Safe and secure : secure your home network and protect your privacy onlineent://SD_ILS/0/SD_ILS:3837822024-06-03T13:36:54Z2024-06-03T13:36:54Zby Danesh, Arman<br/>Author Danesh, Arman, Lau, Felix, Mehrassa, Ali<br/>Format: Books<br/>Call Number QA76.9.A25 D36 2002<br/>Publisher Sams,<br/>Publication Date 2002<br/>ISBN 9780672322433<br/>Information assurance : managing organizational IT security risksent://SD_ILS/0/SD_ILS:7568342024-06-03T13:36:54Z2024-06-03T13:36:54Zby Boyce, Joseph George, 1951-<br/>Author Boyce, Joseph George, 1951-, Jennings, Dan Wesley, 1954-<br/>Format: Books<br/>Call Number QA76.9.A25 B69 2002<br/>Publisher Butterworth-Heinemann,<br/>Publication Date 2002<br/>ISBN 9780750673273<br/>Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohanent://SD_ILS/0/SD_ILS:6010022024-06-03T13:36:54Z2024-06-03T13:36:54Zby Ali Yusny Daud<br/>Author Ali Yusny Daud<br/>Format: Computer file<br/>Call Number CP 8375<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/>A practical guide to security engineering and information assuranceent://SD_ILS/0/SD_ILS:4240292024-06-03T13:36:54Z2024-06-03T13:36:54Zby Herrmann, Debra S.<br/>Author Herrmann, Debra S.<br/>Format: Books<br/>Call Number QA76.9.A25 H474 2002<br/>Publisher CRC Press,<br/>Publication Date 2002 2001<br/>ISBN 9780849311635<br/>Database encrytion schemes : a comparative studyent://SD_ILS/0/SD_ILS:3515112024-06-03T13:36:54Z2024-06-03T13:36:54Zby Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author Zailani Mohamed Sidek, Assoc.Prof.Dr., Norbik Bashah Idris, Harihodin Selamat, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.9.A25 Z34 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohanent://SD_ILS/0/SD_ILS:3711612024-06-03T13:36:54Z2024-06-03T13:36:54Zby Ali Yusny Daud<br/>Author Ali Yusny Daud<br/>Format: Books<br/>Call Number TK5105.59 A44 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=51186">Preview</a><br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/>An electronic commerce model utilizing data security technique = Satu model perdagangan elektronik menggunakan teknik keselamatan dataent://SD_ILS/0/SD_ILS:3490142024-06-03T13:36:54Z2024-06-03T13:36:54Zby Ab. Razak Che Hussin<br/>Author Ab. Razak Che Hussin, Mahadi Bahari, Halina Mohamed Dahlan, Rashidah Kadir<br/>Format: Books<br/>Call Number HF5548.32 E437 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Sistem pemulihan kekunci dalam infrastruktur kekunci umum bagi teleperubatanent://SD_ILS/0/SD_ILS:3085482024-06-03T13:36:54Z2024-06-03T13:36:54Zby Tan, Kieng Wei<br/>Author Tan, Kieng Wei<br/>Format: Books<br/>Call Number QA76.9.A25 T37 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/>Building an information security awareness programent://SD_ILS/0/SD_ILS:3133202024-06-03T13:36:54Z2024-06-03T13:36:54Zby Desman, Mark B<br/>Author Desman, Mark B<br/>Format: Books<br/>Call Number QA76.9.A25 D47 2002<br/>Publisher Auerbach Publications,<br/>Publication Date 2002<br/>ISBN 9780849301162<br/>A novel key recovery scheme implemented in public key infrastructureent://SD_ILS/0/SD_ILS:3162052024-06-03T13:36:54Z2024-06-03T13:36:54Zby Teoh, Su Chi<br/>Author Teoh, Su Chi, Norbik Bashah Idris, World Engineering Congress (2nd : 2002 : Sarawak, Malaysia)<br/>Format: Books<br/>Call Number QA76.9.A25 T48 