Search Results for Computers -- Access control - Narrowed by: English - Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)SirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dComputers$002b--$002bAccess$002bcontrol$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dAUTHOR$002509Author$002509Conference$002bon$002bInformation$002bTechnology$002bResearch$002band$002bApplications$002b$0025282002$002b$00253A$002bUNITAR$00252C$002bKuala$002bLumpur$002529$002509Conference$002bon$002bInformation$002bTechnology$002bResearch$002band$002bApplications$002b$0025282002$002b$00253A$002bUNITAR$00252C$002bKuala$002bLumpur$002529$0026ic$003dtrue$0026ps$003d300?dt=list2024-04-19T20:34:45ZDatabase encrytion schemes : a comparative studyent://SD_ILS/0/SD_ILS:3515112024-04-19T20:34:45Z2024-04-19T20:34:45Zby Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author Zailani Mohamed Sidek, Assoc.Prof.Dr., Norbik Bashah Idris, Harihodin Selamat, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.9.A25 Z34 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>DoS attacks detection using intrusion detection system and system callsent://SD_ILS/0/SD_ILS:3214622024-04-19T20:34:45Z2024-04-19T20:34:45Zby Mohd. Aizaini Maarof<br/>Author Mohd. Aizaini Maarof, Pathmenanthan Ramakrishna, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number TK5105.59 M346 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>