Search Results for Computers -- Access control - Narrowed by: EnglishSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dComputers$002b--$002bAccess$002bcontrol$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026ps$003d300$0026isd$003dtrue?dt=list2024-06-22T23:05:31ZAdvances in computer system securityent://SD_ILS/0/SD_ILS:1729312024-06-22T23:05:31Z2024-06-22T23:05:31Zby Turn, Rein,. 1931-<br/>Author Turn, Rein,. 1931-<br/>Format: Books<br/>Call Number QA76.9.A25 A38 1981-1988<br/>Publisher Artech House,<br/>Publication Date 2020 2019 2018 2017 2016<br/>ISBN 9780890061541 9780890060964<br/>Face verification system prototype on FPGA SOC platform for access controlent://SD_ILS/0/SD_ILS:8749832024-06-22T23:05:31Z2024-06-22T23:05:31Zby Ong, Sie Siong, 1994-, author<br/>Author Ong, Sie Siong, 1994-, author, Mohamed Khalil Hani, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number TA1653 O54 2018 raf<br/>Publication Date 2018<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Elektronik)) - Universiti Teknologi Malaysia, 2018<br/>Face verification system prototype on FPGA SOC platform for access controlent://SD_ILS/0/SD_ILS:8749872024-06-22T23:05:31Z2024-06-22T23:05:31Zby Ong, Sie Siong, 1994-, author<br/>Author Ong, Sie Siong, 1994-, author<br/>Format: Books<br/>Call Number CP 080717 ra<br/>Publication Date 2018<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Elektronik)) - Universiti Teknologi Malaysia, 2018<br/>Hybrid medium access control using token approach in wireless sensor network for high traffic applicationsent://SD_ILS/0/SD_ILS:8519342024-06-22T23:05:31Z2024-06-22T23:05:31Zby Nor Syahidatul Nadiah Ismail, 1985-, author<br/>Author Nor Syahidatul Nadiah Ismail, 1985-, author, Sharifah Hafizah Syed Ariffin, supervisor, Nurul Mua'zzah Abdul Latiff, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number TK7872.D48 N675 2015 raf<br/>Publication Date 2015<br/>Thesis (Ph.D (Kejuruteraan Elektrik)) - Universiti Teknologi Malaysia, 2015<br/>Acceptance towards using mobile phone number as single sign on identityent://SD_ILS/0/SD_ILS:8593532024-06-22T23:05:31Z2024-06-22T23:05:31Zby Sharifah Zabedah Ainon Azim, 1982-, author<br/>Author Sharifah Zabedah Ainon Azim, 1982-, author, Wardah Zainal Abidin, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 S538 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>Information security : principles and new conceptsent://SD_ILS/0/SD_ILS:8370582024-06-22T23:05:31Z2024-06-22T23:05:31Zby Hobbs, Fiona, editor<br/>Author Hobbs, Fiona, editor<br/>Format: Books<br/>Call Number QA76.9.A25 I549 2015 f v.1<br/>Publisher Clanrye Intl.,<br/>Publication Date 2015<br/>ISBN 9781632403063 9781632403070 9781632403087 9781632403094<br/>Managing risk in information systemsent://SD_ILS/0/SD_ILS:8391282024-06-22T23:05:31Z2024-06-22T23:05:31Zby Gibson, Darril, author<br/>Author Gibson, Darril, author<br/>Format: Books<br/>Call Number QA76.9.A25 G53 2015<br/>Edition Second edition<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2015<br/>ISBN 9781284055955<br/>Acceptance towards using mobile phone number as single sign on identityent://SD_ILS/0/SD_ILS:8596382024-06-22T23:05:31Z2024-06-22T23:05:31Zby Sharifah Zabedah Ainon Azim, 1982-, author<br/>Author Sharifah Zabedah Ainon Azim, 1982-, author, Wardah Zainal Abidin, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034744 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>Enhancing password storage securityent://SD_ILS/0/SD_ILS:8603072024-06-22T23:05:31Z2024-06-22T23:05:31Zby Yeoh, Soon Yau, 1991-, author<br/>Author Yeoh, Soon Yau, 1991-, author, Mazleena Salleh, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 Y46 2015 raf<br/>Publication Date 2015<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Enhancing password storage securityent://SD_ILS/0/SD_ILS:8603372024-06-22T23:05:31Z2024-06-22T23:05:31Zby Yeoh, Soon Yau, 1991-, author<br/>Author Yeoh, Soon Yau, 1991-, author, Mazleena Salleh, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number CP 061137 ra<br/>Publication Date 2015<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Identity and access management : business performanve through connected intelligenceent://SD_ILS/0/SD_ILS:8312282024-06-22T23:05:31Z2024-06-22T23:05:31Zby Osmanoglu, Ertem<br/>Author Osmanoglu, Ertem<br/>Format: Books<br/>Call Number QA76.9.A25 O78 2013<br/>Publisher Syngress, an imprint of Elsevier,<br/>Publication Date 2014<br/>ISBN 9780124081406<br/>The basics of digital privacy : simple tools to protect your personal information and your identity onlineent://SD_ILS/0/SD_ILS:8312662024-06-22T23:05:31Z2024-06-22T23:05:31Zby Cherry, Denny<br/>Author Cherry, Denny, Larock, Thomas, technical editor<br/>Format: Books<br/>Call Number QA76.9.A25 C444 2014<br/>Publisher Elsevier,<br/>Publication Date 2014<br/>ISBN 9780128000113<br/>Face recognition security system for access controlent://SD_ILS/0/SD_ILS:8544712024-06-22T23:05:31Z2024-06-22T23:05:31Zby Nur Adila Mohd. Razali, 1991-<br/>Author Nur Adila Mohd. Razali, 1991-, Hazlina Selamat, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number TA1653 N33 2014 raf<br/>Publication Date 2014<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Elektronik)) - Universiti Teknologi Malaysia, 2014<br/>Face recognition security system for access controent://SD_ILS/0/SD_ILS:8544752024-06-22T23:05:31Z2024-06-22T23:05:31Zby Nur Adila Mohd. Razali, 1991-<br/>Author Nur Adila Mohd. Razali, 1991-<br/>Format: Books<br/>Call Number CP 057248 ra<br/>Publication Date 2014<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Elektronik)) - Universiti Teknologi Malaysia, 2014<br/>Access control, authentication, and public key infrastructureent://SD_ILS/0/SD_ILS:8329842024-06-22T23:05:31Z2024-06-22T23:05:31Zby Chapple, Mike, author<br/>Author Chapple, Mike, author<br/>Format: Books<br/>Call Number TK5105.59 A234 2014<br/>Edition 2nd ed.<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2014<br/>ISBN 9781284031591<br/>The Intrusion detection networks : a key to collaborative securityent://SD_ILS/0/SD_ILS:8372902024-06-22T23:05:31Z2024-06-22T23:05:31Zby Fung, Carol author<br/>Author Fung, Carol author, Boutaba, Raouf<br/>Format: Books<br/>Call Number QA76.9 A25 F85 2014<br/>Publisher Auerbach Pub.,<br/>Publication Date 2014<br/>ISBN 9781466564121<br/>Flat role based access control and encryption scheme for database securityent://SD_ILS/0/SD_ILS:8034762024-06-22T23:05:31Z2024-06-22T23:05:31Zby Al Farissi, 1985-<br/>Author Al Farissi, 1985-<br/>Format: Books<br/>Call Number CP 032498 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Enhancing time-stamping techniqe by implementing media access control addressent://SD_ILS/0/SD_ILS:8037832024-06-22T23:05:31Z2024-06-22T23:05:31Zby Pacu Putra Suarli, 1989-<br/>Author Pacu Putra Suarli, 1989-, Mazleena Salleh, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 P33 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>UTM security with Fortinet : Mastering FortiOSent://SD_ILS/0/SD_ILS:8038172024-06-22T23:05:31Z2024-06-22T23:05:31Zby Tam, Kenneth<br/>Author Tam, Kenneth<br/>Format: Books<br/>Call Number TK5105.59 U86 2013 a<br/>Publisher Syngress,<br/>Publication Date 2013<br/>ISBN 9781597497473<br/>Enhancing time-stamping techniqe by implementing media access control addressent://SD_ILS/0/SD_ILS:8040882024-06-22T23:05:31Z2024-06-22T23:05:31Zby Pacu Putra Suarli, 1989-<br/>Author Pacu Putra Suarli, 1989-<br/>Format: Books<br/>Call Number CP 030214 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat))) - Universiti Teknologi Malaysia, 2013<br/>Analyzing pattern matching algorithms applied on snort intrusion detection systement://SD_ILS/0/SD_ILS:8045062024-06-22T23:05:31Z2024-06-22T23:05:31Zby Abdifatah Abdirahman Abdullahi, 1986-<br/>Author Abdifatah Abdirahman Abdullahi, 1986-, Mohd. Aizaini Maarof, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number TK5105.59 A234 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer ( Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Analyzing pattern matching algorithms applied on snort intrusion detection systement://SD_ILS/0/SD_ILS:8045072024-06-22T23:05:31Z2024-06-22T23:05:31Zby Abdifatah Abdirahman Abdullah, 1986- author<br/>Author Abdifatah Abdirahman Abdullah, 1986- author, Fakulti Komputeran<br/>Format: Books<br/>Call Number CP 030021 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer ( Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Keselamatan pengesahan menggunakan kaedah katalaluan grafik berdasarkan konsep jigsaw puzzleent://SD_ILS/0/SD_ILS:8076082024-06-22T23:05:31Z2024-06-22T23:05:31Zby Nurul Izzah Masduki<br/>Author Nurul Izzah Masduki, Hazinah Kutty