Search Results for Computers -- Access control - Narrowed by: English - Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur) SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dComputers$002b--$002bAccess$002bcontrol$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dAUTHOR$002509Author$002509Conference$002bon$002bInformation$002bTechnology$002bResearch$002band$002bApplications$002b$0025282002$002b$00253A$002bUNITAR$00252C$002bKuala$002bLumpur$002529$002509Conference$002bon$002bInformation$002bTechnology$002bResearch$002band$002bApplications$002b$0025282002$002b$00253A$002bUNITAR$00252C$002bKuala$002bLumpur$002529$0026ps$003d300? 2020-08-14T08:53:16Z Database encrytion schemes : a comparative study ent://SD_ILS/0/SD_ILS:351511 2020-08-14T08:53:16Z 2020-08-14T08:53:16Z by&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.,&#160;Norbik Bashah Idris,&#160;Harihodin Selamat,&#160;Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Z34 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> DoS attacks detection using intrusion detection system and system calls ent://SD_ILS/0/SD_ILS:321462 2020-08-14T08:53:16Z 2020-08-14T08:53:16Z by&#160;Mohd. Aizaini Maarof<br/>Author&#160;Mohd. Aizaini Maarof,&#160;Pathmenanthan Ramakrishna,&#160;Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M346 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>