Search Results for Computers -- Access control SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dComputers$002b--$002bAccess$002bcontrol$0026ps$003d300? 2019-11-14T06:11:53Z Advances in computer system security ent://SD_ILS/0/SD_ILS:172931 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Turn, Rein,. 1931-<br/>Author&#160;Turn, Rein,. 1931-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A38 1981-1988<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2019&#160;2018&#160;2017&#160;2016&#160;2015<br/>ISBN&#160;9780890061541&#160;9780890060964<br/> Face verification system prototype on FPGA SOC platform for access control ent://SD_ILS/0/SD_ILS:874983 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Ong, Sie Siong, 1994-, author<br/>Author&#160;Ong, Sie Siong, 1994-, author,&#160;Mohamed Khalil Hani, supervisor,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;TA1653 O54 2018 raf<br/>Publication Date&#160;2018<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Elektronik)) - Universiti Teknologi Malaysia, 2018<br/> Face verification system prototype on FPGA SOC platform for access control ent://SD_ILS/0/SD_ILS:874987 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Ong, Sie Siong, 1994-, author<br/>Author&#160;Ong, Sie Siong, 1994-, author<br/>Format:&#160;Books<br/>Call Number&#160;CP 080717 ra<br/>Publication Date&#160;2018<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Elektronik)) - Universiti Teknologi Malaysia, 2018<br/> Information security : principles and new concepts ent://SD_ILS/0/SD_ILS:837058 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Hobbs, Fiona, editor<br/>Author&#160;Hobbs, Fiona, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I549 2015 f v.1<br/>Publisher&#160;Clanrye Intl.,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781632403063&#160;9781632403070&#160;9781632403087&#160;9781632403094<br/> Managing risk in information systems ent://SD_ILS/0/SD_ILS:839128 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Gibson, Darril, author<br/>Author&#160;Gibson, Darril, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G53 2015<br/>Edition&#160;Second edition<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781284055955<br/> Hybrid medium access control using token approach in wireless sensor network for high traffic applications ent://SD_ILS/0/SD_ILS:851934 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Nor Syahidatul Nadiah Ismail, 1985-, author<br/>Author&#160;Nor Syahidatul Nadiah Ismail, 1985-, author,&#160;Sharifah Hafizah Syed Ariffin, supervisor,&#160;Nurul Mua'zzah Abdul Latiff, supervisor,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;TK7872.D48 N675 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Ph.D (Kejuruteraan Elektrik)) - Universiti Teknologi Malaysia, 2015<br/> Acceptance towards using mobile phone number as single sign on identity ent://SD_ILS/0/SD_ILS:859353 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Sharifah Zabedah Ainon Azim, 1982-, author<br/>Author&#160;Sharifah Zabedah Ainon Azim, 1982-, author,&#160;Wardah Zainal Abidin, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S538 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/> Acceptance towards using mobile phone number as single sign on identity ent://SD_ILS/0/SD_ILS:859638 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Sharifah Zabedah Ainon Azim, 1982-, author<br/>Author&#160;Sharifah Zabedah Ainon Azim, 1982-, author,&#160;Wardah Zainal Abidin, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034744 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/> Identity and access management : business performanve through connected intelligence ent://SD_ILS/0/SD_ILS:831228 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Osmanoglu, Ertem<br/>Author&#160;Osmanoglu, Ertem<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 O78 2013<br/>Publisher&#160;Syngress, an imprint of Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124081406<br/> Access control, authentication, and public key infrastructure ent://SD_ILS/0/SD_ILS:832984 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Chapple, Mike, author<br/>Author&#160;Chapple, Mike, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A234 2014<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781284031591<br/> The Intrusion detection networks : a key to collaborative security ent://SD_ILS/0/SD_ILS:837290 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Fung, Carol author<br/>Author&#160;Fung, Carol author,&#160;Boutaba, Raouf<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9 A25 F85 2014<br/>Publisher&#160;Auerbach Pub.,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466564121<br/> Face recognition security system for access contro ent://SD_ILS/0/SD_ILS:854475 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Nur Adila Mohd. Razali, 1991-<br/>Author&#160;Nur Adila Mohd. Razali, 1991-<br/>Format:&#160;Books<br/>Call Number&#160;CP 057248 ra<br/>Publication Date&#160;2014<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Elektronik)) - Universiti Teknologi Malaysia, 2014<br/> The basics of digital privacy : simple tools to protect your personal information and your identity online ent://SD_ILS/0/SD_ILS:831266 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Cherry, Denny<br/>Author&#160;Cherry, Denny,&#160;Larock, Thomas, technical editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C444 2014<br/>Publisher&#160;Elsevier,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780128000113<br/> Face recognition security system for access control ent://SD_ILS/0/SD_ILS:854471 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Nur Adila Mohd. Razali, 1991-<br/>Author&#160;Nur Adila Mohd. Razali, 1991-,&#160;Hazlina Selamat, supervisor,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;TA1653 N33 2014 raf<br/>Publication Date&#160;2014<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Elektronik)) - Universiti Teknologi Malaysia, 2014<br/> Web penetration testing with kali linux : a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocol with kali linux ent://SD_ILS/0/SD_ILS:831439 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Muniz, Joseph<br/>Author&#160;Muniz, Joseph,&#160;Lakhani, Aamir<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M86 2013<br/>Publisher&#160;Packt publishing ,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781782163169<br/> Enhancement of network access control architecture with virtualization ent://SD_ILS/0/SD_ILS:840822 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Hairil Annuar Md Salleh, 1977-<br/>Author&#160;Hairil Annuar Md Salleh, 1977-,&#160;Shanmugam, Bharanidharan, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H35 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Enhancement of network access control architecture with virtualization ent://SD_ILS/0/SD_ILS:840823 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Hairil Annuar Md Salleh, 1977-<br/>Author&#160;Hairil Annuar Md Salleh, 1977-,&#160;Shanmugam, Bharanidharan, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 034013 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Flat role based access control and encryption scheme for database security ent://SD_ILS/0/SD_ILS:803476 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Al Farissi, 1985-<br/>Author&#160;Al Farissi, 1985-<br/>Format:&#160;Books<br/>Call Number&#160;CP 032498 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> UTM security with Fortinet : Mastering FortiOS ent://SD_ILS/0/SD_ILS:803817 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Tam, Kenneth<br/>Author&#160;Tam, Kenneth<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 U86 2013 a<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781597497473<br/> Enhancing time-stamping techniqe by implementing media access control address ent://SD_ILS/0/SD_ILS:803783 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Pacu Putra Suarli, 1989-<br/>Author&#160;Pacu Putra Suarli, 1989-,&#160;Mazleena Salleh,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P33 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Enhancing time-stamping techniqe by implementing media access control address ent://SD_ILS/0/SD_ILS:804088 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Pacu Putra Suarli, 1989-<br/>Author&#160;Pacu Putra Suarli, 1989-<br/>Format:&#160;Books<br/>Call Number&#160;CP 030214 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat))) - Universiti Teknologi Malaysia, 2013<br/> Analyzing pattern matching algorithms applied on snort intrusion detection system ent://SD_ILS/0/SD_ILS:804507 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Abdifatah Abdirahman Abdullah, 1986- author<br/>Author&#160;Abdifatah Abdirahman Abdullah, 1986- author,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;CP 030021 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer ( Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Keselamatan pengesahan menggunakan kaedah katalaluan grafik berdasarkan konsep jigsaw puzzle ent://SD_ILS/0/SD_ILS:807608 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Nurul Izzah Masduki<br/>Author&#160;Nurul Izzah Masduki,&#160;Hazinah Kutty Mammi, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N878 2013 raf<br/>Publication Date&#160;2013<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2013<br/> Keselamatan pengesahan menggunakan kaedah katalaluan grafik berdasarkan konsep jigsaw puzzle ent://SD_ILS/0/SD_ILS:807609 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Nurul Izzah Masduki<br/>Author&#160;Nurul Izzah Masduki<br/>Format:&#160;Books<br/>Call Number&#160;CP 030725 ra<br/>Publication Date&#160;2013<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2013<br/> Flat role based access control and encryption scheme for database security ent://SD_ILS/0/SD_ILS:803475 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Al Farissi, 1985-<br/>Author&#160;Al Farissi, 1985-,&#160;Subariah Ibrahim,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 A44 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Analyzing pattern matching algorithms applied on snort intrusion detection system ent://SD_ILS/0/SD_ILS:804506 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Abdifatah Abdirahman Abdullahi, 1986-<br/>Author&#160;Abdifatah Abdirahman Abdullahi, 1986-,&#160;Mohd. Aizaini Maarof, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A234 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer ( Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:805287 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Williams, Barry L.<br/>Author&#160;Williams, Barry L.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W55 2013<br/>Publisher&#160;CRC Press, Taylor &amp; Francis Group,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781466580589<br/> Credential purpose-based access control for personal data protection in web-based applications ent://SD_ILS/0/SD_ILS:809106 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Norjihan Abdul Ghani, 1977-<br/>Author&#160;Norjihan Abdul Ghani, 1977-,&#160;Harihodin Selamat,&#160;Zailani Mohamed Sidek, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N676 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> Multi level authentication mechanism for grid application using one-time password ent://SD_ILS/0/SD_ILS:811750 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Armaghan Behnia, 1986-<br/>Author&#160;Armaghan Behnia, 1986-,&#160;Imran Ghani, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A76 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Multi level authentication mechanism for grid application using one-time password ent://SD_ILS/0/SD_ILS:811751 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Armaghan Behnia, 1986-<br/>Author&#160;Armaghan Behnia, 1986-<br/>Format:&#160;Books<br/>Call Number&#160;CP 031744 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Human factor computer security awareness conceptual framework ent://SD_ILS/0/SD_ILS:778263 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Nasrin Badie, 1982-<br/>Author&#160;Nasrin Badie, 1982-,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A28 N37 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Encryption implementation enhancement of AES-CCMP in 802.11I ent://SD_ILS/0/SD_ILS:778401 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Iman Saberi, 1984-<br/>Author&#160;Iman Saberi, 1984-,&#160;Mazleena Salleh,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I434 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> A study and development of graphical user authentication for web based application ent://SD_ILS/0/SD_ILS:786496 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Mohd. Zamri Osman, 1987-<br/>Author&#160;Mohd. Zamri Osman, 1987-,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M644 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> UTM visitor RFID access control system ent://SD_ILS/0/SD_ILS:787485 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Chia, Hui Hui, 1988-, author<br/>Author&#160;Chia, Hui Hui, 1988-, author,&#160;Firoz Yusuf Patel Dawoodi, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK6553 C45 2012 raf<br/>Publication Date&#160;2012<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/> UTM visitor RFID access control system ent://SD_ILS/0/SD_ILS:787487 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Chia, Hui Hui, 1988-, author<br/>Author&#160;Chia, Hui Hui, 1988-, author,&#160;Firoz Yusuf Patel Dawoodi, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Electronic Resources<br/>Call Number&#160;CP 058476 ra<br/>Publication Date&#160;2012<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/> FSKSM UTM information security governance framework ent://SD_ILS/0/SD_ILS:793143 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Amir Haziq Loh Bojeng, 1986-<br/>Author&#160;Amir Haziq Loh Bojeng, 1986-,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A457 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> FSKSM UTM information security governance framework ent://SD_ILS/0/SD_ILS:793144 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Amir Haziq Loh Bojeng, 1986-<br/>Author&#160;Amir Haziq Loh Bojeng, 1986-<br/>Format:&#160;Books<br/>Call Number&#160;CP 028362 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> An Analysis of information security awareness on different level of user in FSKSM UTM Skudai ent://SD_ILS/0/SD_ILS:793281 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Norsyaliza Abd. Razak, 1986-<br/>Author&#160;Norsyaliza Abd. Razak, 1986-,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N677 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Improving graphical password anti-shoulder surfing technique for mobile device using painting album mechanism