Mammi, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 N878 2013 raf<br/>Publication Date 2013<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Keselamatan pengesahan menggunakan kaedah katalaluan grafik berdasarkan konsep jigsaw puzzleent://SD_ILS/0/SD_ILS:8076092024-06-22T23:05:31Z2024-06-22T23:05:31Zby Nurul Izzah Masduki<br/>Author Nurul Izzah Masduki<br/>Format: Books<br/>Call Number CP 030725 ra<br/>Publication Date 2013<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Credential purpose-based access control for personal data protection in web-based applicationsent://SD_ILS/0/SD_ILS:8091062024-06-22T23:05:31Z2024-06-22T23:05:31Zby Norjihan Abdul Ghani, 1977- , author<br/>Author Norjihan Abdul Ghani, 1977- , author, Harihodin Selamat, Zailani Mohamed Sidek, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 N676 2013 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2013<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Web penetration testing with kali linux : a practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocol with kali linuxent://SD_ILS/0/SD_ILS:8314392024-06-22T23:05:31Z2024-06-22T23:05:31Zby Muniz, Joseph<br/>Author Muniz, Joseph, Lakhani, Aamir<br/>Format: Books<br/>Call Number QA76.9.A25 M86 2013<br/>Publisher Packt publishing ,<br/>Publication Date 2013<br/>ISBN 9781782163169<br/>Flat role based access control and encryption scheme for database securityent://SD_ILS/0/SD_ILS:8034752024-06-22T23:05:31Z2024-06-22T23:05:31Zby Al Farissi, 1985-<br/>Author Al Farissi, 1985-, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.D314 A44 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:8052872024-06-22T23:05:31Z2024-06-22T23:05:31Zby Williams, Barry L.<br/>Author Williams, Barry L.<br/>Format: Books<br/>Call Number QA76.9.A25 W55 2013<br/>Publisher CRC Press, Taylor & Francis Group,<br/>Publication Date 2013<br/>ISBN 9781466580589<br/>Multi level authentication mechanism for grid application using one-time passwordent://SD_ILS/0/SD_ILS:8117502024-06-22T23:05:31Z2024-06-22T23:05:31Zby Armaghan Behnia, 1986-<br/>Author Armaghan Behnia, 1986-, Imran Ghani, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 A76 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Multi level authentication mechanism for grid application using one-time passwordent://SD_ILS/0/SD_ILS:8117512024-06-22T23:05:31Z2024-06-22T23:05:31Zby Armaghan Behnia, 1986-<br/>Author Armaghan Behnia, 1986-<br/>Format: Books<br/>Call Number CP 031744 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Enhancement of network access control architecture with virtualizationent://SD_ILS/0/SD_ILS:8408232024-06-22T23:05:31Z2024-06-22T23:05:31Zby Hairil Annuar Md Salleh, 1977-<br/>Author Hairil Annuar Md Salleh, 1977-, Shanmugam, Bharanidharan, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034013 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Enhancement of network access control architecture with virtualizationent://SD_ILS/0/SD_ILS:8408222024-06-22T23:05:31Z2024-06-22T23:05:31Zby Hairil Annuar Md Salleh, 1977-<br/>Author Hairil Annuar Md Salleh, 1977-, Shanmugam, Bharanidharan, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 H35 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>FSKSM UTM information security governance frameworkent://SD_ILS/0/SD_ILS:7931432024-06-22T23:05:31Z2024-06-22T23:05:31Zby Amir Haziq Loh Bojeng, 1986-<br/>Author Amir Haziq Loh Bojeng, 1986-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A457 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>An Analysis of information security awareness on different level of user in FSKSM UTM Skudaient://SD_ILS/0/SD_ILS:7932812024-06-22T23:05:31Z2024-06-22T23:05:31Zby Norsyaliza Abd. Razak, 1986-<br/>Author Norsyaliza Abd. Razak, 1986-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 N677 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Improving graphical password anti-shoulder surfing technique for mobile device using painting album mechanisment://SD_ILS/0/SD_ILS:7933342024-06-22T23:05:31Z2024-06-22T23:05:31Zby Lim, Kah Seng, 1986-<br/>Author Lim, Kah Seng, 1986-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 L565 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Improving graphical password anti-shoulder surfing technique for mobile device using painting album mechanisment://SD_ILS/0/SD_ILS:7933362024-06-22T23:05:31Z2024-06-22T23:05:31Zby Lim, Kah Seng, 1986-<br/>Author Lim, Kah Seng, 1986-<br/>Format: Books<br/>Call Number CP 028068 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/>Client-side attacks and defenseent://SD_ILS/0/SD_ILS:7979482024-06-22T23:05:31Z2024-06-22T23:05:31Zby Shimonski, Robert<br/>Author Shimonski, Robert, Oriyano, Sean-Philip<br/>Format: Books<br/>Call Number TK5105.59 S55 2012<br/>Publisher Syngress,<br/>Publication Date 2012<br/>ISBN 9781597495905<br/>Ontalogy driven privacy access control for healthcare information systement://SD_ILS/0/SD_ILS:8037632024-06-22T23:05:31Z2024-06-22T23:05:31Zby Aidarus Mohamed Ibrahim, 1984-<br/>Author Aidarus Mohamed Ibrahim, 1984-, Imran Ghani, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number Q387.2 A33 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Role mining in business : taming role-based access control administrationent://SD_ILS/0/SD_ILS:8083182024-06-22T23:05:31Z2024-06-22T23:05:31Zby Colantonio, Alessandro<br/>Author Colantonio, Alessandro, Di Pietro, Roberto, Ocello, Alberto<br/>Format: Books<br/>Call Number QA76.9.A25 C657 2012<br/>Publisher World Scientific,<br/>Publication Date 2012<br/>ISBN 9789814374002<br/>Human factor computer security awareness conceptual frameworkent://SD_ILS/0/SD_ILS:7782652024-06-22T23:05:31Z2024-06-22T23:05:31Zby Nasrin Badie, 1982-<br/>Author Nasrin Badie, 1982-<br/>Format: Books<br/>Call Number CP 027518 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Encryption implementation enhancement of AES-CCMP in 802.11Ient://SD_ILS/0/SD_ILS:7784012024-06-22T23:05:31Z2024-06-22T23:05:31Zby Iman Saberi, 1984-<br/>Author Iman Saberi, 1984-, Mazleena Salleh, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 I434 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Encryption implementation enhancement of AES-CCMP in 802.11Ient://SD_ILS/0/SD_ILS:7784052024-06-22T23:05:31Z2024-06-22T23:05:31Zby Iman Saberi, 1984-<br/>Author Iman Saberi, 1984-<br/>Format: Books<br/>Call Number CP 027521 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>A study and development of graphical user authentication for web based applicationent://SD_ILS/0/SD_ILS:7864962024-06-22T23:05:31Z2024-06-22T23:05:31Zby Mohd. Zamri Osman, 1987-<br/>Author Mohd. Zamri Osman, 1987-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M644 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>A study and development of graphical user authentication for web based applicationent://SD_ILS/0/SD_ILS:7864982024-06-22T23:05:31Z2024-06-22T23:05:31Zby Mohd. Zamri Osman, 1987-<br/>Author Mohd. Zamri Osman, 1987-<br/>Format: Books<br/>Call Number CP 027919 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Human factor computer security awareness conceptual frameworkent://SD_ILS/0/SD_ILS:7782632024-06-22T23:05:31Z2024-06-22T23:05:31Zby Nasrin Badie, 1982-<br/>Author Nasrin Badie, 1982-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A28 N37 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>UTM visitor RFID access control systement://SD_ILS/0/SD_ILS:7874852024-06-22T23:05:31Z2024-06-22T23:05:31Zby Chia, Hui Hui, 1988-, author<br/>Author Chia, Hui Hui, 1988-, author, Firoz Yusuf Patel Dawoodi, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK6553 C45 2012 raf<br/>Publication Date 2012<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/>UTM visitor RFID access control systement://SD_ILS/0/SD_ILS:7874872024-06-22T23:05:31Z2024-06-22T23:05:31Zby Chia, Hui Hui, 1988-, author<br/>Author Chia, Hui Hui, 1988-, author, Firoz Yusuf Patel Dawoodi, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Electronic Resources<br/>Call Number CP 058476 ra<br/>Publication Date 2012<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2012<br/>FSKSM UTM information security governance frameworkent://SD_ILS/0/SD_ILS:7931442024-06-22T23:05:31Z2024-06-22T23:05:31Zby Amir Haziq Loh Bojeng, 1986-<br/>Author Amir Haziq Loh Bojeng, 1986-<br/>Format: Books<br/>Call Number CP 028362 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>A multidisciplinary introduction to information securityent://SD_ILS/0/SD_ILS:8264252024-06-22T23:05:31Z2024-06-22T23:05:31Zby Mjolsnes, Stig F.<br/>Author Mjolsnes, Stig F.