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Detection of DoS attacks using intrusion detection sensorsent://SD_ILS/0/SD_ILS:3220342024-06-03T13:36:54Z2024-06-03T13:36:54Zby Pathmenanthan Ramakrishna<br/>Author Pathmenanthan Ramakrishna, Mohd. Aizaini Maarof, Asia Pacific Optical and Wireless Communication Conference (2002: Shanghai, China)<br/>Format: Books<br/>Call Number TK5105.59 P37 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Detection & prevention of DoS attacks using intrusion detection system : design & developmentent://SD_ILS/0/SD_ILS:3224812024-06-03T13:36:54Z2024-06-03T13:36:54Zby Pathmenanthan Ramakrishna<br/>Author Pathmenanthan Ramakrishna, Mohd. Aizaini Maarof, Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format: Books<br/>Call Number TK5105.59 P376 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>DoS attacks detection using intrusion detection system and system callsent://SD_ILS/0/SD_ILS:3214622024-06-03T13:36:54Z2024-06-03T13:36:54Zby Mohd. Aizaini Maarof<br/>Author Mohd. Aizaini Maarof, Pathmenanthan Ramakrishna, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number TK5105.59 M346 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Security guidelines of electronic academic assetsent://SD_ILS/0/SD_ILS:3220882024-06-03T13:36:54Z2024-06-03T13:36:54Zby Subariah Ibrahim<br/>Author Subariah Ibrahim, Mazleena Salleh, Shah Rizan Abdul Aziz, Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format: Books<br/>Call Number QA76.9.A25 S92 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Sistem penganalisa paket rangkaian ethernetent://SD_ILS/0/SD_ILS:72752024-06-03T13:36:54Z2024-06-03T13:36:54Zby Heng, Choon Tai<br/>Author Heng, Choon Tai<br/>Format: Visual Materials<br/>Call Number MFL 12589<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/>Pembelajaran matematik tingkatan satu : topik mempermudahkan hasil tambah dan hasil tolak integer positif dan negatif secara berkomputerent://SD_ILS/0/SD_ILS:73072024-06-03T13:36:54Z2024-06-03T13:36:54Zby Aidah Misran<br/>Author Aidah Misran<br/>Format: Visual Materials<br/>Call Number MFL 12219<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/>Removal of organics, nitrogen and phosphorus using membrane bioreactorent://SD_ILS/0/SD_ILS:80972024-06-03T13:36:54Z2024-06-03T13:36:54Zby Khor, Swee Loong<br/>Author Khor, Swee Loong<br/>Format: Visual Materials<br/>Call Number MFL 13001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Thesis (Sarjana Kejuruteraan (Alam Sekitar)) - Universiti Teknologi Malaysia, 2002<br/>Sistem kaunseling bercirikan keselamatan untuk sekolah bistari : pengesahan identiti penggunaent://SD_ILS/0/SD_ILS:1697662024-06-03T13:36:54Z2024-06-03T13:36:54Zby Nor Azlan Muhamed Sulong<br/>Author Nor Azlan Muhamed Sulong<br/>Format: Books<br/>Call Number QA76.9.A25 N673 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>E-learning : pakej pembelajaran asas grafik berkomputer secara online - bab atribut primitif outputent://SD_ILS/0/SD_ILS:6109982024-06-03T13:36:54Z2024-06-03T13:36:54Zby Mohd. Hafiz Haron<br/>Author Mohd. Hafiz Haron<br/>Format: Computer file<br/>Call Number MFL 11962<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Enkripsi blok pelbagai saiz menggunakan pencampur blok seimbangent://SD_ILS/0/SD_ILS:2970812024-06-03T13:36:54Z2024-06-03T13:36:54Zby Siti Zura A. Jalil @ Zainuddin<br/>Author Siti Zura A. Jalil @ Zainuddin<br/>Format: Books<br/>Call Number QA76.9.A25 S98 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Thesis (Sarjana Kejuruteraan Elektrik ) - Universiti Teknologi Malaysia, 2001<br/>Computer forensics and privacyent://SD_ILS/0/SD_ILS:3341822024-06-03T13:36:54Z2024-06-03T13:36:54Zby Caloyannides, Michael A.