ent://SD_ILS/0/SD_ILS:793334 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Lim, Kah Seng, 1986-<br/>Author&#160;Lim, Kah Seng, 1986-,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L565 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/> Improving graphical password anti-shoulder surfing technique for mobile device using painting album mechanism ent://SD_ILS/0/SD_ILS:793336 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Lim, Kah Seng, 1986-<br/>Author&#160;Lim, Kah Seng, 1986-<br/>Format:&#160;Books<br/>Call Number&#160;CP 028068 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/> Design a framework for a security information and events management (SIEM) programs ent://SD_ILS/0/SD_ILS:836518 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Khalid Mohamed Mirghani, 1974-<br/>Author&#160;Khalid Mohamed Mirghani, 1974-,&#160;Bharanidharan Shanmugam, Dr.,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 K43 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Design a framework for a security information and events management (SIEM) programs ent://SD_ILS/0/SD_ILS:836519 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Khalid Mohamed Mirghani, 1974-<br/>Author&#160;Khalid Mohamed Mirghani, 1974-,&#160;Bharanidharan Shanmugam, Dr.,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034114 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Human factor computer security awareness conceptual framework ent://SD_ILS/0/SD_ILS:778265 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Nasrin Badie, 1982-<br/>Author&#160;Nasrin Badie, 1982-<br/>Format:&#160;Books<br/>Call Number&#160;CP 027518 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Encryption implementation enhancement of AES-CCMP in 802.11I ent://SD_ILS/0/SD_ILS:778405 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Iman Saberi, 1984-<br/>Author&#160;Iman Saberi, 1984-<br/>Format:&#160;Books<br/>Call Number&#160;CP 027521 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> A study and development of graphical user authentication for web based application ent://SD_ILS/0/SD_ILS:786498 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Mohd. Zamri Osman, 1987-<br/>Author&#160;Mohd. Zamri Osman, 1987-<br/>Format:&#160;Books<br/>Call Number&#160;CP 027919 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Client-side attacks and defense ent://SD_ILS/0/SD_ILS:797948 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Shimonski, Robert<br/>Author&#160;Shimonski, Robert,&#160;Oriyano, Sean-Philip<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S55 2012<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781597495905<br/> Ontalogy driven privacy access control for healthcare information system ent://SD_ILS/0/SD_ILS:803763 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Aidarus Mohamed Ibrahim, 1984-<br/>Author&#160;Aidarus Mohamed Ibrahim, 1984-,&#160;Imran Ghani, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;Q387.2 A33 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Role mining in business : taming role-based access control administration ent://SD_ILS/0/SD_ILS:808318 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Colantonio, Alessandro<br/>Author&#160;Colantonio, Alessandro,&#160;Di Pietro, Roberto,&#160;Ocello, Alberto<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C657 2012<br/>Publisher&#160;World Scientific,<br/>Publication Date&#160;2012<br/>ISBN&#160;9789814374002<br/> A multidisciplinary introduction to information security ent://SD_ILS/0/SD_ILS:826425 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Mjolsnes, Stig F.<br/>Author&#160;Mjolsnes, Stig F.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M562 2012<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2012&#160;2011<br/>ISBN&#160;9781420085907<br/> Security access control model for XML database based on bitmap and function ent://SD_ILS/0/SD_ILS:839859 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Hamidreza Sabet Moghaddam<br/>Author&#160;Hamidreza Sabet Moghaddam,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 H36 2011 raf<br/>Publication Date&#160;2011<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2011<br/> Security information and event management (SIEM) implementation ent://SD_ILS/0/SD_ILS:643328 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Miller, David, 1959-<br/>Author&#160;Miller, David, 1959-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S445 2011<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780071701099<br/> Access control, security, and trust : a logical approach ent://SD_ILS/0/SD_ILS:759405 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Chin, Shiu-Kai<br/>Author&#160;Chin, Shiu-Kai,&#160;Older, Susan Beth<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C45 2011<br/>Publisher&#160;Chapman &amp; Hall/CRC,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781584888628<br/> Managed code rootkits : hooking into runtime environments ent://SD_ILS/0/SD_ILS:758778 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Metula, Erez<br/>Author&#160;Metula, Erez<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M487 2011<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597495745<br/> Devising usability and security features for graphical password scheme ent://SD_ILS/0/SD_ILS:390590 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Muhammad Daniel Hafiz Abdullah, 1978-<br/>Author&#160;Muhammad Daniel Hafiz Abdullah, 1978-,&#160;Abdul Hanan Abdullah,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M325 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Designing an IAM framework with Oracle identity and access management suite ent://SD_ILS/0/SD_ILS:850751 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Scheidel, Jeff, author<br/>Author&#160;Scheidel, Jeff, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S337 2010<br/>Publisher&#160;Oracle/McGraw-Hill,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780071741378<br/> Enhanced feature selection method for illicit web content filtering ent://SD_ILS/0/SD_ILS:626204 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Lee, Zhi Sam 1983-<br/>Author&#160;Lee, Zhi Sam 1983-,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 019634 ra<br/>Publication Date&#160;2010<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Traffic light control for priority access based on visual basic and PLC ent://SD_ILS/0/SD_ILS:759408 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Chew, Ai Chain, 1987-<br/>Author&#160;Chew, Ai Chain, 1987-,&#160;Nor Haizan Mohamed Radzi,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.S88 C449 2010 raf<br/>Publication Date&#160;2010<br/>Project Paper (Sarjana Muda Sains Komputer (Komputeran Industri)) - Universiti Teknologi Malaysia, 2010<br/> Seven deadliest network attacks ent://SD_ILS/0/SD_ILS:758900 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Prowell, Stacy J.<br/>Author&#160;Prowell, Stacy J.,&#160;Kraus, Rob,&#160;Borkin, Mike<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P76 2010<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781597495493<br/> Traffic light control for priority access based on visual basic and PLC ent://SD_ILS/0/SD_ILS:759410 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Chew, Ai Chain, 1987-<br/>Author&#160;Chew, Ai Chain, 1987-<br/>Format:&#160;Books<br/>Call Number&#160;CP 026163 ra<br/>Publication Date&#160;2010<br/>Project Paper (Sarjana Muda Sains Komputer (Komputeran Industri)) - Universiti Teknologi Malaysia, 2010<br/> Devising usability and security features for graphical password scheme ent://SD_ILS/0/SD_ILS:603479 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Muhammad Daniel Hafiz Abdullah, 1978-<br/>Author&#160;Muhammad Daniel Hafiz Abdullah, 1978-,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 017398 ra<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Enhanced feature selection method for illicit web content filtering ent://SD_ILS/0/SD_ILS:626202 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Lee, Zhi Sam 1983-<br/>Author&#160;Lee, Zhi Sam 1983-,&#160;Mohd. Aizaini Maarof, supervisor,&#160;Ali Selamat, supervisor,&#160;Siti Mariyam Shamsuddin, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 L435 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Relation based access control ent://SD_ILS/0/SD_ILS:637823 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Zhang, Rui<br/>Author&#160;Zhang, Rui<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Z43 2010<br/>Publisher&#160;IOS Pr.,<br/>Publication Date&#160;2010<br/>ISBN&#160;9783898386265<br/> Cryptography technique in securing the e-passport authentication system ent://SD_ILS/0/SD_ILS:369963 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Tham, Yuew Chyi, 1986-<br/>Author&#160;Tham, Yuew Chyi, 1986-,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T43 2009 raf<br/>Publication Date&#160;2009<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2009<br/> Development of an access control model for web services applying XML-based approach ent://SD_ILS/0/SD_ILS:322580 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Homa Movahednejad, 1982-<br/>Author&#160;Homa Movahednejad, 1982-,&#160;Maslin Masrom, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.88813 H65 2009 raf<br/>Publication Date&#160;2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/> Handbook of research on information security and assurance ent://SD_ILS/0/SD_ILS:293379 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Jatinder N. D. Gupta<br/>Author&#160;Jatinder N. D. Gupta,&#160;Gupta, Jatinder N. D.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H353 2009<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781599048550<br/> Cryptography technique in securing the e-passport authentication system ent://SD_ILS/0/SD_ILS:603544 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Tham, Yuew Chyi, 1986-<br/>Author&#160;Tham, Yuew Chyi, 1986-<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 026313 ra<br/>Publication Date&#160;2009<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2009<br/> Expert SQL server 2008 encryption ent://SD_ILS/0/SD_ILS:640718 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Coles, Michael, 1972-<br/>Author&#160;Coles, Michael, 1972-,&#160;Landrum, Rodney<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C653 2009<br/>Publisher&#160;Apress,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781430224648&#160;9781430224655<br/> Contention-based collision-resolution medium access control algorithms ent://SD_ILS/0/SD_ILS:641307 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Kartsakli, Elli<br/>Author&#160;Kartsakli, Elli<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.55 C66 2009<br/>Publisher&#160;Nova Science Publishers,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781606925805<br/> Development of an access control model for web services applying XML-based approach ent://SD_ILS/0/SD_ILS:590595 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Homa Movahednejad, 1982-<br/>Author&#160;Homa Movahednejad, 1982-,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 019844 ra<br/>Publication Date&#160;2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/> Oracle identity management : governance, risk, and compliance architecture ent://SD_ILS/0/SD_ILS:334767 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Pohlman, Marlin B.<br/>Author&#160;Pohlman, Marlin B.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P63 2008<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781420072471<br/> Access denied : the practice and policy of global Internet filtering ent://SD_ILS/0/SD_ILS:362298 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Deibert, Ronald J.<br/>Author&#160;Deibert, Ronald J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A22 2008<br/>Publisher&#160;MIT Press,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780262541961<br/> Network security : private communications in a public world ent://SD_ILS/0/SD_ILS:328860 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Kaufman, Charlie<br/>Author&#160;Kaufman, Charlie,&#160;Perlman, Radia,&#160;Speciner, Michael<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K34 2008<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Prentice Hall of India,<br/>Publication Date&#160;2008<br/>ISBN&#160;9788120322134<br/> Implementing NAP and NAC security technologies : the complete guide to network access control ent://SD_ILS/0/SD_ILS:292712 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Hoffman, Daniel V.<br/>Author&#160;Hoffman, Daniel V.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.597 H64 2008<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470238387<br/> Smart cards, tokens, security and applications ent://SD_ILS/0/SD_ILS:271615 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Mayes, Keith E.<br/>Author&#160;Mayes, Keith E.,&#160;Markantonakis, Konstantinos<br/>Format:&#160;Books<br/>Call Number&#160;TK7895.S62 S62 2008<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780387721972<br/> Policy-driven mobile ad hoc network management ent://SD_ILS/0/SD_ILS:205634 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Chadha, Ritu, 1964-<br/>Author&#160;Chadha, Ritu, 1964-,&#160;Kant, Lahta, 1962-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.77 C42 2008<br/>Publisher&#160;Wiley-Interscience,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470055373<br/> Implementing NAP and NAC security technologies : the complete guide to network access control ent://SD_ILS/0/SD_ILS:232208 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Hoffman, Daniel (Daniel V.), 1972-<br/>Author&#160;Hoffman, Daniel (Daniel V.), 1972-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.597 H63 2008<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470238387<br/> Role engineering for enterprise security management ent://SD_ILS/0/SD_ILS:263597 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Coyne, Edward J.<br/>Author&#160;Coyne, Edward J.