<br/>Format: Books<br/>Call Number QA76.9.A25 M562 2012<br/>Publisher CRC Press,<br/>Publication Date 2012 2011<br/>ISBN 9781420085907<br/>Design a framework for a security information and events management (SIEM) programsent://SD_ILS/0/SD_ILS:8365182024-06-22T23:05:31Z2024-06-22T23:05:31Zby Khalid Mohamed Mirghani, 1974-<br/>Author Khalid Mohamed Mirghani, 1974-, Bharanidharan Shanmugam, Dr., Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number TK5105.59 K43 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Design a framework for a security information and events management (SIEM) programsent://SD_ILS/0/SD_ILS:8365192024-06-22T23:05:31Z2024-06-22T23:05:31Zby Khalid Mohamed Mirghani, 1974-<br/>Author Khalid Mohamed Mirghani, 1974-, Bharanidharan Shanmugam, Dr., Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034114 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Security information and event management (SIEM) implementationent://SD_ILS/0/SD_ILS:6433282024-06-22T23:05:31Z2024-06-22T23:05:31Zby Miller, David, 1959-<br/>Author Miller, David, 1959-<br/>Format: Books<br/>Call Number TK5105.59 S445 2011<br/>Publisher McGraw-Hill,<br/>Publication Date 2011<br/>ISBN 9780071701099<br/>Metasploit : the penetration tester’s guideent://SD_ILS/0/SD_ILS:7990732024-06-22T23:05:31Z2024-06-22T23:05:31Zby Kennedy, David, 1982-<br/>Author Kennedy, David, 1982-<br/>Format: Books<br/>Call Number QA76.9.A25 M48 2011<br/>Publisher No Starch Press,<br/>Publication Date 2011<br/>ISBN 9781593272883<br/>Managed code rootkits : hooking into runtime environmentsent://SD_ILS/0/SD_ILS:7587782024-06-22T23:05:31Z2024-06-22T23:05:31Zby Metula, Erez<br/>Author Metula, Erez<br/>Format: Books<br/>Call Number QA76.9.A25 M487 2011<br/>Publisher Syngress,<br/>Publication Date 2011<br/>ISBN 9781597495745<br/>Access control, security, and trust : a logical approachent://SD_ILS/0/SD_ILS:7594052024-06-22T23:05:31Z2024-06-22T23:05:31Zby Chin, Shiu-Kai<br/>Author Chin, Shiu-Kai, Older, Susan Beth<br/>Format: Books<br/>Call Number QA76.9.A25 C45 2011<br/>Publisher Chapman & Hall/CRC,<br/>Publication Date 2011<br/>ISBN 9781584888628<br/>Security access control model for XML database based on bitmap and functionent://SD_ILS/0/SD_ILS:8398592024-06-22T23:05:31Z2024-06-22T23:05:31Zby Hamidreza Sabet Moghaddam<br/>Author Hamidreza Sabet Moghaddam, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.D314 H36 2011 raf<br/>Publication Date 2011<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2011<br/>Devising usability and security features for graphical password schemeent://SD_ILS/0/SD_ILS:6034792024-06-22T23:05:31Z2024-06-22T23:05:31Zby Muhammad Daniel Hafiz Abdullah, 1978-<br/>Author Muhammad Daniel Hafiz Abdullah, 1978-, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 017398 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Enhanced feature selection method for illicit web content filteringent://SD_ILS/0/SD_ILS:6262042024-06-22T23:05:31Z2024-06-22T23:05:31Zby Lee, Zhi Sam 1983-<br/>Author Lee, Zhi Sam 1983-, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 019634 ra<br/>Publication Date 2010<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Relation based access controlent://SD_ILS/0/SD_ILS:6378232024-06-22T23:05:31Z2024-06-22T23:05:31Zby Zhang, Rui<br/>Author Zhang, Rui<br/>Format: Books<br/>Call Number QA76.9.A25 Z43 2010<br/>Publisher IOS Pr.,<br/>Publication Date 2010<br/>ISBN 9783898386265<br/>Designing an IAM framework with Oracle identity and access management suiteent://SD_ILS/0/SD_ILS:8507512024-06-22T23:05:31Z2024-06-22T23:05:31Zby Scheidel, Jeff, author<br/>Author Scheidel, Jeff, author<br/>Format: Books<br/>Call Number QA76.9.A25 S337 2010<br/>Publisher Oracle/McGraw-Hill,<br/>Publication Date 2010<br/>ISBN 9780071741378<br/>Traffic light control for priority access based on visual basic and PLCent://SD_ILS/0/SD_ILS:7594082024-06-22T23:05:31Z2024-06-22T23:05:31Zby Chew, Ai Chain, 1987-<br/>Author Chew, Ai Chain, 1987-, Nor Haizan Mohamed Radzi, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.S88 C449 2010 raf<br/>Publication Date 2010<br/>Project Paper (Sarjana Muda Sains Komputer (Komputeran Industri)) - Universiti Teknologi Malaysia, 2010<br/>Traffic light control for priority access based on visual basic and PLCent://SD_ILS/0/SD_ILS:7594102024-06-22T23:05:31Z2024-06-22T23:05:31Zby Chew, Ai Chain, 1987-<br/>Author Chew, Ai Chain, 1987-<br/>Format: Books<br/>Call Number CP 026163 ra<br/>Publication Date 2010<br/>Project Paper (Sarjana Muda Sains Komputer (Komputeran Industri)) - Universiti Teknologi Malaysia, 2010<br/>Seven deadliest network attacksent://SD_ILS/0/SD_ILS:7589002024-06-22T23:05:31Z2024-06-22T23:05:31Zby Prowell, Stacy J.<br/>Author Prowell, Stacy J., Kraus, Rob, Borkin, Mike<br/>Format: Books<br/>Call Number TK5105.59 P76 2010<br/>Publisher Syngress,<br/>Publication Date 2010<br/>ISBN 9781597495493<br/>Enhanced feature selection method for illicit web content filteringent://SD_ILS/0/SD_ILS:6262022024-06-22T23:05:31Z2024-06-22T23:05:31Zby Lee, Zhi Sam 1983-<br/>Author Lee, Zhi Sam 1983-, Mohd. Aizaini Maarof, supervisor, Ali Selamat, supervisor, Siti Mariyam Shamsuddin, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.875.I57 L435 2010 raf<br/>Publication Date 2010<br/>Thesis (Ph.D (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Cryptography technique in securing the e-passport authentication systement://SD_ILS/0/SD_ILS:6035442024-06-22T23:05:31Z2024-06-22T23:05:31Zby Tham, Yuew Chyi, 1986-<br/>Author Tham, Yuew Chyi, 1986-<br/>Format: Computer file<br/>Call Number CP 026313 ra<br/>Publication Date 2009<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2009<br/>Contention-based collision-resolution medium access control algorithmsent://SD_ILS/0/SD_ILS:6413072024-06-22T23:05:31Z2024-06-22T23:05:31Zby Kartsakli, Elli<br/>Author Kartsakli, Elli<br/>Format: Books<br/>Call Number TK5105.55 C66 2009<br/>Publisher Nova Science Publishers,<br/>Publication Date 2009<br/>ISBN 9781606925805<br/>Expert SQL server 2008 encryptionent://SD_ILS/0/SD_ILS:6407182024-06-22T23:05:31Z2024-06-22T23:05:31Zby Coles, Michael, 1972-<br/>Author Coles, Michael, 1972-, Landrum, Rodney<br/>Format: Books<br/>Call Number QA76.9.A25 C653 2009<br/>Publisher Apress,<br/>Publication Date 2009<br/>ISBN 9781430224648 9781430224655<br/>Development of an access control model for web services applying XML-based approachent://SD_ILS/0/SD_ILS:5905952024-06-22T23:05:31Z2024-06-22T23:05:31Zby Homa Movahednejad, 1982-<br/>Author Homa Movahednejad, 1982-, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 019844 ra<br/>Publication Date 2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/>Handbook of research on information security and assuranceent://SD_ILS/0/SD_ILS:2933792024-06-22T23:05:31Z2024-06-22T23:05:31Zby Jatinder N. D. Gupta<br/>Author Jatinder N. D. Gupta, Gupta, Jatinder N. D.<br/>Format: Books<br/>Call Number TK5105.59 H353 2009<br/>Publisher Information Science Reference,<br/>Publication Date 2009<br/>ISBN 9781599048550<br/>Cryptography technique in securing the e-passport authentication systement://SD_ILS/0/SD_ILS:3699632024-06-22T23:05:31Z2024-06-22T23:05:31Zby Tham, Yuew Chyi, 1986-<br/>Author Tham, Yuew Chyi, 1986-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 T43 2009 raf<br/>Publication Date 2009<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2009<br/>Development of an access control model for web services applying XML-based approachent://SD_ILS/0/SD_ILS:3225802024-06-22T23:05:31Z2024-06-22T23:05:31Zby Homa Movahednejad, 1982-<br/>Author Homa Movahednejad, 1982-, Maslin Masrom, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.88813 H65 2009 raf<br/>Publication Date 2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/>Implementing NAP and NAC security technologies : the complete guide to network access controlent://SD_ILS/0/SD_ILS:2322082024-06-22T23:05:31Z2024-06-22T23:05:31Zby Hoffman, Daniel (Daniel V.), 1972-<br/>Author Hoffman, Daniel (Daniel V.), 1972-<br/>Format: Books<br/>Call Number TK5105.597 H63 2008<br/>Publisher Wiley,<br/>Publication Date 2008<br/>ISBN 9780470238387<br/>Policy-driven mobile ad hoc network managementent://SD_ILS/0/SD_ILS:2056342024-06-22T23:05:31Z2024-06-22T23:05:31Zby Chadha, Ritu, 1964-<br/>Author Chadha, Ritu, 1964-, Kant, Lahta, 1962-<br/>Format: Books<br/>Call Number TK5105.77 C42 2008<br/>Publisher Wiley-Interscience,<br/>Publication Date 2008<br/>ISBN 9780470055373<br/>Access denied : the practice and policy of global Internet filteringent://SD_ILS/0/SD_ILS:3622982024-06-22T23:05:31Z2024-06-22T23:05:31Zby Deibert, Ronald J.<br/>Author Deibert, Ronald J.