<br/>Author Caloyannides, Michael A.<br/>Format: Books<br/>Call Number QA76.9.A25 C34 2001<br/>Publisher Artech House,<br/>Publication Date 2001<br/>ISBN 9781580532839<br/>Security and surveillance automation in an industrial plantent://SD_ILS/0/SD_ILS:1659872024-06-03T13:36:54Z2024-06-03T13:36:54Zby Mohamed Najib Ribuan<br/>Author Mohamed Najib Ribuan<br/>Format: Books<br/>Call Number QA76.9.A25 M62 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2000<br/>Security and surveillance automation for a government buildingent://SD_ILS/0/SD_ILS:1476712024-06-03T13:36:54Z2024-06-03T13:36:54Zby Yamini Sivashankari S. Sivashunmugam<br/>Author Yamini Sivashankari S. Sivashunmugam<br/>Format: Books<br/>Call Number QA76.9.A25 Y35 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2000<br/>Risk analysis guideline for IT environmentent://SD_ILS/0/SD_ILS:1232572024-06-03T13:36:54Z2024-06-03T13:36:54Zby Mazleena Salleh<br/>Author Mazleena Salleh, Rabiah Ahmad, Dr., Norafida Ithnin, Subariah Ibrahim, Symposium Kebangsaan Teknologi Maklumat (2000 : Bangi, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 R57 2000<br/>Publication Date 2000<br/>Pembangunan sistem pemulihan kunci menggunakan kaedah pengescrowanent://SD_ILS/0/SD_ILS:4697542024-06-03T13:36:54Z2024-06-03T13:36:54Zby Liew, Chee Wah<br/>Author Liew, Chee Wah<br/>Format: Books<br/>Call Number QA76.9.A25 L53 1998 raf<br/>Publisher UTM,<br/>Publication Date 1998<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1998<br/>Penyulitan dan penyahsulitan direktori dalam persekitaran windows 95ent://SD_ILS/0/SD_ILS:4699862024-06-03T13:36:54Z2024-06-03T13:36:54Zby Ong, Yean Hoon<br/>Author Ong, Yean Hoon<br/>Format: Books<br/>Call Number QA76.9.A25 O52 1998 raf<br/>Publisher UTM,<br/>Publication Date 1998<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysai, 1998<br/>Client / server untuk sistem maklumat sekolah bersepadu menggunakan SQL ... [et al.]ent://SD_ILS/0/SD_ILS:78742024-06-03T13:36:54Z2024-06-03T13:36:54Zby Chandraseegar Krishnan<br/>Author Chandraseegar Krishnan, Liew, Chee Wah, Ong, Yean Hoon, Wan Raina Wan Yusoff, Yusniza Yusoff<br/>Format: Visual Materials<br/>Call Number MFL 9154 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1997<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1988<br/>Security in computingent://SD_ILS/0/SD_ILS:4575992024-06-03T13:36:54Z2024-06-03T13:36:54Zby Pfleeger, Charles P.<br/>Author Pfleeger, Charles P.<br/>Format: Books<br/>Call Number QA76.9.A25 P44 1996<br/>Edition 2nd ed.<br/>Publisher Prentice-Hall,<br/>Publication Date 1997<br/>ISBN 9780131857940 9780133374865<br/>Protecting business information : a manager's guideent://SD_ILS/0/SD_ILS:4674702024-06-03T13:36:54Z2024-06-03T13:36:54Zby Schweitzer, James A.<br/>Author Schweitzer, James A.