<br/>Format:&#160;Books<br/>Call Number&#160;T58.64 C69 2008<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781596932180<br/> Linux firewalls : attack detection and response with iptables, psad, and fwsnort ent://SD_ILS/0/SD_ILS:333041 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Rash, Michael<br/>Author&#160;Rash, Michael<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R36 2007<br/>Publisher&#160;No Starch Press,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781593271411<br/> Computer system security : basic concepts and solved exercises ent://SD_ILS/0/SD_ILS:328372 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Avoine, Gildas<br/>Author&#160;Avoine, Gildas,&#160;Junod, Pascal,&#160;Oechslin, Philippe<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A96 2004<br/>Publisher&#160;EFPL Press,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781420046205<br/> Secure Data Management 4th VLDB Workshop, SDM 2007, Vienna, Austria, September 23-24, 2007: Proceedings ent://SD_ILS/0/SD_ILS:516695 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;SDM 2007 (2007 : Vienna, Austria)<br/>Author&#160;SDM 2007 (2007 : Vienna, Austria),&#160;Jonker, Willem,&#160;Petkovic, Milan,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540752486<br/><a href="http://dx.doi.org/10.1007/978-3-540-75248-6">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Information Security 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007: Proceedings ent://SD_ILS/0/SD_ILS:516706 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;ISC 2007 (2007 : Valparaiso, Chile)<br/>Author&#160;ISC 2007 (2007 : Valparaiso, Chile),&#160;Garay, Juan A.,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000183<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540754961<br/><a href="http://dx.doi.org/10.1007/978-3-540-75496-1">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007: Proceedings ent://SD_ILS/0/SD_ILS:516712 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;International Workshop on Security (2nd : 2007 : Nara-shi, Japan)<br/>Author&#160;International Workshop on Security (2nd : 2007 : Nara-shi, Japan),&#160;Miyaji, Atsuko,&#160;Kikuchi, Hiroaki,&#160;Rannenberg, Kai,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000582<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540756514<br/><a href="http://dx.doi.org/10.1007/978-3-540-75651-4">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Information security theory and practices :smart cards, mobile and ubiquitous computing systems ; First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517026 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;WISTP 2007 (2007 : Herakleion, Greece)<br/>Author&#160;WISTP 2007 (2007 : Herakleion, Greece),&#160;Sauveron, Damien,&#160;International Federation for Information Processing. Technical Committee 6,&#160;IFIP WG 8.8 (Smart Cards),&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000196<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540723547<br/><a href="http://dx.doi.org/10.1007/978-3-540-72354-7">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Provable security first international conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517060 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;ProvSec 2007 (2007 : Wollongong, N.S.W.)<br/>Author&#160;ProvSec 2007 (2007 : Wollongong, N.S.W.),&#160;Susilo, Willy,&#160;Liu, Joseph K.,&#160;Mu, Yi, 1955-,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000343<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540756705<br/><a href="http://dx.doi.org/10.1007/978-3-540-75670-5">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Advances in Cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedings ent://SD_ILS/0/SD_ILS:517881 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;EUROCRYPT (2007 : Barcelona, Spain)<br/>Author&#160;EUROCRYPT (2007 : Barcelona, Spain),&#160;Naor, Moni,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000525<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540725404&#160;9783540725398<br/><a href="http://dx.doi.org/10.1007/978-3-540-72540-4">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Cryptography and security services : mechanisms and applications ent://SD_ILS/0/SD_ILS:285326 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Mogollon, Manuel<br/>Author&#160;Mogollon, Manuel<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M634 2007<br/>Publisher&#160;CyberTech Publishing,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781599048376<br/> Complete guide to security and privacy metrics : measuring regulatory compliance, operational resilience, and ROI ent://SD_ILS/0/SD_ILS:156652 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Herrmann, Debra S.<br/>Author&#160;Herrmann, Debra S.<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.85 H474 2007<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780849354021<br/> Integrated security systems design : concepts, specifications, and implementation ent://SD_ILS/0/SD_ILS:161025 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Norman, Thomas<br/>Author&#160;Norman, Thomas<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N674 2007<br/>Publisher&#160;Elsevier Butterworth-Heinemann,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780750679091<br/> Privacy-respecting intrusion detection ent://SD_ILS/0/SD_ILS:271638 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Flegel, Ulrich<br/>Author&#160;Flegel, Ulrich<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F53 2007<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780387343464<br/> Professional rootkits ent://SD_ILS/0/SD_ILS:272327 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Vieler, Ric<br/>Author&#160;Vieler, Ric<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 V56 2007<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2007&#160;2004<br/>ISBN&#160;9780470101544<br/> Role-based access control ent://SD_ILS/0/SD_ILS:209617 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Ferraiolo, David F.<br/>Author&#160;Ferraiolo, David F.,&#160;Kuhn, D. Richard,&#160;Chandramouli, Ramaswamy<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F47 2007<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781596931138<br/> Recent advances in intrusion detection : 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, proceedings ent://SD_ILS/0/SD_ILS:225997 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;RAID 2007 (2007 : Gold Coast, Qld.)<br/>Author&#160;RAID 2007 (2007 : Gold Coast, Qld.),&#160;Kruegel, Christopher, 1976-,&#160;Lippmann, Richard,&#160;Clark, Andrew, 1971-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R344 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540743194<br/><a href="http://dx.doi.org/10.1007/978-3-540-74320-0">Fulltext</a><br/> Critical information infrastructures : resilience and protection ent://SD_ILS/0/SD_ILS:254481 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Hyslop, Maitland<br/>Author&#160;Hyslop, Maitland<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H97 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780387718613<br/><a href="http://dx.doi.org/10.1007/978-0-387-71862-0">Fulltext</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Advances in cryptology - CRYPTO 2007 : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007 ; proceedings ent://SD_ILS/0/SD_ILS:225925 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;CRYPTO (Conference) (27th : 2007 : Santa Barbara, Calif.)<br/>Author&#160;CRYPTO (Conference) (27th : 2007 : Santa Barbara, Calif.),&#160;Menezes, A. J. (Alfred J.), 1965<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C795 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540741428<br/><a href="http://dx.doi.org/10.1007/978-3-540-74143-5">Fulltext</a><br/> Cryptology unlocked ent://SD_ILS/0/SD_ILS:245284 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Wobst, Reinhard<br/>Author&#160;Wobst, Reinhard<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W62 2007<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780470060643<br/> Mechanics of user identification and authentication : fundamentals of identity management ent://SD_ILS/0/SD_ILS:248074 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Todorov, Dobromir<br/>Author&#160;Todorov, Dobromir<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 T62 2007<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781420052190<br/> Network security architecture design for Malaysian maritime enforcement agency ent://SD_ILS/0/SD_ILS:155373 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Mahathir Abdul Hamid<br/>Author&#160;Mahathir Abdul Hamid,&#160;Shamsul Sahibuddin, supervisor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M35 2007 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2007<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2007<br/> Journal of computer security ent://SD_ILS/0/SD_ILS:155568 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 J68 2007<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2007<br/>ISSN&#160;0926227X<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&db=a3h&jid=LCY&site=ehost-live">Online via EBSCOhost</a><br/>Accessible within UTM campus<br/> IT security governance guidebook with security program metrics on CD-ROM ent://SD_ILS/0/SD_ILS:156661 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Cohen, Fred, 1956-<br/>Author&#160;Cohen, Fred, 1956-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C63 2007<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780849384356<br/> Kata laluan bergambar ent://SD_ILS/0/SD_ILS:168969 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Devan Muthusamy<br/>Author&#160;Devan Muthusamy,&#160;Nor Afida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D48 2007 raf<br/>Publication Date&#160;2007<br/>Project Paper (Sarjana Muda Sains (Komputer)) - Universiti Teknologi Malaysia, 2007<br/> Snort : IDS and IPS toolkit ent://SD_ILS/0/SD_ILS:578042 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Beale, Jay<br/>Author&#160;Beale, Jay,&#160;Baker, Andrew R.,&#160;Esler, Joel<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 7232<br/>Publisher&#160;Syngress Publishing,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781597490993<br/> Fast Software Encryption 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers ent://SD_ILS/0/SD_ILS:626378 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;FSE 2007 (2007 : Luxembourg, Luxembourg)<br/>Author&#160;FSE 2007 (2007 : Luxembourg, Luxembourg),&#160;Biryukov, Alex,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;x<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540746195<br/><a href="http://dx.doi.org/10.1007/978-3-540-74619-5">http://dx.doi.org/10.1007/978-3-540-74619-5</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Cisco Network Admission Control ent://SD_ILS/0/SD_ILS:623505 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Helfrich, Denise<br/>Author&#160;Helfrich, Denise<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C574 2007 v.1<br/>Publisher&#160;Cisco,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781587052415<br/> Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedings ent://SD_ILS/0/SD_ILS:625782 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;DIMVA 2007 (2007 : Lucerne, Switzerland)<br/>Author&#160;DIMVA 2007 (2007 : Lucerne, Switzerland),&#160;Hammerli, Bernhard M.,&#160;Sommer, Robin,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;x<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540736141<br/><a href="http://dx.doi.org/10.1007/978-3-540-73614-1">http://dx.doi.org/10.1007/978-3-540-73614-1</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Computer Security - ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007: Proceedings ent://SD_ILS/0/SD_ILS:626829 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;European Symposium on Research in Computer Security (12th : 2007 : Dresden, Germany)<br/>Author&#160;European Symposium on Research in Computer Security (12th : 2007 : Dresden, Germany),&#160;Biskup, Joachim,&#160;Lopez, Javier.,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;x<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540748359<br/><a href="http://dx.doi.org/10.1007/978-3-540-74835-9">http://dx.doi.org/10.1007/978-3-540-74835-9</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Information security theory and practices :smart cards, mobile and ubiquitous computing systems ; First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517394 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;WISTP 2007 (2007 : Herakleion, Greece)<br/>Author&#160;WISTP 2007 (2007 : Herakleion, Greece),&#160;Sauveron, Damien,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000197<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540723547<br/><a href="http://dx.doi.org/10.1007/978-3-540-72354-7">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Advances in computer science--ASIAN 2007 computer and network security : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517549 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Asian Computing Science Conference (12th : 2007 : Daw?{rcub}hah, Qatar)<br/>Author&#160;Asian Computing Science Conference (12th : 2007 : Daw?{rcub}hah, Qatar),&#160;Cervesato, Iliano,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000522<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540769293&#160;9783540769279<br/><a href="http://dx.doi.org/10.1007/978-3-540-76929-3">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Information systems security third international conference, ICISS 2007, Delhi, India, December 16-20, 2007 : proceedings ent://SD_ILS/0/SD_ILS:517560 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;International Conference on Information Systems Security (3rd : 2007 : Delhi, India)<br/>Author&#160;International Conference on Information Systems Security (3rd : 2007 : Delhi, India),&#160;McDaniel, Patrick (Patrick Drew),&#160;Gupta, Shyam K.,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000198<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540770862&#160;9783540770855<br/><a href="http://dx.doi.org/10.1007/978-3-540-77086-2">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers ent://SD_ILS/0/SD_ILS:517564 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;International Workshop on Security Protocols (13th : 2005 : Cambridge, England)<br/>Author&#160;International Workshop on Security Protocols (13th : 2005 : Cambridge, England),&#160;Christianson, Bruce,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Publisher&#160;Springer-Verlag Berlin Heidelberg,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540771562&#160;9783540771555<br/><a href="http://dx.doi.org/10.1007/978-3-540-77156-2">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Network security architecture design for Malaysian maritime enforcement agency ent://SD_ILS/0/SD_ILS:568086 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Mahathir Abdul Hamid<br/>Author&#160;Mahathir Abdul Hamid,&#160;Shamsul Sahibuddin, supervisor<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 015120<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2007<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2007<br/>Restricted<br/> Kata laluan bergambar ent://SD_ILS/0/SD_ILS:569885 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Devan Muthusamy<br/>Author&#160;Devan Muthusamy<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 026150 ra<br/>Publication Date&#160;2007<br/>Project Paper (Sarjana Muda Sains (Komputer)) - Universiti Teknologi Malaysia, 2007<br/> IT security governance guidebook with security program metrics on CD-ROM ent://SD_ILS/0/SD_ILS:570220 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Cohen, Fred, 1956-<br/>Author&#160;Cohen, Fred, 1956-<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 8941<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780849384356<br/> Biometrics : personal identification in networked society ent://SD_ILS/0/SD_ILS:470531 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z Format:&#160;Books<br/>Call Number&#160;TK7882.B56 B56 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387285399<br/> An XML-based model for integrating and managing label-based access control of heterogeneous legacy databases ent://SD_ILS/0/SD_ILS:468599 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Awad Mohed Awadelkarim<br/>Author&#160;Awad Mohed Awadelkarim<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A82 2006<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Thesis (Doctor of Philosophy) - Universiti Teknologi Malaysia, 2006<br/> Cryptography and its application ent://SD_ILS/0/SD_ILS:477714 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Chong, Sook Leng<br/>Author&#160;Chong, Sook Leng<br/>Format:&#160;Books<br/>Call Number&#160;Z103 C46 2006 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Project Paper (Sarjana Muda Sains (Mathematik)) - Universiti Teknologi Malaysia, 2006<br/> Multivariate public key cryptosystems ent://SD_ILS/0/SD_ILS:158164 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Ding, Jintai<br/>Author&#160;Ding, Jintai,&#160;Gower, Jason E.,&#160;Schmidt, Dieter S.