<br/>Format: Books<br/>Call Number QA76.9.A25 A22 2008<br/>Publisher MIT Press,<br/>Publication Date 2008<br/>ISBN 9780262541961<br/>Implementing NAP and NAC security technologies : the complete guide to network access controlent://SD_ILS/0/SD_ILS:2927122024-06-22T23:05:31Z2024-06-22T23:05:31Zby Hoffman, Daniel V.<br/>Author Hoffman, Daniel V.<br/>Format: Books<br/>Call Number TK5105.597 H64 2008<br/>Publisher Wiley,<br/>Publication Date 2008<br/>ISBN 9780470238387<br/>Role engineering for enterprise security managementent://SD_ILS/0/SD_ILS:2635972024-06-22T23:05:31Z2024-06-22T23:05:31Zby Coyne, Edward J.<br/>Author Coyne, Edward J.<br/>Format: Books<br/>Call Number T58.64 C69 2008<br/>Publisher Artech House,<br/>Publication Date 2008<br/>ISBN 9781596932180<br/>Smart cards, tokens, security and applicationsent://SD_ILS/0/SD_ILS:2716152024-06-22T23:05:31Z2024-06-22T23:05:31Zby Mayes, Keith E.<br/>Author Mayes, Keith E., Markantonakis, Konstantinos<br/>Format: Books<br/>Call Number TK7895.S62 S62 2008<br/>Publisher Springer-Verlag,<br/>Publication Date 2008<br/>ISBN 9780387721972<br/>Network security : private communications in a public worldent://SD_ILS/0/SD_ILS:3288602024-06-22T23:05:31Z2024-06-22T23:05:31Zby Kaufman, Charlie<br/>Author Kaufman, Charlie, Perlman, Radia, Speciner, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 K34 2008<br/>Edition 2nd ed.<br/>Publisher Prentice Hall of India,<br/>Publication Date 2008<br/>ISBN 9788120322134<br/>Oracle identity management : governance, risk, and compliance architectureent://SD_ILS/0/SD_ILS:3347672024-06-22T23:05:31Z2024-06-22T23:05:31Zby Pohlman, Marlin B.<br/>Author Pohlman, Marlin B.<br/>Format: Books<br/>Call Number QA76.9.A25 P63 2008<br/>Publisher Auerbach Publications,<br/>Publication Date 2008<br/>ISBN 9781420072471<br/>Role-based access controlent://SD_ILS/0/SD_ILS:2096172024-06-22T23:05:31Z2024-06-22T23:05:31Zby Ferraiolo, David F.<br/>Author Ferraiolo, David F., Kuhn, D. Richard, Chandramouli, Ramaswamy<br/>Format: Books<br/>Call Number QA76.9.A25 F47 2007<br/>Edition 2nd ed.<br/>Publisher Artech House,<br/>Publication Date 2007<br/>ISBN 9781596931138<br/>Advances in cryptology - CRYPTO 2007 : 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007 ; proceedingsent://SD_ILS/0/SD_ILS:2259252024-06-22T23:05:31Z2024-06-22T23:05:31Zby CRYPTO (Conference) (27th : 2007 : Santa Barbara, Calif.)<br/>Author CRYPTO (Conference) (27th : 2007 : Santa Barbara, Calif.), Menezes, A. J. (Alfred J.), 1965<br/>Format: Books<br/>Call Number QA76.9.A25 C795 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9783540741428<br/><a href="http://dx.doi.org/10.1007/978-3-540-74143-5">Fulltext</a><br/>Recent advances in intrusion detection : 10th International Symposium, RAID 2007, Gold Coast, Australia, September 5-7, 2007, proceedingsent://SD_ILS/0/SD_ILS:2259972024-06-22T23:05:31Z2024-06-22T23:05:31Zby RAID 2007 (2007 : Gold Coast, Qld.)<br/>Author RAID 2007 (2007 : Gold Coast, Qld.), Kruegel, Christopher, 1976-, Lippmann, Richard, Clark, Andrew, 1971-<br/>Format: Books<br/>Call Number QA76.9.A25 R344 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9783540743194<br/><a href="http://dx.doi.org/10.1007/978-3-540-74320-0">Fulltext</a><br/>Journal of computer securityent://SD_ILS/0/SD_ILS:1555682024-06-22T23:05:31Z2024-06-22T23:05:31ZFormat: Books<br/>Call Number QA76.9.A25 J68 2007<br/>Publisher IOS Press,<br/>Publication Date 2007<br/>ISSN 0926227X<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&db=a3h&jid=LCY&site=ehost-live">Online via EBSCOhost</a><br/>Accessible within UTM campus<br/>Complete guide to security and privacy metrics : measuring regulatory compliance, operational resilience, and ROIent://SD_ILS/0/SD_ILS:1566522024-06-22T23:05:31Z2024-06-22T23:05:31Zby Herrmann, Debra S.<br/>Author Herrmann, Debra S.<br/>Format: Books<br/>Call Number TK5102.85 H474 2007<br/>Publisher Auerbach Publications,<br/>Publication Date 2007<br/>ISBN 9780849354021<br/>IT security governance guidebook with security program metrics on CD-ROMent://SD_ILS/0/SD_ILS:1566612024-06-22T23:05:31Z2024-06-22T23:05:31Zby Cohen, Fred, 1956-<br/>Author Cohen, Fred, 1956-<br/>Format: Books<br/>Call Number TK5105.59 C63 2007<br/>Publisher Auerbach Publications,<br/>Publication Date 2007<br/>ISBN 9780849384356<br/>Integrated security systems design : concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:1610252024-06-22T23:05:31Z2024-06-22T23:05:31Zby Norman, Thomas<br/>Author Norman, Thomas<br/>Format: Books<br/>Call Number TK5105.59 N674 2007<br/>Publisher Elsevier Butterworth-Heinemann,<br/>Publication Date 2007<br/>ISBN 9780750679091<br/>Network security architecture design for Malaysian maritime enforcement agencyent://SD_ILS/0/SD_ILS:1553732024-06-22T23:05:31Z2024-06-22T23:05:31Zby Mahathir Abdul Hamid<br/>Author Mahathir Abdul Hamid, Shamsul Sahibuddin, supervisor<br/>Format: Books<br/>Call Number QA76.9.A25 M35 2007 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2007<br/>Cryptology unlockedent://SD_ILS/0/SD_ILS:2452842024-06-22T23:05:31Z2024-06-22T23:05:31Zby Wobst, Reinhard<br/>Author Wobst, Reinhard<br/>Format: Books<br/>Call Number QA76.9.A25 W62 2007<br/>Publisher John Wiley & Sons,<br/>Publication Date 2007<br/>ISBN 9780470060643<br/>Computer Security - ESORICS 2007 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007: Proceedingsent://SD_ILS/0/SD_ILS:6268292024-06-22T23:05:31Z2024-06-22T23:05:31Zby European Symposium on Research in Computer Security (12th : 2007 : Dresden, Germany)<br/>Author European Symposium on Research in Computer Security (12th : 2007 : Dresden, Germany), Biskup, Joachim, Lopez, Javier., SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001353<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540748359<br/><a href="http://dx.doi.org/10.1007/978-3-540-74835-9">http://dx.doi.org/10.1007/978-3-540-74835-9</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Information Security 10th International Conference, ISC 2007, Valparaiso, Chile, October 9-12, 2007: Proceedingsent://SD_ILS/0/SD_ILS:5167062024-06-22T23:05:31Z2024-06-22T23:05:31Zby ISC 2007 (2007 : Valparaiso, Chile)<br/>Author ISC 2007 (2007 : Valparaiso, Chile), Garay, Juan A., SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000183<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540754961<br/><a href="http://dx.doi.org/10.1007/978-3-540-75496-1">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Advances in Information and Computer Security Second International Workshop on Security, IWSEC 2007, Nara, Japan, October 29-31, 2007: Proceedingsent://SD_ILS/0/SD_ILS:5167122024-06-22T23:05:31Z2024-06-22T23:05:31Zby International Workshop on Security (2nd : 2007 : Nara-shi, Japan)<br/>Author International Workshop on Security (2nd : 2007 : Nara-shi, Japan), Miyaji, Atsuko, Kikuchi, Hiroaki, Rannenberg, Kai, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000582<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540756514<br/><a href="http://dx.doi.org/10.1007/978-3-540-75651-4">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Information security theory and practices :smart cards, mobile and ubiquitous computing systems ; First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5170262024-06-22T23:05:31Z2024-06-22T23:05:31Zby WISTP 2007 (2007 : Herakleion, Greece)<br/>Author WISTP 2007 (2007 : Herakleion, Greece), Sauveron, Damien, International Federation for Information Processing. Technical Committee 6, IFIP WG 8.8 (Smart Cards), SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000196<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540723547<br/><a href="http://dx.doi.org/10.1007/978-3-540-72354-7">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Provable security first international conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5170602024-06-22T23:05:31Z2024-06-22T23:05:31Zby ProvSec 2007 (2007 : Wollongong, N.S.W.)