<br/>Format: Books<br/>Call Number HD38.7 S34 1996<br/>Publisher Butterworth-Heinemann,<br/>Publication Date 1996<br/>ISBN 9780750696586<br/>The computer privacy handbookent://SD_ILS/0/SD_ILS:4104312024-06-03T13:36:54Z2024-06-03T13:36:54Zby Bacard, Andre<br/>Author Bacard, Andre<br/>Format: Books<br/>Call Number QA76.9.A25 B32 1995<br/>Publisher Peachpit Press,<br/>Publication Date 1995<br/>ISBN 9781566091718<br/>Protection and security on the information superhighwayent://SD_ILS/0/SD_ILS:3826622024-06-03T13:36:54Z2024-06-03T13:36:54Zby Cohen, Frederick B.<br/>Author Cohen, Frederick B.<br/>Format: Books<br/>Call Number QA76.9.A25 C63 1995<br/>Publisher John Wiley & Sons,<br/>Publication Date 1995<br/>ISBN 9780471113898<br/>Kriptologient://SD_ILS/0/SD_ILS:3362182024-06-03T13:36:54Z2024-06-03T13:36:54Zby Bong, Thai Kwong<br/>Author Bong, Thai Kwong<br/>Format: Books<br/>Call Number QA76.9.A25 B66 1994 raf<br/>Publisher UTM,<br/>Publication Date 1994<br/>Kertas projek (Sarjana Muda Sains dan Komputer serta Pendidikan (Matematik)) - Universiti Teknologi Malaysia, 1994<br/>Kriptologient://SD_ILS/0/SD_ILS:3362202024-06-03T13:36:54Z2024-06-03T13:36:54Zby Bong, Thai Kwong<br/>Author Bong, Thai Kwong<br/>Format: Books<br/>Call Number DSK 616 ra<br/>Publisher UTM,<br/>Publication Date 1994<br/>Kertas projek (Sarjana Muda Sains dan Komputer serta Pendidikan (Matematik)) - Universiti Teknologi Malaysia, 1994<br/>Commonsense computer security : your practical guide to information protectionent://SD_ILS/0/SD_ILS:3511832024-06-03T13:36:54Z2024-06-03T13:36:54Zby Smith, Martin<br/>Author Smith, Martin<br/>Format: Books<br/>Call Number QA76.9.A25 S64 1993<br/>Edition 2nd ed<br/>Publisher McGraw-Hill,<br/>Publication Date 1993<br/>ISBN 9780077078058<br/>Pemproses enkripsi piawai (Bahagian 3) : implementasi DES dengan perisianent://SD_ILS/0/SD_ILS:1876592024-06-03T13:36:54Z2024-06-03T13:36:54Zby Voo, Fui Ken<br/>Author Voo, Fui Ken<br/>Format: Books<br/>Call Number TK5105.5.V66 1992 raf<br/>Publication Date 1992<br/>Kertas projek (Sarjana Muda Kejuruteraan Elektrik) - Universiti Teknologi Malaysia, 1992<br/>The support features for the intelligent terminal emulator; Building a network adapter card for IBM working in a ring topology local area network Part II; Building a standard central controller for local area network using star topology; Pengkod dan penyahkod DTMF Bahagian I (Perisian); Screen transferring and massege switching across a network; A point to point computer communication link using communication controller chip; Bit error rate measurement for high data transmission; Pemproses enkripsi piawai (Bahagian 3) : implementasi DES dengan perisianent://SD_ILS/0/SD_ILS:2712022024-06-03T13:36:54Z2024-06-03T13:36:54Zby Fauziah Hanim Omar<br/>Author Fauziah Hanim Omar, Jasmi Mohd Daron, Jayaseelan Manickam, Mohd. Zaki Yahaya, Ooi, Foong Yen<br/>Format: Books<br/>Call Number MFL 7750 ra<br/>Publisher UTM,<br/>Publication Date 1992<br/>Project paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1992<br/>FACTORS INFLUENCING IMPLEMENTATION OF INFORMATION LEAKAGE PREVENTION FOR GOVERNMENT SECTORent://SD_ILS/0/SD_ILS:8442932024-06-03T13:36:54Z2024-06-03T13:36:54Zby Nor Fazlinda Mohd. Puad, 1980-, author<br/>Author Nor Fazlinda Mohd. Puad, 1980-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number HF5548.37 N67 2014 raf<br/>Thesis Sarjana Sains (Jaminan Maklumat)<br/>FACTORS INFLUENCING