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D56 2006<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387322292<br/> Networked embedded sensing and control : Workshop NESC'05 : University of Notre Dame, USA, October 2005 proceedings ent://SD_ILS/0/SD_ILS:158170 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Workshop on Networked Embedded Sensing and Control (2005 : University of Notre Dame)<br/>Author&#160;Workshop on Networked Embedded Sensing and Control (2005 : University of Notre Dame),&#160;Antsaklis, Panos J.,&#160;Tabuada, Paulo<br/>Format:&#160;Books<br/>Call Number&#160;TK7872.D48 W67 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9783540327943<br/> Rootkits : subverting the windows kernel ent://SD_ILS/0/SD_ILS:272271 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Hoglund, Greg<br/>Author&#160;Hoglund, Greg,&#160;Butler, James<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H64 2006<br/>Publisher&#160;Addison Wesley,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780321294319<br/> Development of an online signature verification software using support vector machines ent://SD_ILS/0/SD_ILS:120946 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Leong, Hui Yee<br/>Author&#160;Leong, Hui Yee<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L46 2006<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Mekatronik)) - Universiti Teknologi Malaysia, 2006<br/> Developing information security policy : case study of Biruni Remote Sensing Center (BRSC) ent://SD_ILS/0/SD_ILS:131670 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Mohamed. K. Bayoud<br/>Author&#160;Mohamed. K. Bayoud<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M525 2006 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Thesis (Sarjana Sains Komputer - Keselamatan Maklumat)) - Fakulti Sains Komputer dan Sistem Maklumat, Universiti Teknologi Malaysia, 2006<br/> Advances in information and computer security : first International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006 : proceedings ent://SD_ILS/0/SD_ILS:142220 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;International Workshop on Security (1st : 2006 : Kyoto, Japan)<br/>Author&#160;International Workshop on Security (1st : 2006 : Kyoto, Japan),&#160;Yoshiura, Hiroshi<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I575 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9783540476993<br/> Linux firewalls ent://SD_ILS/0/SD_ILS:142906 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Suehring, Steve<br/>Author&#160;Suehring, Steve,&#160;Ziegler, Robert L. (Robert Loren), 1954-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Z54 2006<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Novell Pr.,<br/>Publication Date&#160;2006&#160;2005<br/>ISBN&#160;9780672327711<br/> Security and privacy in dynamic environments : proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Sweden ent://SD_ILS/0/SD_ILS:158206 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;IFIP TC11 International Information Security Conference (21st : 2006 : Karlstad, Sweden)<br/>Author&#160;IFIP TC11 International Information Security Conference (21st : 2006 : Karlstad, Sweden),&#160;Fischer-Hubner, Simone<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S429 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387334059<br/> Access control systems : security, identity management and trust models ent://SD_ILS/0/SD_ILS:176900 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Benantar, Messaoud<br/>Author&#160;Benantar, Messaoud<br/>Format:&#160;Books<br/>Call Number&#160;TK5109.59 B46 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387004457<br/> Enhancement of snort intrusion detection system ent://SD_ILS/0/SD_ILS:111888 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Rabia Bakhteri Jahangir Bakhteri<br/>Author&#160;Rabia Bakhteri Jahangir Bakhteri<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 R32 2006<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Project Paper (Sarjana Muda Kejuruteraan (Komputer)) - Universiti Teknologi Malaysia, 2006<br/> Cryptography and its application ent://SD_ILS/0/SD_ILS:10299 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Chong, Sook Leng<br/>Author&#160;Chong, Sook Leng<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 13793<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Project Paper (Sarjana Muda Sains (Mathematik)) - Universiti Teknologi Malaysia, 2006<br/> Advances in biometrics : international conference, ICB 2006, Hong Kong, China, January 5-7, 2006 : proceedings ent://SD_ILS/0/SD_ILS:100928 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;ICB 2006 ( 2006 : Hong Kong, China)<br/>Author&#160;ICB 2006 ( 2006 : Hong Kong, China),&#160;Zhang, David, 1949-,&#160;Jain, Anil K., 1948-<br/>Format:&#160;Books<br/>Call Number&#160;TK7882.B56 I24 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9783540311119<br/> Advanced host intrusion prevention with CSA ent://SD_ILS/0/SD_ILS:101840 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Sullivan, Chad<br/>Author&#160;Sullivan, Chad,&#160;Mauvais, Paul,&#160;Asher, Jeff<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S94 2006<br/>Publisher&#160;Cisco Press,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781587052521<br/> Intrusion prevention fundamentals ent://SD_ILS/0/SD_ILS:101850 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Carter, Earl<br/>Author&#160;Carter, Earl,&#160;Hogue, Jonathan<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C377 2006<br/>Publisher&#160;Cisco Press,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781587052392<br/> Information systems security : second international conference, ICISS 2006, Kolkata, India, December 19-21, 2006 : proceedings ent://SD_ILS/0/SD_ILS:170904 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;International Conference on Information Systems Security (2nd : 2006 : Calcutta, India)<br/>Author&#160;International Conference on Information Systems Security (2nd : 2006 : Calcutta, India),&#160;Bagchi, Aditya,&#160;Atluri, Vijayalaksmi<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I576 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9783540689621<br/> An XML-based model for integrating and managing label-based access control of heterogeneous legacy databases ent://SD_ILS/0/SD_ILS:784831 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Awad Mohed Awadelkarim<br/>Author&#160;Awad Mohed Awadelkarim,&#160;Sekolah Pengajian Siswazah<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 14301 ra<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Tesis (Doctor of Philosophy) - Universiti Teknologi Malaysia, 2006<br/> An XML-based model for integrating and managing label-based access control of heterogeneous legacy databases ent://SD_ILS/0/SD_ILS:617206 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Awad Mohed Awadelkarim<br/>Author&#160;Awad Mohed Awadelkarim<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 4586<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Tesis (Doctor of Philosophy) - Universiti Teknologi Malaysia, 2006<br/> Cryptography and its application ent://SD_ILS/0/SD_ILS:618999 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Chong, Sook Leng<br/>Author&#160;Chong, Sook Leng<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 4596<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Project Paper (Sarjana Muda Sains (Matematik)) - Universiti Teknologi Malaysia, 2006<br/> Cisco security agent ent://SD_ILS/0/SD_ILS:444229 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Sullivan, Chad<br/>Author&#160;Sullivan, Chad<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S84 2005<br/>Publisher&#160;Cisco Press,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781587052057<br/> Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohan ent://SD_ILS/0/SD_ILS:470105 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Mohd. Nizam Omar<br/>Author&#160;Mohd. Nizam Omar<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M544 2005 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=40824">Preview</a><br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2005<br/> User's guide to cryptography and standards ent://SD_ILS/0/SD_ILS:418034 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Dent, Alexander W.<br/>Author&#160;Dent, Alexander W.,&#160;Mitchell, Chris J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D464 2005<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781580535304<br/> Information systems security : first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedings ent://SD_ILS/0/SD_ILS:143340 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;International Conference on Information Systems Security( 1st : 2005 : Calcutta, India)<br/>Author&#160;International Conference on Information Systems Security( 1st : 2005 : Calcutta, India),&#160;Jajodia, Sushil,&#160;Mazumdar, Chandan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I576 2005<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2005<br/>ISBN&#160;9783540307068<br/> Global monitoring : the challenges of access to data ent://SD_ILS/0/SD_ILS:154657 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Harris, Ray<br/>Author&#160;Harris, Ray,&#160;Browning, Richard<br/>Format:&#160;Books<br/>Call Number&#160;TD193 H37 2005<br/>Publisher&#160;UCL Press,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781844720248<br/> Online certificate injection system ent://SD_ILS/0/SD_ILS:840749 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Mohd. Nor Haizam Samsun Baharun, author<br/>Author&#160;Mohd. Nor Haizam Samsun Baharun, author,&#160;Othman Yusop, supervisor,&#160;Soo, Lester Ngai Kwong, supervisor,&#160;Faculty of Advanced Informatics School<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M644 2005 raf<br/>Publication Date&#160;2005<br/>Thesis (Sarjana Sains (Sains Komputer - Real Time Software Engineering)) - Universiti Teknologi Malaysia, 2005<br/> Online certificate injection system ent://SD_ILS/0/SD_ILS:840750 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Mohd. Nor Haizam Samsun Baharun, author<br/>Author&#160;Mohd. Nor Haizam Samsun Baharun, author<br/>Format:&#160;Books<br/>Call Number&#160;CP 033963 ra<br/>Publication Date&#160;2005<br/>Thesis (Sarjana Sains (Sains Komputer - Real Time Software Engineering)) - Universiti Teknologi Malaysia, 2005<br/> Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohan ent://SD_ILS/0/SD_ILS:617575 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Mohd. Nizam Omar<br/>Author&#160;Mohd. Nizam Omar<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 11356<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2005<br/> Analisa tindak balas aktif bagi simulasi serangan teragih secara selari ke atas hos IRS ent://SD_ILS/0/SD_ILS:366959 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Wahidah Md. Shah<br/>Author&#160;Wahidah Md. Shah<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W33 2004<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/>Tesis (Sarjana Sains (Komputer)) - Universiti Teknologi Malaysia, 2004<br/> Detecting outlier on intrusion detection system using data set of system calls ent://SD_ILS/0/SD_ILS:396547 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Dahliyusmanto Dahlan<br/>Author&#160;Dahliyusmanto Dahlan,&#160;Abdul Hanan Abdullah,&#160;International Conference on Information and Computer Science (2004 : Dhahran, Saudi Arabia)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D335 2004<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/> Public key crypto hardware for real-time security application ent://SD_ILS/0/SD_ILS:400165 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Mohamed Khalil Mohd. Hani<br/>Author&#160;Mohamed Khalil Mohd. Hani,&#160;Hau, Yuan Wen, 1980-,&#160;Lim, Kie Woon,&#160;National Real-Time Technology and Applications Symposium (2nd : 2004 Serdang, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M54 2004<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/> Outsourcing information security ent://SD_ILS/0/SD_ILS:425362 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Axelrod, C. Warren<br/>Author&#160;Axelrod, C. Warren<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A93 2004<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2004<br/>ISBN&#160;9781580535311<br/> Snort for dummies ent://SD_ILS/0/SD_ILS:394616 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Scott, Charline<br/>Author&#160;Scott, Charline,&#160;Wolfe, Paul,&#160;Hayes, Bert<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S36 2004<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780764568350<br/> The hackers handbook : the strategy behind breaking into and defending networks ent://SD_ILS/0/SD_ILS:427103 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Young, Susan (Susan Elizabeth), 1968-<br/>Author&#160;Young, Susan (Susan Elizabeth), 1968-,&#160;Aitel, Dave<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 Y68 2004<br/>Publisher&#160;Auerbach Pub.,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780849308888<br/> Modern cryptography : theory and practice ent://SD_ILS/0/SD_ILS:156314 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Mao, Wenbo<br/>Author&#160;Mao, Wenbo<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M36 2004<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780130669438<br/> Building Cisco remote access networks (BCRAN) : CCNP self-study ent://SD_ILS/0/SD_ILS:97716 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Paquet, Catherine. Building Cisco remote access networks<br/>Author&#160;Paquet, Catherine. Building Cisco remote access networks,&#160;Cisco Systems, Inc.