<br/>Author ProvSec 2007 (2007 : Wollongong, N.S.W.), Susilo, Willy, Liu, Joseph K., Mu, Yi, 1955-, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000343<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540756705<br/><a href="http://dx.doi.org/10.1007/978-3-540-75670-5">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Information systems security third international conference, ICISS 2007, Delhi, India, December 16-20, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5175602024-06-22T23:05:31Z2024-06-22T23:05:31Zby International Conference on Information Systems Security (3rd : 2007 : Delhi, India)<br/>Author International Conference on Information Systems Security (3rd : 2007 : Delhi, India), McDaniel, Patrick (Patrick Drew), Gupta, Shyam K., SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000198<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540770862 9783540770855<br/><a href="http://dx.doi.org/10.1007/978-3-540-77086-2">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Advances in Cryptology - EUROCRYPT 2007 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007. Proceedingsent://SD_ILS/0/SD_ILS:5178812024-06-22T23:05:31Z2024-06-22T23:05:31Zby EUROCRYPT (2007 : Barcelona, Spain)<br/>Author EUROCRYPT (2007 : Barcelona, Spain), Naor, Moni, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000525<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540725404 9783540725398<br/><a href="http://dx.doi.org/10.1007/978-3-540-72540-4">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>IT security governance guidebook with security program metrics on CD-ROMent://SD_ILS/0/SD_ILS:5702202024-06-22T23:05:31Z2024-06-22T23:05:31Zby Cohen, Fred, 1956-<br/>Author Cohen, Fred, 1956-<br/>Format: Computer file<br/>Call Number CP 8941<br/>Publisher Auerbach Publications,<br/>Publication Date 2007<br/>ISBN 9780849384356<br/>Snort : IDS and IPS toolkitent://SD_ILS/0/SD_ILS:5780422024-06-22T23:05:31Z2024-06-22T23:05:31Zby Beale, Jay<br/>Author Beale, Jay, Baker, Andrew R., Esler, Joel<br/>Format: Computer file<br/>Call Number CP 7232<br/>Publisher Syngress Publishing,<br/>Publication Date 2007<br/>ISBN 9781597490993<br/>Network security architecture design for Malaysian maritime enforcement agencyent://SD_ILS/0/SD_ILS:5680862024-06-22T23:05:31Z2024-06-22T23:05:31Zby Mahathir Abdul Hamid<br/>Author Mahathir Abdul Hamid, Shamsul Sahibuddin, supervisor<br/>Format: Computer file<br/>Call Number CP 015120<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2007<br/>Restricted<br/>Cisco Network Admission Controlent://SD_ILS/0/SD_ILS:6235052024-06-22T23:05:31Z2024-06-22T23:05:31Zby Helfrich, Denise<br/>Author Helfrich, Denise<br/>Format: Books<br/>Call Number QA76.9.A25 C574 2007 v.1<br/>Publisher Cisco,<br/>Publication Date 2007<br/>ISBN 9781587052415<br/>Detection of Intrusions and Malware, and Vulnerability Assessment 4th International Conference, DIMVA 2007 Lucerne, Switzerland, July 12-13, 2007 Proceedingsent://SD_ILS/0/SD_ILS:6257822024-06-22T23:05:31Z2024-06-22T23:05:31Zby DIMVA 2007 (2007 : Lucerne, Switzerland)<br/>Author DIMVA 2007 (2007 : Lucerne, Switzerland), Hammerli, Bernhard M., Sommer, Robin, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001292<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540736141<br/><a href="http://dx.doi.org/10.1007/978-3-540-73614-1">http://dx.doi.org/10.1007/978-3-540-73614-1</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Fast Software Encryption 14th International Workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papersent://SD_ILS/0/SD_ILS:6263782024-06-22T23:05:31Z2024-06-22T23:05:31Zby FSE 2007 (2007 : Luxembourg, Luxembourg)<br/>Author FSE 2007 (2007 : Luxembourg, Luxembourg), Biryukov, Alex, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 001333<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540746195<br/><a href="http://dx.doi.org/10.1007/978-3-540-74619-5">http://dx.doi.org/10.1007/978-3-540-74619-5</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Mechanics of user identification and authentication : fundamentals of identity managementent://SD_ILS/0/SD_ILS:2480742024-06-22T23:05:31Z2024-06-22T23:05:31Zby Todorov, Dobromir<br/>Author Todorov, Dobromir<br/>Format: Books<br/>Call Number TK5105.59 T62 2007<br/>Publisher Auerbach Publications,<br/>Publication Date 2007<br/>ISBN 9781420052190<br/>Cryptography and security services : mechanisms and applicationsent://SD_ILS/0/SD_ILS:2853262024-06-22T23:05:31Z2024-06-22T23:05:31Zby Mogollon, Manuel<br/>Author Mogollon, Manuel<br/>Format: Books<br/>Call Number QA76.9.A25 M634 2007<br/>Publisher CyberTech Publishing,<br/>Publication Date 2007<br/>ISBN 9781599048376<br/>Professional rootkitsent://SD_ILS/0/SD_ILS:2723272024-06-22T23:05:31Z2024-06-22T23:05:31Zby Vieler, Ric<br/>Author Vieler, Ric<br/>Format: Books<br/>Call Number QA76.9.A25 V56 2007<br/>Publisher Wiley Publishing,<br/>Publication Date 2007 2004<br/>ISBN 9780470101544<br/>Computer system security : basic concepts and solved exercisesent://SD_ILS/0/SD_ILS:3283722024-06-22T23:05:31Z2024-06-22T23:05:31Zby Avoine, Gildas<br/>Author Avoine, Gildas, Junod, Pascal, Oechslin, Philippe<br/>Format: Books<br/>Call Number QA76.9.A25 A96 2004<br/>Publisher EFPL Press,<br/>Publication Date 2007<br/>ISBN 9781420046205<br/>Linux firewalls : attack detection and response with iptables, psad, and fwsnortent://SD_ILS/0/SD_ILS:3330412024-06-22T23:05:31Z2024-06-22T23:05:31Zby Rash, Michael<br/>Author Rash, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 R36 2007<br/>Publisher No Starch Press,<br/>Publication Date 2007<br/>ISBN 9781593271411<br/>Critical information infrastructures : resilience and protectionent://SD_ILS/0/SD_ILS:2544812024-06-22T23:05:31Z2024-06-22T23:05:31Zby Hyslop, Maitland<br/>Author Hyslop, Maitland<br/>Format: Books<br/>Call Number QA76.9.A25 H97 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9780387718613<br/><a href="http://dx.doi.org/10.1007/978-0-387-71862-0">Fulltext</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Privacy-respecting intrusion detectionent://SD_ILS/0/SD_ILS:2716382024-06-22T23:05:31Z2024-06-22T23:05:31Zby Flegel, Ulrich<br/>Author Flegel, Ulrich<br/>Format: Books<br/>Call Number QA76.9.A25 F53 2007<br/>Publisher Springer-Verlag,<br/>Publication Date 2007<br/>ISBN 9780387343464<br/>Information security theory and practices :smart cards, mobile and ubiquitous computing systems ; First IFIP TC6/W G 8.8/ WG 11.2 International Workshop, WISTP 2007, Heraklion, Crete, Greece, May 9-11, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5173942024-06-22T23:05:31Z2024-06-22T23:05:31Zby WISTP 2007 (2007 : Herakleion, Greece)<br/>Author WISTP 2007 (2007 : Herakleion, Greece), Sauveron, Damien, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000197<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540723547<br/><a href="http://dx.doi.org/10.1007/978-3-540-72354-7">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Advances in computer science--ASIAN 2007 computer and network security : 12th Asian Computing Science Conference, Doha, Qatar, December 9-11, 2007 : proceedingsent://SD_ILS/0/SD_ILS:5175492024-06-22T23:05:31Z2024-06-22T23:05:31Zby Asian Computing Science Conference (12th : 2007 : Daw?{rcub}hah, Qatar)<br/>Author Asian Computing Science Conference (12th : 2007 : Daw?{rcub}hah, Qatar), Cervesato, Iliano, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000522<br/>Publisher Springer-Verlag Berlin Heidelberg,<br/>Publication Date 2007<br/>ISBN 9783540769293 9783540769279<br/><a href="http://dx.doi.org/10.1007/978-3-540-76929-3">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Information systems security : second international conference, ICISS 2006, Kolkata, India, December 19-21, 2006 : proceedingsent://SD_ILS/0/SD_ILS:1709042024-06-22T23:05:31Z2024-06-22T23:05:31Zby International Conference on Information Systems Security (2nd : 2006 : Calcutta, India)<br/>Author International Conference on Information Systems Security (2nd : 2006 : Calcutta, India), Bagchi, Aditya, Atluri, Vijayalaksmi<br/>Format: Books<br/>Call Number QA76.9.A25 I576 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9783540689621<br/>Enhancement of snort intrusion detection systement://SD_ILS/0/SD_ILS:1118882024-06-22T23:05:31Z2024-06-22T23:05:31Zby Rabia Bakhteri Jahangir Bakhteri<br/>Author Rabia Bakhteri Jahangir Bakhteri<br/>Format: Books<br/>Call Number TK5105.59 R32 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Project Paper (Sarjana Muda Kejuruteraan (Komputer)) - Universiti Teknologi Malaysia, 2006<br/>Cryptography and its applicationent://SD_ILS/0/SD_ILS:102992024-06-22T23:05:31Z2024-06-22T23:05:31Zby Chong, Sook Leng<br/>Author Chong, Sook Leng<br/>Format: Visual Materials<br/>Call Number MFL 13793<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Project Paper (Sarjana Muda Sains (Mathematik)) - Universiti Teknologi Malaysia, 2006<br/>Multivariate public key cryptosystemsent://SD_ILS/0/SD_ILS:1581642024-06-22T23:05:31Z2024-06-22T23:05:31Zby Ding, Jintai<br/>Author Ding, Jintai, Gower, Jason E., Schmidt, Dieter S.