IMPLEMENTATION OF INFORMATION LEAKAGE PREVENTION FOR GOVERNMENT SECTORent://SD_ILS/0/SD_ILS:8442942024-06-03T13:36:54Z2024-06-03T13:36:54Zby Nor Fazlinda Mohd. Puad, 1980-, author<br/>Author Nor Fazlinda Mohd. Puad, 1980-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034194 ra<br/>Thesis Sarjana Sains (Jaminan Maklumat)<br/>Information security fundamentalsent://SD_ILS/0/SD_ILS:8358732024-06-03T13:36:54Z2024-06-03T13:36:54Zby Peltier , Thomas R author<br/>Author Peltier , Thomas R author<br/>Format: Books<br/>Call Number QA76.9.A25 P454 2014<br/>Edition Second edition<br/>ISBN 9781439810620<br/>ANALYZING DATA LEAKAGE IN GEOGRAPHICAL INFORMATION SYSTEM FOR GOVERNMENT SECTORent://SD_ILS/0/SD_ILS:8390932024-06-03T13:36:54Z2024-06-03T13:36:54Zby Mona Liza Ja'afar, 1975-, author<br/>Author Mona Liza Ja'afar, 1975-, author, Mohd. Shahidan Abdullah, Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034541 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>INFORMATION SECURITY AWARENESS MODEL FOR EMPLOYEES IN BANK ALBILADent://SD_ILS/0/SD_ILS:8605142024-06-03T13:36:54Z2024-06-03T13:36:54Zby al-Haddad, Abdulqadeer Sheikh Aidaros, 1990-, author<br/>Author al-Haddad, Abdulqadeer Sheikh Aidaros, 1990-, author, Nurazean Maarop, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 H33 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>INFORMATION SECURITY AWARENESS MODEL FOR EMPLOYEES IN BANK ALBILADent://SD_ILS/0/SD_ILS:8609502024-06-03T13:36:54Z2024-06-03T13:36:54Zby al-Haddad, Abdulqadeer Sheikh Aidaros, 1990-, author<br/>Author al-Haddad, Abdulqadeer Sheikh Aidaros, 1990-, author, Nurazean Maarop, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035020 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>DATA LEAKAGE MODEL IN THE USE OF SOCIAL MEDIA AMONG MALAYSIAN ARMED FORCES PERSONNELent://SD_ILS/0/SD_ILS:8647472024-06-03T13:36:54Z2024-06-03T13:36:54Zby Nur Alfa Mazlin Masdan, 1981-, author<br/>Author Nur Alfa Mazlin Masdan, 1981-, author, Nor Zairah Ab. Rahim, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035067 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>INFORMATION SECURITY GOVERNANCE FRAMEWORK IMPLEMENTATION FOR INTELLIGENCE DEPARTMENTent://SD_ILS/0/SD_ILS:8647682024-06-03T13:36:54Z2024-06-03T13:36:54Zby Luqman Hakim Ibrahim, 1987-, author<br/>Author Luqman Hakim Ibrahim, 1987-, author, Nurazean Maarop, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035071 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>ENHANCING PRIVACY ON SOCIAL NETWORK SITES USING CLASSIFICATION AND ANONYMISATIONent://SD_ILS/0/SD_ILS:8708282024-06-03T13:36:54Z2024-06-03T13:36:54Zby Sanaz Kavianpour, 1984-, author<br/>Author Sanaz Kavianpour, 1984-, author, Zuraini Ismail, Assoc. Prof. Dr., supervisor, Bharanidharan Shanmugam, Dr., supervisor, Mohd. Shahidan Abdullah, Assoc. Prof. Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number HM742 S26 2017 raf<br/>Thesis (Ph.D) - Universiti Teknologi Malaysia, 2017<br/>FACTORS INFLUENCING DATA LEAKAGE BEHAVIOUR IN MALAYSIAN ARMED FORCESent://SD_ILS/0/SD_ILS:8712722024-06-03T13:36:54Z2024-06-03T13:36:54Zby Mohd. Nazrul Mat Zom, 1985-, author<br/>Author Mohd. Nazrul Mat Zom, 1985-, author, Saiful Adli Ismail, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 M6433 2017 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/>ASSESSMENT ON DATA LEAKAGE PROTECTION FOR CHIEF GOVERMENT SECURITY OFFICEent://SD_ILS/0/SD_ILS:8712732024-06-03T13:36:54Z2024-06-03T13:36:54Zby Kumarendren Rajendran, 1980-, author<br/>Author Kumarendren Rajendran, 1980-, author, Nurulhuda Firdaus Mohd. Azmi, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number HF5548.37 K86 2017 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/>A CASE STUDY FOR CYBER HYGIENE AWARENESS IN ABC COMPANYent://SD_ILS/0/SD_ILS:8712832024-06-03T13:36:54Z2024-06-03T13:36:54Zby Hairunnazri Haron, 1985-, author<br/>Author Hairunnazri Haron, 1985-, author, Rasimah Che Mohd. Yusoff, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 H35 2017 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/>HYBRID DATA HIDING TECHNIQUE BASED ON SIDE MATCH VECTOR QUANTIZATION AND GENETIC ALGORITHM (SMVQ-GA) FOR MILITARY SECRET COMMUNICATIONent://SD_ILS/0/SD_ILS:8712882024-06-03T13:36:54Z2024-06-03T13:36:54Zby Norshatela Anuar, 1985-, author<br/>Author Norshatela Anuar, 1985-, author, Nilam Nur Amir Sjarif, Dr., 1986-, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 N671 2017 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/>The Complete book of data anonymization : from planning to implementationent://SD_ILS/0/SD_ILS:8372982024-06-03T13:36:54Z2024-06-03T13:36:54Zby Raghunathan, Balaji author<br/>Author Raghunathan, Balaji author<br/>Format: Books<br/>Call Number QA76.9.A25 R348 2013<br/>ISBN 9781439877302<br/>ANALYZING DATA LEAKAGE IN GEOGRAPHICAL INFORMATION SYSTEM FOR GOVERNMENT SECTORent://SD_ILS/0/SD_ILS:8390922024-06-03T13:36:54Z2024-06-03T13:36:54Zby Mona Liza Ja'afar, 1975-, author<br/>Author Mona Liza Ja'afar, 1975-, author, Mohd. Shahidan Abdullah, Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number T58.64 M663 2012 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>Analyzing security behaviour in managing passwords among staffs of community collegesent://SD_ILS/0/SD_ILS:8405062024-06-03T13:36:54Z2024-06-03T13:36:54Zby Hazila Hasan, 1981-<br/>Author Hazila Hasan, 1981-, Mohd. Shahidan Abdullah, Dr., Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number CP 033991 ra<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>AN EFFECTIVE MODEL TO MEASURE STUDENTS’ AWARENESS FOR NON-TECHNICAL ASPECTS OF INFORMATION ASSURANCEent://SD_ILS/0/SD_ILS:8593362024-06-03T13:36:54Z2024-06-03T13:36:54Zby al-Idriss, Sultan Faydullah M., 1987-, author<br/>Author al-Idriss, Sultan Faydullah M., 1987-, author, Mohd. Shahidan Abdullah, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 S858 2014 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2014<br/>AN EFFECTIVE MODEL TO MEASURE STUDENTS’ AWARENESS FOR NON-TECHNICAL ASPECTS OF INFORMATION ASSURANCEent://SD_ILS/0/SD_ILS:8596052024-06-03T13:36:54Z2024-06-03T13:36:54Zby al-Idriss, Sultan Faydullah M., 1987-, author<br/>Author al-Idriss, Sultan Faydullah M., 1987-, author, Mohd. Shahidan Abdullah, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034735 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2014<br/>Proposing Guidelines for Improving Information Assurance Awareness based on Information Security Awareness Measurement Frameworkent://SD_ILS/0/SD_ILS:8627372024-06-03T13:36:54Z2024-06-03T13:36:54Zby Heng, Shun