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.597 B84 2004<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Cisco Press,<br/>Publication Date&#160;2004<br/>ISBN&#160;9781587051487<br/> Analisa tindak balas aktif bagi simulasi serangan teragih secara selari ke atas hos IRS ent://SD_ILS/0/SD_ILS:599771 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Wahidah Md. Shah<br/>Author&#160;Wahidah Md. Shah<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 8886<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/>Tesis (Sarjana Sains (Komputer)) - Universiti Teknologi Malaysia, 2004<br/> Cisco access control security : AAA administrative services ent://SD_ILS/0/SD_ILS:97730 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Carroll, Brandon<br/>Author&#160;Carroll, Brandon<br/>Format:&#160;Books<br/>Call Number&#160;QA76.3 C374 2004<br/>Publisher&#160;Cisco Press,<br/>Publication Date&#160;2004<br/>ISBN&#160;9781587051241<br/> Snort for dummies ent://SD_ILS/0/SD_ILS:605741 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Scott, Charline<br/>Author&#160;Scott, Charline,&#160;Wolfe, Paul,&#160;Hayes, Bert<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 5376<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780764568350<br/> Biometrics ent://SD_ILS/0/SD_ILS:344478 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Woodward, John D.<br/>Author&#160;Woodward, John D.,&#160;Orlans, Nicholas M.,&#160;Higgins, Peter T<br/>Format:&#160;Books<br/>Call Number&#160;TK7882.B56 W66 2003<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780072222272<br/> A handbook on ICT Set-up and security ent://SD_ILS/0/SD_ILS:352208 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Hatta Mohd. Yusoff<br/>Author&#160;Hatta Mohd. Yusoff<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9 H374 2003<br/>Publisher&#160;Utusan Pubs. &amp; Distri.,<br/>Publication Date&#160;2003<br/>ISBN&#160;9789676114877<br/> Research directions in data and applications security : IFIP TC11/WG11.3 sixteenth annual conference on data and applications security, July 28-31, 2002, Cambridge, UK ent://SD_ILS/0/SD_ILS:363541 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;IFIP TC11/WG11.3 Working Conference on Database and Application Security (16th : 2002 : King's College, University of Cambridge)<br/>Author&#160;IFIP TC11/WG11.3 Working Conference on Database and Application Security (16th : 2002 : King's College, University of Cambridge),&#160;Gudes, Ehud,&#160;Shenoi, Sujeet<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 I34 2003<br/>Publisher&#160;Kluwer Academic Publishers,<br/>Publication Date&#160;2003<br/>ISBN&#160;9781402075414<br/> NIRS : Network intrusion detection and active-response system : group report ent://SD_ILS/0/SD_ILS:352764 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Adedayo Adetoye<br/>Author&#160;Adedayo Adetoye,&#160;Andy Choi,&#160;Marina Md. Arshad,&#160;Olufemi Soretire<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N475 2003<br/>Publisher&#160;University College London,<br/>Publication Date&#160;2003<br/>Thesis (Sarjana Sains (Sains Komputer) - University College London, 2003<br/> A methodology to detect intrusion using system call base on discriminant analysis ent://SD_ILS/0/SD_ILS:353431 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Dahliyusmanto Dahlan<br/>Author&#160;Dahliyusmanto Dahlan,&#160;Abdul Hanan Abdullah,&#160;International Symposium on Information Technology (2003 : Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D33 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Ke arah pengurangan jurang masa sistem penindakbalasan pencerobohan melalui penggunaan pendekatan penjejakan pencerobohan pantas ent://SD_ILS/0/SD_ILS:353627 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Mohd. Nizam Omar<br/>Author&#160;Mohd. Nizam Omar,&#160;Mohd. Aizaini Maarof,&#160;Subariah Ibrahim,&#160;Persidangan Sempena Pameran Penyelidikan dan Pembangunan IPTA (2003 : Kuala Lumpur )<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M54 2003<br/>Publication Date&#160;2003<br/> Perisian keselamatan data menggunakan gabungan teknik penyulitan data dan teknik pemampatan data ent://SD_ILS/0/SD_ILS:362382 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Norfadzila Mohd. Yusof<br/>Author&#160;Norfadzila Mohd. Yusof<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N674 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=57193">Full text</a><br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/> Red hat linux firewalls ent://SD_ILS/0/SD_ILS:327302 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;McCarty, Bill<br/>Author&#160;McCarty, Bill<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M42 2003<br/>Publisher&#160;Wiley Pubs,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780764524639<br/> Role-based access control ent://SD_ILS/0/SD_ILS:340153 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Ferraiolo, David F.<br/>Author&#160;Ferraiolo, David F.,&#160;Kuhn, D. Richard,&#160;Chandramouli, Ramaswamy<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F47 2003<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2003<br/>ISBN&#160;9781580533706<br/> Counting the number of system calls to detect intrusion using discriminant analysis ent://SD_ILS/0/SD_ILS:386616 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Dahliyusmanto Dahlan<br/>Author&#160;Dahliyusmanto Dahlan,&#160;Abdul Hanan Abdullah,&#160;Seminar Quality in Research (2003 : Indonesia)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D334 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Sistem penilaian permarkahan latihan praktik (FSKSM) secara atas talian ent://SD_ILS/0/SD_ILS:7071 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Farrah Maslina Umar<br/>Author&#160;Farrah Maslina Umar<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12994<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/> Perisian keselamatan data menggunakan gabungan teknik penyulitan data dan teknik pemampatan data ent://SD_ILS/0/SD_ILS:599953 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Norfadzila Mohd. Yusof<br/>Author&#160;Norfadzila Mohd. Yusof<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 5544<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/> Database encrytion schemes : a comparative study ent://SD_ILS/0/SD_ILS:351511 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.,&#160;Norbik Bashah Idris,&#160;Harihodin Selamat,&#160;Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Z34 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Linux firewalls ent://SD_ILS/0/SD_ILS:382428 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Ziegler, Robert<br/>Author&#160;Ziegler, Robert,&#160;Constantine, Carl B.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Z54 2002<br/>Edition&#160;2nd ed.<br/>Publisher&#160;New Riders,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780735710993<br/> DoS attacks detection using intrusion detection system and system calls ent://SD_ILS/0/SD_ILS:321462 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Mohd. Aizaini Maarof<br/>Author&#160;Mohd. Aizaini Maarof,&#160;Pathmenanthan Ramakrishna,&#160;Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M346 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Auditors' introduction to crytography and its application in database security ent://SD_ILS/0/SD_ILS:345848 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.,&#160;Norbik Bashah Idris,&#160;Harihodin Selamat,&#160;International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 Z34 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> A novel key recovery scheme implemented in public key infrastructure ent://SD_ILS/0/SD_ILS:316205 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Teoh, Su Chi<br/>Author&#160;Teoh, Su Chi,&#160;Norbik Bashah Idris,&#160;World Engineering Congress (2nd : 2002 : Sarawak, Malaysia)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T48 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Detection &amp; prevention of DoS attacks using intrusion detection system : design &amp; development ent://SD_ILS/0/SD_ILS:322481 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Pathmenanthan Ramakrishna<br/>Author&#160;Pathmenanthan Ramakrishna,&#160;Mohd. Aizaini Maarof,&#160;Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P376 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan ent://SD_ILS/0/SD_ILS:371161 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Ali Yusny Daud<br/>Author&#160;Ali Yusny Daud<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A44 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=51186">Preview</a><br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/> Network security : private communication in a public world ent://SD_ILS/0/SD_ILS:391399 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Kaufman, Charlie<br/>Author&#160;Kaufman, Charlie,&#160;Perlman, Radia,&#160;Speciner, Michael<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K34 2002<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Prentice Hall PTR,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780130460196<br/> Hack I.T. : security through penetration testing ent://SD_ILS/0/SD_ILS:394189 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Klevinsky, T. J.<br/>Author&#160;Klevinsky, T. J.,&#160;Laliberte, Scott,&#160;Gupta, Ajay<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K534 2002<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780201719567<br/> Advances in cryptology-EUROCRYT 2002 : international conference on the theory and applications of cryptographic techniques, Amsterdam, The Netherlands, April 28-May 2, 2002 : proceedings ent://SD_ILS/0/SD_ILS:396477 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;EUROCRYPT (2002 : Amsterdam, Netherlands)<br/>Author&#160;EUROCRYPT (2002 : Amsterdam, Netherlands),&#160;Knudsen, Lars<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 E87 2002<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2002<br/>ISBN&#160;9783540435532<br/> Internet and intranet security ent://SD_ILS/0/SD_ILS:303203 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Oppliger, Rolf<br/>Author&#160;Oppliger, Rolf<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 O67 2002<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2002<br/>ISBN&#160;9781580531665<br/> Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan ent://SD_ILS/0/SD_ILS:11180 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Ali Yusny Daud<br/>Author&#160;Ali Yusny Daud<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 13917<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/> Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan ent://SD_ILS/0/SD_ILS:601002 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Ali Yusny Daud<br/>Author&#160;Ali Yusny Daud<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 8375<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/> Sistem pakar penjanaan maklumat kesihatan bakal anak menggunakan pendekatan kepintaran buatan ent://SD_ILS/0/SD_ILS:21292 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Intan Ermahani A. Jalil<br/>Author&#160;Intan Ermahani A. Jalil<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 11989<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/> Hack I.T. : security through penetration testing ent://SD_ILS/0/SD_ILS:604409 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Klevinsky, T. J.<br/>Author&#160;Klevinsky, T. J.,&#160;Laliberte, Scott,&#160;Gupta, Ajay<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 4319<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780201719567<br/> Intrusion signatures and analysis ent://SD_ILS/0/SD_ILS:392079 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Northcutt, Stephen<br/>Author&#160;Northcutt, Stephen<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I67 2001<br/>Publisher&#160;New Riders,<br/>Publication Date&#160;2001<br/>ISBN&#160;9780735710634<br/> Prototaip sistem pengesahan pengguna dengan algoritma RSA untuk persekitaran aplikasi pelayan pelanggan menggunakan kad pintar ent://SD_ILS/0/SD_ILS:301427 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Akash Rosen Ram Kalaish<br/>Author&#160;Akash Rosen Ram Kalaish<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A42 2001<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/> Rijndael : comparison with other symmetric-key ciphers ent://SD_ILS/0/SD_ILS:301631 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Mazleena Salleh<br/>Author&#160;Mazleena Salleh,&#160;Subariah Ibrahim,&#160;International Conference on Information Technology and Multimedia (2001 : UNITEN, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R54 2001<br/>Publisher&#160;UNITEN,<br/>Publication Date&#160;2001<br/> Sistem kawalan capaian groupware menggunakan skima perkongsian rahsia shamir ent://SD_ILS/0/SD_ILS:301394 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Azhar Ali<br/>Author&#160;Azhar Ali<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A83 2001<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/> Sistem keselamatan kata laluan untuk aplikasi pengurusan data di Jabatan Pendidikan Agama Negeri Johor menggunakan teknik pengesahan fungsi cincangan ent://SD_ILS/0/SD_ILS:301908 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Masni Othman<br/>Author&#160;Masni Othman<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M37 2001<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/> Capaian alatan yang selamat dalam pembelajaran kolaboratif = Secure tools access in collaborative learning ent://SD_ILS/0/SD_ILS:301997 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Faaz Anwar Asan<br/>Author&#160;Faaz Anwar Asan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F33 2001<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/> Development, analysis and comparison of connectionist models for real time optimisation ent://SD_ILS/0/SD_ILS:20249 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Khairiyah Mohd. Yusof, 1965-<br/>Author&#160;Khairiyah Mohd. Yusof, 1965-<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 11900<br/>Publisher&#160;University of Waterloo,<br/>Publication Date&#160;2001<br/>Thesis (Doctor of