<br/>Format: Books<br/>Call Number QA76.9.A25 D56 2006<br/>Publisher Springer-Verlag,<br/>Publication Date 2006<br/>ISBN 9780387322292<br/>Networked embedded sensing and control : Workshop NESC'05 : University of Notre Dame, USA, October 2005 proceedingsent://SD_ILS/0/SD_ILS:1581702024-06-22T23:05:31Z2024-06-22T23:05:31Zby Workshop on Networked Embedded Sensing and Control (2005 : University of Notre Dame)<br/>Author Workshop on Networked Embedded Sensing and Control (2005 : University of Notre Dame), Antsaklis, Panos J., Tabuada, Paulo<br/>Format: Books<br/>Call Number TK7872.D48 W67 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9783540327943<br/>Security and privacy in dynamic environments : proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22-24 May 2006, Karlstad, Swedenent://SD_ILS/0/SD_ILS:1582062024-06-22T23:05:31Z2024-06-22T23:05:31Zby IFIP TC11 International Information Security Conference (21st : 2006 : Karlstad, Sweden)<br/>Author IFIP TC11 International Information Security Conference (21st : 2006 : Karlstad, Sweden), Fischer-Hubner, Simone<br/>Format: Books<br/>Call Number QA76.9.A25 S429 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9780387334059<br/>Access control systems : security, identity management and trust modelsent://SD_ILS/0/SD_ILS:1769002024-06-22T23:05:31Z2024-06-22T23:05:31Zby Benantar, Messaoud<br/>Author Benantar, Messaoud<br/>Format: Books<br/>Call Number TK5109.59 B46 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9780387004457<br/>Advances in information and computer security : first International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006 : proceedingsent://SD_ILS/0/SD_ILS:1422202024-06-22T23:05:31Z2024-06-22T23:05:31Zby International Workshop on Security (1st : 2006 : Kyoto, Japan)<br/>Author International Workshop on Security (1st : 2006 : Kyoto, Japan), Yoshiura, Hiroshi<br/>Format: Books<br/>Call Number QA76.9.A25 I575 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9783540476993<br/>Development of an online signature verification software using support vector machinesent://SD_ILS/0/SD_ILS:1209462024-06-22T23:05:31Z2024-06-22T23:05:31Zby Leong, Hui Yee<br/>Author Leong, Hui Yee<br/>Format: Books<br/>Call Number QA76.9.A25 L46 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Mekatronik)) - Universiti Teknologi Malaysia, 2006<br/>Developing information security policy : case study of Biruni Remote Sensing Center (BRSC)ent://SD_ILS/0/SD_ILS:1316702024-06-22T23:05:31Z2024-06-22T23:05:31Zby Mohamed. K. Bayoud<br/>Author Mohamed. K. Bayoud<br/>Format: Books<br/>Call Number QA76.9.A25 M525 2006 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Thesis (Sarjana Sains Komputer - Keselamatan Maklumat)) - Fakulti Sains Komputer dan Sistem Maklumat, Universiti Teknologi Malaysia, 2006<br/>An XML-based model for integrating and managing label-based access control of heterogeneous legacy databasesent://SD_ILS/0/SD_ILS:6172062024-06-22T23:05:31Z2024-06-22T23:05:31Zby Awad Mohed Awadelkarim<br/>Author Awad Mohed Awadelkarim<br/>Format: Computer file<br/>Call Number CP 4586<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Tesis (Doctor of Philosophy) - Universiti Teknologi Malaysia, 2006<br/>Cryptography and its applicationent://SD_ILS/0/SD_ILS:6189992024-06-22T23:05:31Z2024-06-22T23:05:31Zby Chong, Sook Leng<br/>Author Chong, Sook Leng<br/>Format: Computer file<br/>Call Number CP 4596<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Project Paper (Sarjana Muda Sains (Matematik)) - Universiti Teknologi Malaysia, 2006<br/>An XML-based model for integrating and managing label-based access control of heterogeneous legacy databasesent://SD_ILS/0/SD_ILS:7848312024-06-22T23:05:31Z2024-06-22T23:05:31Zby Awad Mohed Awadelkarim<br/>Author Awad Mohed Awadelkarim, Sekolah Pengajian Siswazah<br/>Format: Visual Materials<br/>Call Number MFL 14301 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Tesis (Doctor of Philosophy) - Universiti Teknologi Malaysia, 2006<br/>Biometrics : personal identification in networked societyent://SD_ILS/0/SD_ILS:4705312024-06-22T23:05:31Z2024-06-22T23:05:31ZFormat: Books<br/>Call Number TK7882.B56 B56 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9780387285399<br/>An XML-based model for integrating and managing label-based access control of heterogeneous legacy databasesent://SD_ILS/0/SD_ILS:4685992024-06-22T23:05:31Z2024-06-22T23:05:31Zby Awad Mohed Awadelkarim<br/>Author Awad Mohed Awadelkarim<br/>Format: Books<br/>Call Number QA76.9.A25 A82 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Thesis (Doctor of Philosophy) - Universiti Teknologi Malaysia, 2006<br/>Cryptography and its applicationent://SD_ILS/0/SD_ILS:4777142024-06-22T23:05:31Z2024-06-22T23:05:31Zby Chong, Sook Leng<br/>Author Chong, Sook Leng<br/>Format: Books<br/>Call Number Z103 C46 2006 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Project Paper (Sarjana Muda Sains (Mathematik)) - Universiti Teknologi Malaysia, 2006<br/>Rootkits : subverting the windows kernelent://SD_ILS/0/SD_ILS:2722712024-06-22T23:05:31Z2024-06-22T23:05:31Zby Hoglund, Greg<br/>Author Hoglund, Greg, Butler, James<br/>Format: Books<br/>Call Number QA76.9.A25 H64 2006<br/>Publisher Addison Wesley,<br/>Publication Date 2006<br/>ISBN 9780321294319<br/>Linux firewallsent://SD_ILS/0/SD_ILS:1429062024-06-22T23:05:31Z2024-06-22T23:05:31Zby Suehring, Steve<br/>Author Suehring, Steve, Ziegler, Robert L. (Robert Loren), 1954-<br/>Format: Books<br/>Call Number QA76.9.A25 Z54 2006<br/>Edition 3rd ed.<br/>Publisher Novell Pr.,<br/>Publication Date 2006 2005<br/>ISBN 9780672327711<br/>Advances in biometrics : international conference, ICB 2006, Hong Kong, China, January 5-7, 2006 : proceedingsent://SD_ILS/0/SD_ILS:1009282024-06-22T23:05:31Z2024-06-22T23:05:31Zby ICB 2006 ( 2006 : Hong Kong, China)<br/>Author ICB 2006 ( 2006 : Hong Kong, China), Zhang, David, 1949-, Jain, Anil K., 1948-<br/>Format: Books<br/>Call Number TK7882.B56 I24 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9783540311119<br/>Advanced host intrusion prevention with CSAent://SD_ILS/0/SD_ILS:1018402024-06-22T23:05:31Z2024-06-22T23:05:31Zby Sullivan, Chad<br/>Author Sullivan, Chad, Mauvais, Paul, Asher, Jeff<br/>Format: Books<br/>Call Number TK5105.59 S94 2006<br/>Publisher Cisco Press,<br/>Publication Date 2006<br/>ISBN 9781587052521<br/>Intrusion prevention fundamentalsent://SD_ILS/0/SD_ILS:1018502024-06-22T23:05:31Z2024-06-22T23:05:31Zby Carter, Earl<br/>Author Carter, Earl, Hogue, Jonathan<br/>Format: Books<br/>Call Number TK5105.59 C377 2006<br/>Publisher Cisco Press,<br/>Publication Date 2006<br/>ISBN 9781587052392<br/>Global monitoring : the challenges of access to dataent://SD_ILS/0/SD_ILS:1546572024-06-22T23:05:31Z2024-06-22T23:05:31Zby Harris, Ray<br/>Author Harris, Ray, Browning, Richard<br/>Format: Books<br/>Call Number TD193 H37 2005<br/>Publisher UCL Press,<br/>Publication Date 2005<br/>ISBN 9781844720248<br/>Cisco security agentent://SD_ILS/0/SD_ILS:4442292024-06-22T23:05:31Z2024-06-22T23:05:31Zby Sullivan, Chad<br/>Author Sullivan, Chad<br/>Format: Books<br/>Call Number TK5105.59 S84 2005<br/>Publisher Cisco Press,<br/>Publication Date 2005<br/>ISBN 9781587052057<br/>User's guide to cryptography and standardsent://SD_ILS/0/SD_ILS:4180342024-06-22T23:05:31Z2024-06-22T23:05:31Zby Dent, Alexander W.<br/>Author Dent, Alexander W., Mitchell, Chris J.<br/>Format: Books<br/>Call Number QA76.9.A25 D464 2005<br/>Publisher Artech House,<br/>Publication Date 2005<br/>ISBN 9781580535304<br/>Information systems security : first international conference, ICISS 2005, Kolkata, India, December 19-21, 2005 : proceedingsent://SD_ILS/0/SD_ILS:1433402024-06-22T23:05:31Z2024-06-22T23:05:31Zby International Conference on Information Systems Security( 1st : 2005 : Calcutta, India)<br/>Author International Conference on Information Systems Security( 1st : 2005 : Calcutta, India), Jajodia, Sushil, Mazumdar, Chandan<br/>Format: Books<br/>Call Number QA76.9.A25 I576 2005<br/>Publisher Springer,<br/>Publication Date 2005<br/>ISBN 9783540307068<br/>Online certificate injection systement://SD_ILS/0/SD_ILS:8407492024-06-22T23:05:31Z2024-06-22T23:05:31Zby Mohd. Nor Haizam Samsun Baharun, author<br/>Author Mohd. Nor Haizam Samsun Baharun, author, Othman Yusop, supervisor, Soo, Lester Ngai Kwong, supervisor, Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number TK5105.59 M644 2005 raf<br/>Publication Date 2005<br/>Thesis (Sarjana Sains (Sains Komputer - Real Time Software Engineering)) - Universiti Teknologi Malaysia, 2005<br/>Online certificate injection systement://SD_ILS/0/SD_ILS:8407502024-06-22T23:05:31Z2024-06-22T23:05:31Zby Mohd. Nor Haizam Samsun Baharun, author<br/>Author Mohd. Nor Haizam Samsun Baharun, author<br/>Format: Books<br/>Call Number CP 033963 ra<br/>Publication Date 2005<br/>Thesis (Sarjana Sains (Sains Komputer - Real Time Software Engineering)) - Universiti Teknologi Malaysia, 2005<br/>Building Cisco remote access networks (BCRAN) : CCNP self-studyent://SD_ILS/0/SD_ILS:977162024-06-22T23:05:31Z2024-06-22T23:05:31Zby Paquet, Catherine. Building Cisco remote access networks<br/>Author Paquet, Catherine. Building Cisco remote access networks, Cisco Systems, Inc.