Ling, author<br/>Author Heng, Shun Ling, author, Ganthan Narayana Samy, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 H46 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>Proposing Guidelines for Improving Information Assurance Awareness based on Information Security Awareness Measurement Frameworkent://SD_ILS/0/SD_ILS:8629392024-06-03T13:36:54Z2024-06-03T13:36:54Zby Heng, Shun Ling, author<br/>Author Heng, Shun Ling, author, Ganthan Narayana Samy, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035044 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>DATA LEAKAGE MODEL IN THE USE OF SOCIAL MEDIA AMONG MALAYSIAN ARMED FORCES PERSONNELent://SD_ILS/0/SD_ILS:8646712024-06-03T13:36:54Z2024-06-03T13:36:54Zby Nur Alfa Mazlin Masdan, 1981-, author<br/>Author Nur Alfa Mazlin Masdan, 1981-, author, Nor Zairah Ab. Rahim, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number HF5548.37 N873 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>INFORMATION SECURITY GOVERNANCE FRAMEWORK IMPLEMENTATION FOR INTELLIGENCE DEPARTMENTent://SD_ILS/0/SD_ILS:8646732024-06-03T13:36:54Z2024-06-03T13:36:54Zby Luqman Hakim Ibrahim, 1987-, author<br/>Author Luqman Hakim Ibrahim, 1987-, author, Nurazean Maarop, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 L87 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>HYBRID DATA HIDING TECHNIQUE BASED ON SIDE MATCH VECTOR QUANTIZATION AND GENETIC ALGORITHM (SMVQ-GA) FOR MILITARY SECRET COMMUNICATIONent://SD_ILS/0/SD_ILS:8721212024-06-03T13:36:54Z2024-06-03T13:36:54Zby Norshatela Anuar, 1985-, author<br/>Author Norshatela Anuar, 1985-, author, Nilam Nur Amir Sjarif, Dr., 1986-, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 064085 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/>A CASE STUDY FOR CYBER HYGIENE AWARENESS IN ABC COMPANYent://SD_ILS/0/SD_ILS:8721272024-06-03T13:36:54Z2024-06-03T13:36:54Zby Hairunnazri Haron, 1985-, author<br/>Author Hairunnazri Haron, 1985-, author, Rasimah Che Mohd. Yusoff, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 064087 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/>ENHANCING PRIVACY ON SOCIAL NETWORK SITES USING CLASSIFICATION AND ANONYMISATIONent://SD_ILS/0/SD_ILS:8710752024-06-03T13:36:54Z2024-06-03T13:36:54Zby Sanaz Kavianpour, 1984-, author<br/>Author Sanaz Kavianpour, 1984-, author, Zuraini Ismail, Assoc. Prof. Dr., supervisor, Bharanidharan Shanmugam, Dr., supervisor, Mohd. Shahidan Abdullah, Assoc. Prof. Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 064023 ra<br/>Thesis (Ph.D) - Universiti Teknologi Malaysia, 2017<br/>ASSESSMENT ON DATA LEAKAGE PROTECTION FOR CHIEF GOVERMENT SECURITY OFFICEent://SD_ILS/0/SD_ILS:8719332024-06-03T13:36:54Z2024-06-03T13:36:54Zby Kumarendren Rajendran, 1980-, author<br/>Author Kumarendren Rajendran, 1980-, author, Nurulhuda Firdaus Mohd. Azmi, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 064062 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/>FACTORS INFLUENCING DATA LEAKAGE BEHAVIOUR IN MALAYSIAN ARMED FORCESent://SD_ILS/0/SD_ILS:8719632024-06-03T13:36:54Z2024-06-03T13:36:54Zby Mohd. Nazrul Mat Zom, 1985-, author<br/>Author Mohd. Nazrul Mat Zom, 1985-, author, Saiful Adli Ismail, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 064068 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/>