Philosophy) - University of Waterloo, 2001<br/> Capaian alatan yang selamat dalam pembelajaran kolaboratif = Secure tools access in collaborative learning ent://SD_ILS/0/SD_ILS:20935 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Faaz Anwar Asan<br/>Author&#160;Faaz Anwar Asan<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12189<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/> Sistem kawalan capaian groupware menggunakan skima perkongsian rahsia shamir ent://SD_ILS/0/SD_ILS:21075 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Azhar Ali<br/>Author&#160;Azhar Ali<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12075<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/> Prototaip sistem pengesahan pengguna dengan algoritma RSA untuk persekitaran aplikasi pelayan pelanggan menggunakan kad pintar ent://SD_ILS/0/SD_ILS:20928 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Akash Rosen Ram Kalaish<br/>Author&#160;Akash Rosen Ram Kalaish<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12118<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/> Practical firewalls ent://SD_ILS/0/SD_ILS:384861 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Ogletree, Terry William<br/>Author&#160;Ogletree, Terry William<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 O35 2000<br/>Publisher&#160;QUE,<br/>Publication Date&#160;2000<br/>ISBN&#160;9780789724168<br/> Network security monitoring software on network system ent://SD_ILS/0/SD_ILS:147501 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Tan, Kok Kuan<br/>Author&#160;Tan, Kok Kuan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T36 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2000<br/> Infrastruktur kekunci awam : penerbitan dan revokasi sijil digital ent://SD_ILS/0/SD_ILS:148326 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Lim, Ban Hong<br/>Author&#160;Lim, Ban Hong<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L553 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/> Infrastruktur kekunci awam - perpustakaan keselamatan ent://SD_ILS/0/SD_ILS:150220 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Teoh, Su Chi<br/>Author&#160;Teoh, Su Chi<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T46 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/> Sistem capaian data dalam depoh bantuan TLDM ent://SD_ILS/0/SD_ILS:158816 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Mohd. Yusri Md. Sah<br/>Author&#160;Mohd. Yusri Md. Sah<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M98 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia /ATMA, 2000<br/> Sistem keselamatan kata laluan urusan gaji angkatan tentera (UGAT) menggunakan teknik kriptografi kekunci umum ent://SD_ILS/0/SD_ILS:159003 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Roslina Abd. Rahman<br/>Author&#160;Roslina Abd. Rahman<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R67 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/> Penganalisisan corak Bahasa Melayu untuk kajian kriptografi ent://SD_ILS/0/SD_ILS:148035 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Chua, Tee Khoon @ Chua Yong Peng<br/>Author&#160;Chua, Tee Khoon @ Chua Yong Peng<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C58 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/> Sistem capaian data dalam depoh bantuan TLDM ent://SD_ILS/0/SD_ILS:158666 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Khairul Kamarul Ariffin<br/>Author&#160;Khairul Kamarul Ariffin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K52 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia /ATMA, 2000<br/> Recent advances in intrusion detection : third International Workshop, RAID 2000 Toulouse, France, October 2-4, 2000 : proceedings ent://SD_ILS/0/SD_ILS:159459 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Debar, Herve, 1961-<br/>Author&#160;Debar, Herve, 1961-,&#160;Me, Ludovic, 1963-,&#160;Wu, S. Felix, 1963-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R44 2000<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2000<br/>ISBN&#160;9783540410850<br/> Aplikasi teknologi agen di dalam jualan barangan elektrik ent://SD_ILS/0/SD_ILS:159531 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Noor Azyyati Mohd. Mansor<br/>Author&#160;Noor Azyyati Mohd. Mansor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N667 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/> Penganalisisan corak Bahasa Melayu untuk kajian kriptografi ... [et al.] ent://SD_ILS/0/SD_ILS:13851 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Chua, Soo Yaw<br/>Author&#160;Chua, Soo Yaw,&#160;Mohd. Suhaizal Md. Kamari,&#160;Mona Effarina Zakaria,&#160;Nik Raihan Nik Omar,&#160;Wan Nur Ilyana Wan Zahari<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 10606<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/> Kriptografi untuk unit pengurusan operasi TLDM ent://SD_ILS/0/SD_ILS:20250 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Ayuwati Suraya Abu Bakar<br/>Author&#160;Ayuwati Suraya Abu Bakar<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12095<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia /ATMA, 2000<br/> Military vehicle sound signature analysis ent://SD_ILS/0/SD_ILS:21089 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Firuz Giry Naidu Ramanujaloo Naidu<br/>Author&#160;Firuz Giry Naidu Ramanujaloo Naidu<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12124<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Project Paper (Bachelor of Computer Engineering) - Universiti Teknologi Malaysia /ATMA, 2000<br/> Taman perumahan maya - : permodelan bangunan kediaman ent://SD_ILS/0/SD_ILS:15605 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Aini Hazila Hamzah<br/>Author&#160;Aini Hazila Hamzah<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 11193<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/> Sistem kawalan inventori pusat perubatan ent://SD_ILS/0/SD_ILS:15771 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Hafiza Ibrahim<br/>Author&#160;Hafiza Ibrahim<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 11127<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/> Sistem kawalan kualiti bahagian 'Housing Product' Matsushita Electric Co. (M) Bhd. ent://SD_ILS/0/SD_ILS:16713 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Haslinda M. Ros<br/>Author&#160;Haslinda M. Ros<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 11194<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/> Design and analysis of a dynamic access control scheme ent://SD_ILS/0/SD_ILS:139150 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Md. Rafiqul Islam<br/>Author&#160;Md. Rafiqul Islam<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M72 1999<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1999<br/>Thesis (PhD) - Universiti Teknologi Malaysia, 1999<br/> Enkripsi imej digital untuk format JPEG ent://SD_ILS/0/SD_ILS:123302 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Arif Fadhlan Yusoff<br/>Author&#160;Arif Fadhlan Yusoff<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A74 1999 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1999<br/>Kertas Projek (Sarjana Muda Kejuruteraan Elektrik) - Universiti Teknologi Malaysia, 1999<br/> Kajian keselamatan data berbantukan agen mobile ent://SD_ILS/0/SD_ILS:101355 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Yuhasliza Mohd. Yusoh<br/>Author&#160;Yuhasliza Mohd. Yusoh<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Y83 1999 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1999<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1999<br/> Windows based file encryption and decryption system ent://SD_ILS/0/SD_ILS:116725 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Ling, Hua Lay<br/>Author&#160;Ling, Hua Lay<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L56 1999 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologoi Malaysia, 1999<br/> Electronic delinquents ent://SD_ILS/0/SD_ILS:9526 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z Format:&#160;Visual Materials<br/>Call Number&#160;KVD 368<br/>Publisher&#160;MTI Teleprograms,<br/>Publication Date&#160;1999&#160;1998&#160;1997&#160;1996&#160;1995<br/> Membangunkan alatan yang membenarkan perkongsian fail di antara Linux dan Windows NT ... [et al.] ent://SD_ILS/0/SD_ILS:13052 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Norhamin Amit<br/>Author&#160;Norhamin Amit,&#160;Syukrie Mohd. Nasir,&#160;Wan Saari Wan Alias,&#160;Yuhasliza Mohd. Yusoh,&#160;Yusmariani Mohd. Yusoff<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 9508<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1999<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1999<br/> Rekabentuk keselamatan untuk modul pembelajaran siber dalam kampus siber ... [et al. ] ent://SD_ILS/0/SD_ILS:13134 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Mazlan Talib<br/>Author&#160;Mazlan Talib,&#160;Mohd. Anuar Jaafar,&#160;Nurbaya Kardy,&#160;Rohazlina Jarudin,&#160;Shehnaaz Yusuf Patel Dowoodi<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 9473<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1999<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1999<br/> Computers and security ent://SD_ILS/0/SD_ILS:540437 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z Format:&#160;Continuing Resources<br/>Call Number&#160;QA76.4.C65<br/>Publisher&#160;North-Holland Pub,<br/>Publication Date&#160;1999&#160;1998&#160;1997&#160;1996&#160;1995<br/>ISSN&#160;01674048<br/><a href="http://www.sciencedirect.com/science/journal/01674048">Covers from Vol. 14, Issue 1, (1995) to present</a><br/>Accessible within UTM campus<br/> Active noise control system ... [et al.] ent://SD_ILS/0/SD_ILS:13307 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Lakshmi Venkatarama Subramaniam<br/>Author&#160;Lakshmi Venkatarama Subramaniam,&#160;Lee, Sen How,&#160;Ling, Hua Lay,&#160;Mat Nizam Ngathinee,&#160;Tan, Kok Kean<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 9763<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1999<br/> Rekabentuk keselamatan pangkalan data dan pelayan pada modul sistem pendaftaran pelajar kampus siber ent://SD_ILS/0/SD_ILS:98910 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Mohd. Anuar Jaafar<br/>Author&#160;Mohd. Anuar Jaafar<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 M36 1999 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1999<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1999<br/> Understanding security on the net ent://SD_ILS/0/SD_ILS:472209 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Teo, Lu Ling<br/>Author&#160;Teo, Lu Ling<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T46 1998 raf<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1998<br/>Project paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1998<br/> Fundamental steps for fixed-font character recognition in image processing ... [et al.] ent://SD_ILS/0/SD_ILS:13091 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Khor, Sock Choo<br/>Author&#160;Khor, Sock Choo,&#160;Mohamad Azlie Mohamad Yusof,&#160;Tan, Yee Fei,&#160;Teo, Lu Ling,&#160;Thoo, Wei Ping<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 9464<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1998<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1998<br/> Technology's march towards total security ent://SD_ILS/0/SD_ILS:6230 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Akumanyi, Kofi<br/>Author&#160;Akumanyi, Kofi<br/>Format:&#160;Maps<br/>Call Number&#160;FTG 973<br/>Publisher&#160;London Press Service,<br/>Publication Date&#160;1997<br/> Handbook of applied cryptography ent://SD_ILS/0/SD_ILS:490433 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Menezes, Alfred J.<br/>Author&#160;Menezes, Alfred J.,&#160;Van Oorschot, Paul C.,&#160;Vanstone, Scott A.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M46 1997<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;1997<br/>ISBN&#160;9780849385230<br/> Public-key crytography ent://SD_ILS/0/SD_ILS:157309 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Salomaa, Arto<br/>Author&#160;Salomaa, Arto<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S26 1996<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;1996<br/>ISBN&#160;9783540613565<br/> Kriptologi ent://SD_ILS/0/SD_ILS:336218 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Bong, Thai Kwong<br/>Author&#160;Bong, Thai Kwong<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B66 1994 raf<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1994<br/>Kertas projek (Sarjana Muda Sains dan Komputer serta Pendidikan (Matematik)) - Universiti Teknologi Malaysia, 1994<br/> Kriptologi ent://SD_ILS/0/SD_ILS:336220 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Bong, Thai Kwong<br/>Author&#160;Bong, Thai Kwong<br/>Format:&#160;Books<br/>Call Number&#160;DSK 616 ra<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1994<br/>Kertas projek (Sarjana Muda Sains dan Komputer serta Pendidikan (Matematik)) - Universiti Teknologi Malaysia, 1994<br/> Kriptologi; Pengiraan berangka pangkat matriks; Sistem pemilihan dan perancangan kerjaya untuk pelajar sekolah menengah atas; Pembinaan perisian pengajaran berbantukan komputer dalam pembelajaran bumi sebagai sfera; Sistem maklumat analisis keputusan peperiksaan SPM ent://SD_ILS/0/SD_ILS:14653 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Bong, Thai Kwong<br/>Author&#160;Bong, Thai Kwong,&#160;Chi, Chong Ching,&#160;Ismail Shaari,&#160;Tan, Wooi Nee,&#160;Yew, Wai Hon<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 8151 ra<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1994<br/>Kertas Projek (Sarjana Muda Sains dan Komputer serta Pendidikan) - Universiti Teknologi Malaysia, 1994<br/> Penyusunan pengetahuan dan persembahan kaedah multimedia perubatan secara Islam; Cryptography workbench for windows; Sistem perancangan pengagihan barangan petroleum; Mengukur prestasi fakulti; Pakej penjana nombor rawak dan teknik pengurangan varians ent://SD_ILS/0/SD_ILS:352577 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Che Aziz Lahi<br/>Author&#160;Che Aziz Lahi,&#160;Hishamudi Bahari,&#160;Mohd. Azman Arshad,&#160;Nora Rosdin,&#160;Zainudin @ Ridzuan Mohamed<br/>Format:&#160;Books<br/>Call Number&#160;MFL 8207 ra<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1993<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1993<br/> Cryptography workbench for windows ent://SD_ILS/0/SD_ILS:164635 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Hishamudi Bahari<br/>Author&#160;Hishamudi Bahari<br/>Format:&#160;Books<br/>Call Number&#160;Z103.H57 1993 raf<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1993<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1993<br/> Sistem pemetaan utiliti berintegrasi ; Kajian terhadap ancaman-ancaman pusat komputer dan perancangan diMalaysia ; Pakej inventori ; Sistem pakar untuk rekabentuk rangkaian berkomputer = expert system for computerized network design ; Sistem pengurusan maklumat pameran Muzium Negara ; Sistem jadual waktu sekolah berkomputer ; Kajian maklumat dan data grafik diSyarikat Telekom Malaysia (STM) ; ent://SD_ILS/0/SD_ILS:162273 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Safian Mohamed Sahari<br/>Author&#160;Safian Mohamed Sahari,&#160;Sofiah Daud,&#160;Suriah Hasan,&#160;Tee, Chee Kiat,&#160;Zamri Tebi<br/>Format:&#160;Books<br/>Call Number&#160;MFL 7768 ra<br/>Publication Date&#160;1991<br/> Kajian terhadap ancaman-ancaman pusat komputer dan perancangannya di Malaysia ent://SD_ILS/0/SD_ILS:159613 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Sofiah Daud<br/>Author&#160;Sofiah Daud<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S63 1991 raf<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1991<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1991<br/> Key management to achieve security for financial institutions engaged in financial transactions (wholesale) ent://SD_ILS/0/SD_ILS:417449 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;British Standards Institution<br/>Author&#160;British Standards Institution<br/>Format:&#160;Books<br/>Call Number&#160;PIA BS 7205 : 1990<br/>Publisher&#160;British Standards Institutions,<br/>Publication Date&#160;1990<br/> Information technology - open systems interconnection - local area networks - medium access control (MAC) service defination ent://SD_ILS/0/SD_ILS:443215 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;British Standards Institution<br/>Author&#160;British Standards Institution,&#160;International Organization for Standardization,&#160;International Electrotechnical Commission<br/>Format:&#160;Books<br/>Call Number&#160;PIA BS ISO/IEC 10039 : 1991<br/>Publication Date&#160;1990<br/> Cryptology and computational number theory ent://SD_ILS/0/SD_ILS:271535 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Pomerance, Carl<br/>Author&#160;Pomerance, Carl,&#160;Goldwasser, S.