<br/>Format: Books<br/>Call Number TK5105.597 B84 2004<br/>Edition 2nd ed.<br/>Publisher Cisco Press,<br/>Publication Date 2004<br/>ISBN 9781587051487<br/>Modern cryptography : theory and practiceent://SD_ILS/0/SD_ILS:1563142024-06-22T23:05:31Z2024-06-22T23:05:31Zby Mao, Wenbo<br/>Author Mao, Wenbo<br/>Format: Books<br/>Call Number QA76.9.A25 M36 2004<br/>Publisher Prentice Hall,<br/>Publication Date 2004<br/>ISBN 9780130669438<br/>Snort for dummiesent://SD_ILS/0/SD_ILS:6057412024-06-22T23:05:31Z2024-06-22T23:05:31Zby Scott, Charline<br/>Author Scott, Charline, Wolfe, Paul, Hayes, Bert<br/>Format: Computer file<br/>Call Number CP 5376<br/>Publisher Wiley,<br/>Publication Date 2004<br/>ISBN 9780764568350<br/>The hackers handbook : the strategy behind breaking into and defending networksent://SD_ILS/0/SD_ILS:4271032024-06-22T23:05:31Z2024-06-22T23:05:31Zby Young, Susan (Susan Elizabeth), 1968-<br/>Author Young, Susan (Susan Elizabeth), 1968-, Aitel, Dave<br/>Format: Books<br/>Call Number TK5105.59 Y68 2004<br/>Publisher Auerbach Pub.,<br/>Publication Date 2004<br/>ISBN 9780849308888<br/>Outsourcing information securityent://SD_ILS/0/SD_ILS:4253622024-06-22T23:05:31Z2024-06-22T23:05:31Zby Axelrod, C. Warren<br/>Author Axelrod, C. Warren<br/>Format: Books<br/>Call Number QA76.9.A25 A93 2004<br/>Publisher Artech House,<br/>Publication Date 2004<br/>ISBN 9781580535311<br/>Snort for dummiesent://SD_ILS/0/SD_ILS:3946162024-06-22T23:05:31Z2024-06-22T23:05:31Zby Scott, Charline<br/>Author Scott, Charline, Wolfe, Paul, Hayes, Bert<br/>Format: Books<br/>Call Number TK5105.59 S36 2004<br/>Publisher Wiley,<br/>Publication Date 2004<br/>ISBN 9780764568350<br/>Detecting outlier on intrusion detection system using data set of system callsent://SD_ILS/0/SD_ILS:3965472024-06-22T23:05:31Z2024-06-22T23:05:31Zby Dahliyusmanto Dahlan<br/>Author Dahliyusmanto Dahlan, Abdul Hanan Abdullah, International Conference on Information and Computer Science (2004 : Dhahran, Saudi Arabia)<br/>Format: Books<br/>Call Number QA76.9.A25 D335 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Public key crypto hardware for real-time security applicationent://SD_ILS/0/SD_ILS:4001652024-06-22T23:05:31Z2024-06-22T23:05:31Zby Mohamed Khalil Mohd. Hani<br/>Author Mohamed Khalil Mohd. Hani, Hau, Yuan Wen, 1980-, Lim, Kie Woon, National Real-Time Technology and Applications Symposium (2nd : 2004 Serdang, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 M54 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Cisco access control security : AAA administrative servicesent://SD_ILS/0/SD_ILS:977302024-06-22T23:05:31Z2024-06-22T23:05:31Zby Carroll, Brandon<br/>Author Carroll, Brandon<br/>Format: Books<br/>Call Number QA76.3 C374 2004<br/>Publisher Cisco Press,<br/>Publication Date 2004<br/>ISBN 9781587051241<br/>Counting the number of system calls to detect intrusion using discriminant analysisent://SD_ILS/0/SD_ILS:3866162024-06-22T23:05:31Z2024-06-22T23:05:31Zby Dahliyusmanto Dahlan<br/>Author Dahliyusmanto Dahlan, Abdul Hanan Abdullah, Seminar Quality in Research (2003 : Indonesia)<br/>Format: Books<br/>Call Number QA76.9.A25 D334 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>A handbook on ICT Set-up and securityent://SD_ILS/0/SD_ILS:3522082024-06-22T23:05:31Z2024-06-22T23:05:31Zby Hatta Mohd. Yusoff<br/>Author Hatta Mohd. Yusoff<br/>Format: Books<br/>Call Number QA76.9 H374 2003<br/>Publisher Utusan Pubs. & Distri.,<br/>Publication Date 2003<br/>ISBN 9789676114877<br/>NIRS : Network intrusion detection and active-response system : group reportent://SD_ILS/0/SD_ILS:3527642024-06-22T23:05:31Z2024-06-22T23:05:31Zby Adedayo Adetoye<br/>Author Adedayo Adetoye, Andy Choi, Marina Md. Arshad, Olufemi Soretire<br/>Format: Books<br/>Call Number TK5105.59 N475 2003<br/>Publisher University College London,<br/>Publication Date 2003<br/>Thesis (Sarjana Sains (Sains Komputer) - University College London, 2003<br/>A methodology to detect intrusion using system call base on discriminant analysisent://SD_ILS/0/SD_ILS:3534312024-06-22T23:05:31Z2024-06-22T23:05:31Zby Dahliyusmanto Dahlan<br/>Author Dahliyusmanto Dahlan, Abdul Hanan Abdullah, International Symposium on Information Technology (2003 : Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.9.A25 D33 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Research directions in data and applications security : IFIP TC11/WG11.3 sixteenth annual conference on data and applications security, July 28-31, 2002, Cambridge, UKent://SD_ILS/0/SD_ILS:3635412024-06-22T23:05:31Z2024-06-22T23:05:31Zby IFIP TC11/WG11.3 Working Conference on Database and Application Security (16th : 2002 : King's College, University of Cambridge)<br/>Author IFIP TC11/WG11.3 Working Conference on Database and Application Security (16th : 2002 : King's College, University of Cambridge), Gudes, Ehud, Shenoi, Sujeet<br/>Format: Books<br/>Call Number QA76.9.D314 I34 2003<br/>Publisher Kluwer Academic Publishers,<br/>Publication Date 2003<br/>ISBN 9781402075414<br/>Role-based access controlent://SD_ILS/0/SD_ILS:3401532024-06-22T23:05:31Z2024-06-22T23:05:31Zby Ferraiolo, David F.<br/>Author Ferraiolo, David F., Kuhn, D. Richard, Chandramouli, Ramaswamy<br/>Format: Books<br/>Call Number QA76.9.A25 F47 2003<br/>Publisher Artech House,<br/>Publication Date 2003<br/>ISBN 9781580533706<br/>Biometricsent://SD_ILS/0/SD_ILS:3444782024-06-22T23:05:31Z2024-06-22T23:05:31Zby Woodward, John D.<br/>Author Woodward, John D., Orlans, Nicholas M., Higgins, Peter T<br/>Format: Books<br/>Call Number TK7882.B56 W66 2003<br/>Publisher McGraw-Hill,<br/>Publication Date 2003<br/>ISBN 9780072222272<br/>Red hat linux firewallsent://SD_ILS/0/SD_ILS:3273022024-06-22T23:05:31Z2024-06-22T23:05:31Zby McCarty, Bill<br/>Author McCarty, Bill<br/>Format: Books<br/>Call Number QA76.9.A25 M42 2003<br/>Publisher Wiley Pubs,<br/>Publication Date 2003<br/>ISBN 9780764524639<br/>Linux firewallsent://SD_ILS/0/SD_ILS:3824282024-06-22T23:05:31Z2024-06-22T23:05:31Zby Ziegler, Robert<br/>Author Ziegler, Robert, Constantine, Carl B.<br/>Format: Books<br/>Call Number QA76.9.A25 Z54 2002<br/>Edition 2nd ed.<br/>Publisher New Riders,<br/>Publication Date 2002<br/>ISBN 9780735710993<br/>Hack I.T. : security through penetration testingent://SD_ILS/0/SD_ILS:6044092024-06-22T23:05:31Z2024-06-22T23:05:31Zby Klevinsky, T. J.<br/>Author Klevinsky, T. J., Laliberte, Scott, Gupta, Ajay<br/>Format: Computer file<br/>Call Number CP 4319<br/>Publisher Addison-Wesley,<br/>Publication Date 2002<br/>ISBN 9780201719567<br/>Hack I.T. : security through penetration testingent://SD_ILS/0/SD_ILS:3941892024-06-22T23:05:31Z2024-06-22T23:05:31Zby Klevinsky, T. J.<br/>Author Klevinsky, T. J., Laliberte, Scott, Gupta, Ajay<br/>Format: Books<br/>Call Number QA76.9.A25 K534 2002<br/>Publisher Addison-Wesley,<br/>Publication Date 2002<br/>ISBN 9780201719567<br/>Network security : private communication in a public worldent://SD_ILS/0/SD_ILS:3913992024-06-22T23:05:31Z2024-06-22T23:05:31Zby Kaufman, Charlie<br/>Author Kaufman, Charlie, Perlman, Radia, Speciner, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 K34 2002<br/>Edition 2nd ed.<br/>Publisher Prentice Hall PTR,<br/>Publication Date 2002<br/>ISBN 9780130460196<br/>Advances in cryptology-EUROCRYT 2002 : international conference on the theory and applications of cryptographic techniques, Amsterdam, The Netherlands, April 28-May 2, 2002 : proceedingsent://SD_ILS/0/SD_ILS:3964772024-06-22T23:05:31Z2024-06-22T23:05:31Zby EUROCRYPT (2002 : Amsterdam, Netherlands)<br/>Author EUROCRYPT (2002 : Amsterdam, Netherlands), Knudsen, Lars<br/>Format: Books<br/>Call Number QA76.9.A25 E87 2002<br/>Publisher Springer-Verlag,<br/>Publication Date 2002<br/>ISBN 9783540435532<br/>Database encrytion schemes : a comparative studyent://SD_ILS/0/SD_ILS:3515112024-06-22T23:05:31Z2024-06-22T23:05:31Zby Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author Zailani Mohamed Sidek, Assoc.Prof.Dr., Norbik Bashah Idris, Harihodin Selamat, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.9.A25 Z34 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Auditors' introduction to crytography and its application in database securityent://SD_ILS/0/SD_ILS:3458482024-06-22T23:05:31Z2024-06-22T23:05:31Zby Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author Zailani Mohamed Sidek, Assoc.Prof.Dr., Norbik Bashah Idris, Harihodin Selamat, International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format: Books<br/>Call Number QA76.9.D314 Z34 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>A novel key recovery scheme implemented in public key infrastructureent://SD_ILS/0/SD_ILS:3162052024-06-22T23:05:31Z2024-06-22T23:05:31Zby Teoh, Su Chi<br/>Author Teoh, Su Chi, Norbik Bashah Idris, World Engineering Congress (2nd : 2002 : Sarawak, Malaysia)<br/>Format: Books<br/>Call Number QA76.9.A25 T48 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Detection & prevention of DoS attacks using intrusion detection system : design & developmentent://SD_ILS/0/SD_ILS:3224812024-06-22T23:05:31Z2024-06-22T23:05:31Zby Pathmenanthan Ramakrishna<br/>Author Pathmenanthan Ramakrishna, Mohd. Aizaini Maarof, Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format: Books<br/>Call Number TK5105.59 P376 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>DoS attacks detection using intrusion detection system and system callsent://SD_ILS/0/SD_ILS:3214622024-06-22T23:05:31Z2024-06-22T23:05:31Zby Mohd. Aizaini Maarof<br/>Author Mohd. Aizaini Maarof, Pathmenanthan Ramakrishna, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number TK5105.59 M346 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Internet and intranet securityent://SD_ILS/0/SD_ILS:3032032024-06-22T23:05:31Z2024-06-22T23:05:31Zby Oppliger, Rolf<br/>Author Oppliger, Rolf<br/>Format: Books<br/>Call Number TK5105.875.I57 O67 2002<br/>Edition 2nd ed.