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C79 1990<br/>Publisher&#160;American Mathematical Society,<br/>Publication Date&#160;1990<br/>ISBN&#160;9780821801550<br/> Sistem maklumat pentadbiran Institut Sains Komputer Universiti Teknologi Malaysia ; Kajian awal antaramuka dos dan AIX/UNIX ; Pakej CAI untuk struktur data ; Ramalan bilangan graduan dari bidang tertentu ; Asas pelajaran jawi untuk murid-murid tahap satu KBSR ; Lorekan permukaan objek yang diwakilkan oleh B-Spline ; Pakej pembelajaran sembahyang sunat ; Penterjemahan Bahasa Pascal kepada bahasa pengaturcaraan didalam Bahasa Malaysia ; Algoritma garisan terlindung yang mudah untuk struktur model daripada elemen-elemen satah ; Sistem prototaip pengurusan pengkalan data bercorak hubungan (RDBMS) ; Kajian keselamatan fizikal instalasi komputer di pusat-pusat pengajian tinggi di Malaysia ent://SD_ILS/0/SD_ILS:131603 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Md. Mohshin Jamiran<br/>Author&#160;Md. Mohshin Jamiran,&#160;Mohamad Fadzli Tarmiji,&#160;Normala Mat Nor,&#160;Lee, Ley Cheng,&#160;Long Ahmad Zulrushdi Long Hassan<br/>Format:&#160;Books<br/>Call Number&#160;MFL 7329 ra<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1990<br/>Kertas Projek (Sarjana Muda Sains Komputer dan Sistem Maklumat) - Universiti Teknologi Malaysia, 1990<br/> Kajian keselamatan fizikal instalasi komputer dipusat-pusat pengajian tinggi di Malaysia ent://SD_ILS/0/SD_ILS:212912 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Maimunah Bee Bee Abdul Kadir<br/>Author&#160;Maimunah Bee Bee Abdul Kadir<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M34 1990 raf<br/>Publication Date&#160;1990<br/>Kertas Projek (Sarjana Muda Sains Komputer) -- Universiti Teknologi Malaysia, 1990<br/> Database security, III : status and prospects ent://SD_ILS/0/SD_ILS:169479 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;IFIG WG 11.3 Workshop on Database Security (3rd : 1989 : Monterey, Calif.)<br/>Author&#160;IFIG WG 11.3 Workshop on Database Security (3rd : 1989 : Monterey, Calif.),&#160;Spooner, David L.,&#160;Landwehr, Carl E.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D314 I45 1989<br/>Publisher&#160;North-Holland,<br/>Publication Date&#160;1990<br/>ISBN&#160;9780444887016<br/> Information security manual ent://SD_ILS/0/SD_ILS:331625 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;United States. Administration and Resources Management<br/>Author&#160;United States. Administration and Resources Management,&#160;United States. Environmental Protection Agency<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.I53 1989<br/>Publisher&#160;United States Environmental Protection Agency,<br/>Publication Date&#160;1989<br/> Information security manual for personal computers ent://SD_ILS/0/SD_ILS:332829 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;United States. Environmental Protection Agency<br/>Author&#160;United States. Environmental Protection Agency,&#160;United States. Administration and Resources Management<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.I54 1989<br/>Publisher&#160;United States Environmental Protection Agency,<br/>Publication Date&#160;1989<br/> Cryptography : an introduction to computer security ent://SD_ILS/0/SD_ILS:442385 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Seberry, Jennifer<br/>Author&#160;Seberry, Jennifer,&#160;Pieprzyk, Josef<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S37 1989<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780724802746&#160;9780131949867<br/> Auditing computer security : a manual with case studies ent://SD_ILS/0/SD_ILS:524294 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Vallabhaneni, S. Rao<br/>Author&#160;Vallabhaneni, S. Rao<br/>Format:&#160;Books<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;1989&#160;1988<br/>ISBN&#160;9780471626046<br/> Security and protection in information system ent://SD_ILS/0/SD_ILS:454623 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;IFIP TC 11 International Conference on Computer Security (4th : 1986 : Monte Carlo, Monaco)<br/>Author&#160;IFIP TC 11 International Conference on Computer Security (4th : 1986 : Monte Carlo, Monaco),&#160;Grissonnanche, Andre<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I34 1986<br/>Publisher&#160;North-Holland,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780444873453<br/> Computer and communications security : strategies for the 1990s ent://SD_ILS/0/SD_ILS:454627 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Cooper, James Arlin<br/>Author&#160;Cooper, James Arlin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C67 1989<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780070129269<br/> Computer security in the age of information ent://SD_ILS/0/SD_ILS:266219 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;IFIP International Conference on Computer Security (5th : 1988 : Gold Coast, Queensland)<br/>Author&#160;IFIP International Conference on Computer Security (5th : 1988 : Gold Coast, Queensland),&#160;Caelli, William,&#160;International Federation for Information Processing<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I35 1988<br/>Publisher&#160;North-Holland,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780444883247<br/> Security mechanisms for computer networks ent://SD_ILS/0/SD_ILS:191666 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Muftic, Sead<br/>Author&#160;Muftic, Sead<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S42 1989<br/>Publisher&#160;Ellis Horwood,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780745806136<br/> Security in computing ent://SD_ILS/0/SD_ILS:236425 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Peleeger, Charles P.<br/>Author&#160;Peleeger, Charles P.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P44 1989<br/>Publisher&#160;Prentice-Hall,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780137989430<br/> Kajian keselamatan data dan komputer di Malaysia ent://SD_ILS/0/SD_ILS:181910 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Nor Adibah Ramli<br/>Author&#160;Nor Adibah Ramli<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N67 1989 raf<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1989<br/>Tesis (Sarjana Muda Sains Komputer) - Universiti teknologi Malaysia, 1989<br/> Auditing computer security : a manual with case studies ent://SD_ILS/0/SD_ILS:104861 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Vallabhaneni, S. Rao<br/>Author&#160;Vallabhaneni, S. Rao<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 V35 1989 f<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780471626046<br/> Sistem perkhidmatan awam ; Penjana laluan aturcara bagi bahasa Turbo Pascal ; Kajian keselamatan data dan komputer di Malaysia ; Kajian sistem di Baitulmal ; Sistem belanjawan Institut Sains Komputer ; Sistem maklumat kiriman wang bagi bank ent://SD_ILS/0/SD_ILS:9212 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Nor Eyniwati Hassan<br/>Author&#160;Nor Eyniwati Hassan,&#160;Nor'aini Mohamed Haris,&#160;Nor Adibah Ramli,&#160;Noraini Mohd. Zain,&#160;Noriah Mohamed, 1944-<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 5442-5447 ra<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1989<br/> Kajian keselamatan maklumat dalam Bahasa Malaysia yang telah dienkrip ent://SD_ILS/0/SD_ILS:432761 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Salina Salam<br/>Author&#160;Salina Salam<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D37 S34 1988 raf<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1988<br/>Tesis (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1988<br/> Building a secure computer systems ent://SD_ILS/0/SD_ILS:459813 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Gasser, Morrie<br/>Author&#160;Gasser, Morrie<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G37 1988<br/>Publisher&#160;Van Nostrand Reinhold,<br/>Publication Date&#160;1988<br/>ISBN&#160;9780442230227<br/> Konsep kerahsiaan dan keselamatan dengan menggunakan kriptografi kunci umum ent://SD_ILS/0/SD_ILS:437074 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Fauziah Abu Mansor<br/>Author&#160;Fauziah Abu Mansor<br/>Format:&#160;Books<br/>Call Number&#160;Z104.F48 1988 raf<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1988<br/>Tesis (Sarjana Muda Kejuruteraan Elektrik) - Universiti Teknologi Malaysia, 1988<br/> Database security : status and prospects ent://SD_ILS/0/SD_ILS:295553 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Landwehr, Carl E.<br/>Author&#160;Landwehr, Carl E.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D32 D37 1988<br/>Publisher&#160;North Holland,<br/>Publication Date&#160;1988<br/>ISBN&#160;9780444704795<br/> Penyemak ejaan Bahasa Malaysia; Sistem sokongan kataputus untuk penjadualan waktu pemeriksaan : pelaksanaan pada komputer mikro; Penjanaan berkomputer ayat-ayat Bahasa Malaysia mudah; Pembentukan penghurai dalam pengkompil; Kajian keselamatan maklumat dalam Bahasa Malaysia yang telah dienkrip; Perisian pemampatan/nyahmampatan teks ent://SD_ILS/0/SD_ILS:166770 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Siti Nurliza Mokhtar<br/>Author&#160;Siti Nurliza Mokhtar,&#160;Hendri Dwisatrya Sabir Husin Athar,&#160;Mohd. Nasir A. Rahman,&#160;Zaleha @ Siti Zaleha Yusof,&#160;Zalila Sumari<br/>Format:&#160;Books<br/>Call Number&#160;MFL 3864-3869 ra<br/>Publication Date&#160;1988<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1988<br/> Access control and personal identification systems ent://SD_ILS/0/SD_ILS:184294 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Bowers, Dan M.<br/>Author&#160;Bowers, Dan M.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B68 1988<br/>Publisher&#160;Butterworths,<br/>Publication Date&#160;1988<br/>ISBN&#160;9780409900835<br/> Konsep kerahsiaan dan keselamatan dengan menggunakan kriptografi kunci umum; Sistem kawalan pemacuan motor aruhan lelurus; Optimal control design in frequency domain; Versatile auto programmer system; Biomedical telemetry system for freely moving patients; Considerations in technology upgrading; Slow scan TV (SSTV) ent://SD_ILS/0/SD_ILS:8898 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Fauziah Abu Mansor @ Mash-hod<br/>Author&#160;Fauziah Abu Mansor @ Mash-hod,&#160;Nik Din Muhamad,&#160;Chean, Kooi Chyi,&#160;Chua, Poh Cheng,&#160;Nilavarasan Periasamy<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 3914-3920 ra<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1988<br/>Kertas projek (Sarjana Muda Kejuruteraan Elektrik) - Universiti Teknologi Malaysia,1988.<br/> Introduction to cryptology ent://SD_ILS/0/SD_ILS:173212 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Beckett, Brian<br/>Author&#160;Beckett, Brian<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B42 1988<br/>Publisher&#160;Blackwell Scientific Pub.,<br/>Publication Date&#160;1988<br/>ISBN&#160;9780632022434<br/> Computers, business and security : the new role for security ent://SD_ILS/0/SD_ILS:468707 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Schweitzer, James A.<br/>Author&#160;Schweitzer, James A.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S23 1987<br/>Publisher&#160;Butterworths,<br/>Publication Date&#160;1987<br/>ISBN&#160;9780409900651<br/> Computer auditing, security and internal control manual ent://SD_ILS/0/SD_ILS:450650 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Kuong, Javier F.<br/>Author&#160;Kuong, Javier F.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K86 1987<br/>Publisher&#160;Prentice-Hall,<br/>Publication Date&#160;1987<br/>ISBN&#160;9780131629677<br/> A Handbook of computer security ent://SD_ILS/0/SD_ILS:171598 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Hearnden, Keith<br/>Author&#160;Hearnden, Keith<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.H363 1987<br/>Publisher&#160;Kogan page,<br/>Publication Date&#160;1987<br/>ISBN&#160;9781850913481<br/> Computer security ent://SD_ILS/0/SD_ILS:182467 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Carrol, John M.<br/>Author&#160;Carrol, John M.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.C27 1987<br/>Edition&#160;2nd ed<br/>Publisher&#160;Butterworth Pub.,<br/>Publication Date&#160;1987<br/>ISBN&#160;9780409900323<br/> Data &amp; computer security : dictionary of standards, concepts and terms ent://SD_ILS/0/SD_ILS:190947 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Longley, Dennis<br/>Author&#160;Longley, Dennis,&#160;Shain, Michael<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L67 1987 rd<br/>Publisher&#160;Stockton Pr,<br/>Publication Date&#160;1987<br/>ISBN&#160;9780333429358<br/> Computer security ent://SD_ILS/0/SD_ILS:403215 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C67 1986 f<br/>Publisher&#160;Time life Books,<br/>Publication Date&#160;1986<br/>ISBN&#160;9780809456703<br/> Foiling the systems breakers : computer security and access control ent://SD_ILS/0/SD_ILS:460388 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Lobel, Jerome<br/>Author&#160;Lobel, Jerome<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 L62 1986<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;1986<br/>ISBN&#160;9780070383579<br/> Proceedings of the Symposium on Security and Privacy, 1985, Oakland, California ent://SD_ILS/0/SD_ILS:189395 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Symposium on Security and Privacy (1985 : Oakland, California)<br/>Author&#160;Symposium on Security and Privacy (1985 : Oakland, California)<br/>Format:&#160;Books<br/>Call Number&#160;TK7885.S42 1985f<br/>Publisher&#160;IEEE Computer Soc,<br/>Publication Date&#160;1985<br/>ISBN&#160;9780818606298<br/> Spies in the wires ent://SD_ILS/0/SD_ILS:9666 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z Format:&#160;Visual Materials<br/>Call Number&#160;KVD 446<br/>Publisher&#160;BBC,<br/>Publication Date&#160;1985<br/> Computer-security technology ent://SD_ILS/0/SD_ILS:466561 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Cooper, James Arlin<br/>Author&#160;Cooper, James Arlin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C66 1984<br/>Publisher&#160;Lexington Books,<br/>Publication Date&#160;1984<br/>ISBN&#160;9780669064360<br/> Computer security : a global challenge ent://SD_ILS/0/SD_ILS:296085 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;IFIP International Conference on Computer Security, 2nd: 1984 : Toronto, Ontario, Canada)<br/>Author&#160;IFIP International Conference on Computer Security, 2nd: 1984 : Toronto, Ontario, Canada),&#160;Finch, James H.,&#160;Dougall, E. Graham<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I35 1984<br/>Publisher&#160;North Holland,<br/>Publication Date&#160;1984<br/>ISBN&#160;9780444876188<br/> Information systems security ent://SD_ILS/0/SD_ILS:236737 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Fisher, Royal P., 1932-<br/>Author&#160;Fisher, Royal P., 1932-<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.F57 1984<br/>Publisher&#160;Prentice-Hall,<br/>Publication Date&#160;1984<br/>ISBN&#160;9780134647272<br/> Computer security : a global challenge ent://SD_ILS/0/SD_ILS:532055 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z Format:&#160;Books<br/>Publisher&#160;North-Holland,<br/>Publication Date&#160;1984<br/>ISBN&#160;9780444876188<br/> Information intergrity : a structures for its defination and management ent://SD_ILS/0/SD_ILS:457099 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Becker, Hal B.<br/>Author&#160;Becker, Hal B.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.M3 B42 1983<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;1983<br/>ISBN&#160;9780070041912<br/> Cryptography and data security ent://SD_ILS/0/SD_ILS:296031 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Denning, Dorothy Elizabeth Robling<br/>Author&#160;Denning, Dorothy Elizabeth Robling<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D46 1982<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;1983&#160;1982<br/>ISBN&#160;9780201101508<br/> Geodetic computation crime : a guide for managers ent://SD_ILS/0/SD_ILS:291873 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Bequai, August<br/>Author&#160;Bequai, August<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2 B44 1983<br/>Publisher&#160;John Wiley,<br/>Publication Date&#160;1983<br/>ISBN&#160;9780471093671<br/> How to prevent computer crime : a guide for managers ent://SD_ILS/0/SD_ILS:170531 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Bequai, August<br/>Author&#160;Bequai, August<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2B44 1983<br/>Publisher&#160;Wiley<br/>Publication Date&#160;1983<br/>ISBN&#160;9780471093671<br/> Database security and integrity ent://SD_ILS/0/SD_ILS:457161 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Fernandez, Eduardo B., 1936-<br/>Author&#160;Fernandez, Eduardo B., 1936-,&#160;Summers, Rita C.,&#160;Wood, Christopher<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D3 F47 1981<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;1981<br/>ISBN&#160;9780201144673<br/> Computer fraud and counter measures ent://SD_ILS/0/SD_ILS:462850 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Krauss, Leonard I.<br/>Author&#160;Krauss, Leonard I.,&#160;Macgahan, Aileen<br/>Format:&#160;Books<br/>Call Number&#160;HV6773.K73 1979<br/>Publisher&#160;Prentice-Hall,<br/>Publication Date&#160;1979<br/>ISBN&#160;9780131647725<br/> Computer security ent://SD_ILS/0/SD_ILS:296008 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Hsiao, David K.<br/>Author&#160;Hsiao, David K.,&#160;Kerr, Douglas S.,&#160;Madnick, Stuart E.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H74 1979<br/>Publisher&#160;Academic,<br/>Publication Date&#160;1979<br/>ISBN&#160;9780123576507<br/> Foundations of secure computation ent://SD_ILS/0/SD_ILS:458899 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;DeMillo, Richard A.<br/>Author&#160;DeMillo, Richard A.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F68 1978<br/>Publisher&#160;Academic Press,<br/>Publication Date&#160;1978<br/>ISBN&#160;9780122103506<br/> System 360/370 : job control language and the access methods ent://SD_ILS/0/SD_ILS:300201 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Hannula, Reino<br/>Author&#160;Hannula, Reino<br/>Format:&#160;Books<br/>Call Number&#160;QA76.8.I12 H28 1977<br/>Publisher&#160;Addison-Wesley Pub.,<br/>Publication Date&#160;1977<br/>ISBN&#160;9780201027556<br/> Modern methods for computer security and privacy ent://SD_ILS/0/SD_ILS:463731 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Hoffman, Lance J.<br/>Author&#160;Hoffman, Lance J.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H63 1977<br/>Publisher&#160;Prentice-Hall,<br/>Publication Date&#160;1977<br/>ISBN&#160;9780135952078<br/> Data base and computer systems security ent://SD_ILS/0/SD_ILS:298540 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Carroll, John Millar, 1950-<br/>Author&#160;Carroll, John Millar, 1950-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9. D3 D37 1976 f<br/>Publisher&#160;Q.E.D. Information Sciences,<br/>Publication Date&#160;1976<br/>ISBN&#160;9780894350023<br/> Access mechanisms and data structure support in data base management systems ent://SD_ILS/0/SD_ILS:298575 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Curtice, Robert M.<br/>Author&#160;Curtice, Robert M.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D3 D37 1975 f<br/>Publisher&#160;Q.E.D. Information Sciences,<br/>Publication Date&#160;1975<br/> Cryptolib: cryptography in software ent://SD_ILS/0/SD_ILS:415709 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Lacy, John B.<br/>Author&#160;Lacy, John B.<br/>Format:&#160;Books<br/>Call Number&#160;MAK 5972<br/> An access control scheme based on Chinese remainder theorem and time-stamp concept ent://SD_ILS/0/SD_ILS:454551 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Min-Shiang, Hwang<br/>Author&#160;Min-Shiang, Hwang,&#160;Wen-Guey, Tzeng,&#160;Wei-Pang, Yang<br/>Format:&#160;Books<br/>Call Number&#160;MAK 7183<br/> A two-key-lock-pair access control method using prime factorization and time stamp ent://SD_ILS/0/SD_ILS:459763 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Min-Shiang, Hwang<br/>Author&#160;Min-Shiang, Hwang,&#160;Wen-Guey, Tzeng,&#160;Wei-Pang, Yang<br/>Format:&#160;Books<br/>Call Number&#160;MAK 7184<br/> A binary access control method using prime factorization ent://SD_ILS/0/SD_ILS:452786 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Chin-Chen Chang<br/>Author&#160;Chin-Chen Chang,&#160;Lou, Der-Chyuan<br/>Format:&#160;Books<br/>Call Number&#160;MAK 7180<br/> Algorithms for use in banking message authentication ent://SD_ILS/0/SD_ILS:435299 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;British Standards Institution<br/>Author&#160;British Standards Institution<br/>Format:&#160;Books<br/>Call Number&#160;PIA BS 7102 : 1989<br/> Cryptography workbench version 2.0 ent://SD_ILS/0/SD_ILS:168995 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Mohd. Razali Mohamed Lis<br/>Author&#160;Mohd. Razali Mohamed Lis<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M53 1992 raf<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1992<br/> The need for security ent://SD_ILS/0/SD_ILS:104114 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;The Housley Computer Network Security Seminar (1987 : Melbourne)<br/>Author&#160;The Housley Computer Network Security Seminar (1987 : Melbourne),&#160;Davies, D. W.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H68 1987 f<br/> APPLICATION OF K-MEANS IN REDUCING FALSE POSITIVE ALARMS IN INTRUSION PREVENTION SYSTEMS ent://SD_ILS/0/SD_ILS:836165 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Iman Biglari, 1982-, author<br/>Author&#160;Iman Biglari, 1982-, author,&#160;Bharanidharan Shanmugam, Dr.,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I436 2010 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> APPLICATION OF K-MEANS IN REDUCING FALSE POSITIVE ALARMS IN INTRUSION PREVENTION SYSTEMS ent://SD_ILS/0/SD_ILS:836166 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Iman Biglari, 1982-, author<br/>Author&#160;Iman Biglari, 1982-, author,&#160;Bharanidharan Shanmugam, Dr.,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 034123 ra<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> WEB-BASED DIGITAL RIGHTS MANAGEMENT SYSTEM FOR THE MALAYSIAN CULTURE AND HERITAGE DIGITAL BANK PROJECT ent://SD_ILS/0/SD_ILS:837565 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Wan Mohd. Khairi Wan Mohamed, 1983-, author<br/>Author&#160;Wan Mohd. Khairi Wan Mohamed, 1983-, author,&#160;Rusni Daruis, Assoc.Prof., supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W366 2012 raf<br/>Thesis&#160;Sarjana Sains (Teknologi Maklumat - Pengurusan)<br/> WEB-BASED DIGITAL RIGHTS MANAGEMENT SYSTEM FOR THE MALAYSIAN CULTURE AND HERITAGE DIGITAL BANK PROJECT ent://SD_ILS/0/SD_ILS:837572 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Wan Mohd. Khairi Wan Mohamed, 1983-, author<br/>Author&#160;Wan Mohd. Khairi Wan Mohamed, 1983-, author,&#160;Rusni Daruis, Assoc.Prof., author,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 034145 ra<br/>Thesis&#160;Sarjana Sains (Teknologi Maklumat - Pengurusan))<br/> A ONE-TIME PASSWORD METHOD FOR USER AUTHENTICATION IN CLOUD COMPUTING ent://SD_ILS/0/SD_ILS:837853 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Ahmad Azarnik, 1982-, author<br/>Author&#160;Ahmad Azarnik, 1982-, author,&#160;Mazdak Zamani, Dr., supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A363 2013 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> A ONE-TIME PASSWORD METHOD FOR USER AUTHENTICATION IN CLOUD COMPUTING ent://SD_ILS/0/SD_ILS:837854 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Ahmad Azarnik, 1982-, author<br/>Author&#160;Ahmad Azarnik, 1982-, author,&#160;Mazdak Zamani, Dr., supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 034155 ra<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> ENHANCE KEY GENERATOR OF DATA ENCRYPTION STANDARD (DES) ent://SD_ILS/0/SD_ILS:837864 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Mahan Niknafskermani, 1982-, author<br/>Author&#160;Mahan Niknafskermani, 1982-, author,&#160;Norbik Bashah Idris, Dato&rsquo; Prof. Dr., supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M343 2012 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> ENHANCE KEY GENERATOR OF DATA ENCRYPTION STANDARD (DES) ent://SD_ILS/0/SD_ILS:837866 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Mahan Niknafskermani, 1982-, author<br/>Author&#160;Mahan Niknafskermani, 1982-, author,&#160;Norbik Bashah Idris, Dato&rsquo; Prof. Dr., supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 034145 ra<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> ANALYZING THE EFFECTIVENESS OF INFORMATION SECURITY PRACTICES IN IMPLEMENTING ISMS STANDARD ent://SD_ILS/0/SD_ILS:837877 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Rohaida Ismail, 1984-, author<br/>Author&#160;Rohaida Ismail, 1984-, author,&#160;Zuraini Ismail, Assoc.Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R643 2012 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> ANALYZING THE EFFECTIVENESS OF INFORMATION SECURITY PRACTICES IN IMPLEMENTING ISMS STANDARD ent://SD_ILS/0/SD_ILS:837878 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Rohaida Ismail, 1984-, author<br/>Author&#160;Rohaida Ismail, 1984-, author,&#160;Zuraini Ismail, Assoc.Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034149 ra<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> IMPLEMENTING A TWO-FACTOR AUTHENTICATION PHYSICAL ACCESS CONTROL SYSTEM ent://SD_ILS/0/SD_ILS:839430 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Usama Tharwat Farag Elhagari, 1970-, author<br/>Author&#160;Usama Tharwat Farag Elhagari, 1970-, author,&#160;Zailani Mohamed Sidek, Assoc.Prof., supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 U83 2007 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> AWARENESS OF THE SIGNIFICANT OF BIOMETRIC SYSTEMS ent://SD_ILS/0/SD_ILS:844139 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Fadzrina Ramli, 1983-, author<br/>Author&#160;Fadzrina Ramli, 1983-, author,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK7882.B56 F33 2014 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> AWARENESS OF THE SIGNIFICANT OF BIOMETRIC SYSTEMS ent://SD_ILS/0/SD_ILS:844142 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Fadzrina Ramli, 1983-, author<br/>Author&#160;Fadzrina Ramli, 1983-, author,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034513 ra<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> DBCRYPT : (MANUAL AND TRANSPARENT ENCRYPTION/DECRYPTION) ent://SD_ILS/0/SD_ILS:841749 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Mustafa Ahmed Abdullah Aqel, 1979-, author<br/>Author&#160;Mustafa Ahmed Abdullah Aqel, 1979-, author,&#160;Mohd. Nazri Kama, 1963-, supervisor,&#160;Muhammad Sufyan Basri, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M878 2007 raf<br/>Thesis&#160;Sarjana Sains (Sains Komputer - Kejuruteraan Perisian Masa Nyata)<br/> SECURED ACCESS CONTROL MODEL FOR KNOWLEDGE MANAGEMENT SYSTEM ent://SD_ILS/0/SD_ILS:844085 2019-11-14T06:11:53Z 2019-11-14T06:11:53Z by&#160;Azlina Ahmad, author<br/>Author&#160;Azlina Ahmad, author,&#160;Saiful Adli Ismail, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A955 2014 raf<br/>Thesis&#160;Sarjana Sains (Jaminan Maklumat)<br/>