<br/>Publisher Artech House,<br/>Publication Date 2002<br/>ISBN 9781580531665<br/>Intrusion signatures and analysisent://SD_ILS/0/SD_ILS:3920792024-06-22T23:05:31Z2024-06-22T23:05:31Zby Northcutt, Stephen<br/>Author Northcutt, Stephen<br/>Format: Books<br/>Call Number QA76.9.A25 I67 2001<br/>Publisher New Riders,<br/>Publication Date 2001<br/>ISBN 9780735710634<br/>Development, analysis and comparison of connectionist models for real time optimisationent://SD_ILS/0/SD_ILS:202492024-06-22T23:05:31Z2024-06-22T23:05:31Zby Khairiyah Mohd. Yusof, 1965-<br/>Author Khairiyah Mohd. Yusof, 1965-<br/>Format: Visual Materials<br/>Call Number MFL 11900<br/>Publisher University of Waterloo,<br/>Publication Date 2001<br/>Thesis (Doctor of Philosophy) - University of Waterloo, 2001<br/>Fixed wireless access (FWA) implementation benchmark in Malaysia ... [et al.]ent://SD_ILS/0/SD_ILS:136062024-06-22T23:05:31Z2024-06-22T23:05:31Zby Noraini Alias<br/>Author Noraini Alias, S. M. Zaheer Abbas Shamsi, Selvam Kanniah, Yap, Keem Siah<br/>Format: Visual Materials<br/>Call Number MFL 10484 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Thesis (Master of Engineering (Electrical)) - Universiti Teknologi Malaysia, 2000<br/>Military vehicle sound signature analysisent://SD_ILS/0/SD_ILS:210892024-06-22T23:05:31Z2024-06-22T23:05:31Zby Firuz Giry Naidu Ramanujaloo Naidu<br/>Author Firuz Giry Naidu Ramanujaloo Naidu<br/>Format: Visual Materials<br/>Call Number MFL 12124<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Project Paper (Bachelor of Computer Engineering) - Universiti Teknologi Malaysia /ATMA, 2000<br/>Recent advances in intrusion detection : third International Workshop, RAID 2000 Toulouse, France, October 2-4, 2000 : proceedingsent://SD_ILS/0/SD_ILS:1594592024-06-22T23:05:31Z2024-06-22T23:05:31Zby Debar, Herve, 1961-<br/>Author Debar, Herve, 1961-, Me, Ludovic, 1963-, Wu, S. Felix, 1963-<br/>Format: Books<br/>Call Number QA76.9.A25 R44 2000<br/>Publisher Springer-Verlag,<br/>Publication Date 2000<br/>ISBN 9783540410850<br/>Network security monitoring software on network systement://SD_ILS/0/SD_ILS:1475012024-06-22T23:05:31Z2024-06-22T23:05:31Zby Tan, Kok Kuan<br/>Author Tan, Kok Kuan<br/>Format: Books<br/>Call Number QA76.9.A25 T36 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2000<br/>Practical firewallsent://SD_ILS/0/SD_ILS:3848612024-06-22T23:05:31Z2024-06-22T23:05:31Zby Ogletree, Terry William<br/>Author Ogletree, Terry William<br/>Format: Books<br/>Call Number QA76.9.A25 O35 2000<br/>Publisher QUE,<br/>Publication Date 2000<br/>ISBN 9780789724168<br/>Windows based file encryption and decryption systement://SD_ILS/0/SD_ILS:1167252024-06-22T23:05:31Z2024-06-22T23:05:31Zby Ling, Hua Lay<br/>Author Ling, Hua Lay<br/>Format: Books<br/>Call Number QA76.9.A25 L56 1999 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologoi Malaysia, 1999<br/>Design and analysis of a dynamic access control schemeent://SD_ILS/0/SD_ILS:1391502024-06-22T23:05:31Z2024-06-22T23:05:31Zby Md. Rafiqul Islam<br/>Author Md. Rafiqul Islam<br/>Format: Books<br/>Call Number QA76.9.A25 M72 1999<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Thesis (PhD) - Universiti Teknologi Malaysia, 1999<br/>Active noise control system ... [et al.]ent://SD_ILS/0/SD_ILS:133072024-06-22T23:05:31Z2024-06-22T23:05:31Zby Lakshmi Venkatarama Subramaniam<br/>Author Lakshmi Venkatarama Subramaniam, Lee, Sen How, Ling, Hua Lay, Mat Nizam Ngathinee, Tan, Kok Kean<br/>Format: Visual Materials<br/>Call Number MFL 9763<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1999<br/>Computers and securityent://SD_ILS/0/SD_ILS:5404372024-06-22T23:05:31Z2024-06-22T23:05:31ZFormat: Continuing Resources<br/>Call Number QA76.4.C65<br/>Publisher North-Holland Pub,<br/>Publication Date 1999 1998 1997 1996 1995<br/>ISSN 01674048<br/><a href="http://www.sciencedirect.com/science/journal/01674048">Covers from Vol. 14, Issue 1, (1995) to present</a><br/>Accessible within UTM campus<br/>Fundamental steps for fixed-font character recognition in image processing ... [et al.]ent://SD_ILS/0/SD_ILS:130912024-06-22T23:05:31Z2024-06-22T23:05:31Zby Khor, Sock Choo<br/>Author Khor, Sock Choo, Mohamad Azlie Mohamad Yusof, Tan, Yee Fei, Teo, Lu Ling, Thoo, Wei Ping<br/>Format: Visual Materials<br/>Call Number MFL 9464<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1998<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1998<br/>Handbook of applied cryptographyent://SD_ILS/0/SD_ILS:4904332024-06-22T23:05:31Z2024-06-22T23:05:31Zby Menezes, Alfred J.<br/>Author Menezes, Alfred J., Van Oorschot, Paul C., Vanstone, Scott A.<br/>Format: Books<br/>Call Number QA76.9.A25 M46 1997<br/>Publisher CRC Press,<br/>Publication Date 1997<br/>ISBN 9780849385230<br/>Public-key crytographyent://SD_ILS/0/SD_ILS:1573092024-06-22T23:05:31Z2024-06-22T23:05:31Zby Salomaa, Arto<br/>Author Salomaa, Arto<br/>Format: Books<br/>Call Number QA76.9.A25 S26 1996<br/>Edition 2nd ed.<br/>Publisher Springer-Verlag,<br/>Publication Date 1996<br/>ISBN 9783540613565<br/>Penyusunan pengetahuan dan persembahan kaedah multimedia perubatan secara Islam; Cryptography workbench for windows; Sistem perancangan pengagihan barangan petroleum; Mengukur prestasi fakulti; Pakej penjana nombor rawak dan teknik pengurangan variansent://SD_ILS/0/SD_ILS:3525772024-06-22T23:05:31Z2024-06-22T23:05:31Zby Che Aziz Lahi<br/>Author Che Aziz Lahi, Hishamudi Bahari, Mohd. Azman Arshad, Nora Rosdin, Zainudin @ Ridzuan Mohamed<br/>Format: Books<br/>Call Number MFL 8207 ra<br/>Publisher UTM,<br/>Publication Date 1993<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1993<br/>Kajian keselamatan fizikal instalasi komputer dipusat-pusat pengajian tinggi di Malaysiaent://SD_ILS/0/SD_ILS:2129122024-06-22T23:05:31Z2024-06-22T23:05:31Zby Maimunah Bee Bee Abdul Kadir<br/>Author Maimunah Bee Bee Abdul Kadir<br/>Format: Books<br/>Call Number QA76.9.A25 M34 1990 raf<br/>Publication Date 1990<br/>Kertas Projek (Sarjana Muda Sains Komputer) -- Universiti Teknologi Malaysia, 1990<br/>Database security, III : status and prospectsent://SD_ILS/0/SD_ILS:1694792024-06-22T23:05:31Z2024-06-22T23:05:31Zby IFIG WG 11.3 Workshop on Database Security (3rd : 1989 : Monterey, Calif.)<br/>Author IFIG WG 11.3 Workshop on Database Security (3rd : 1989 : Monterey, Calif.), Spooner, David L., Landwehr, Carl E.<br/>Format: Books<br/>Call Number QA76.9.D314 I45 1989<br/>Publisher North-Holland,<br/>Publication Date 1990<br/>ISBN 9780444887016<br/>Information technology - open systems interconnection - local area networks - medium access control (MAC) service definationent://SD_ILS/0/SD_ILS:4432152024-06-22T23:05:31Z2024-06-22T23:05:31Zby British Standards Institution<br/>Author British Standards Institution, International Organization for Standardization, International Electrotechnical Commission<br/>Format: Books<br/>Call Number PIA BS ISO/IEC 10039 : 1991<br/>Publication Date 1990<br/>Key management to achieve security for financial institutions engaged in financial transactions (wholesale)ent://SD_ILS/0/SD_ILS:4174492024-06-22T23:05:31Z2024-06-22T23:05:31Zby British Standards Institution<br/>Author British Standards Institution<br/>Format: Books<br/>Call Number PIA BS 7205 : 1990<br/>Publisher British Standards Institutions,<br/>Publication Date 1990<br/>Cryptology and computational number theoryent://SD_ILS/0/SD_ILS:2715352024-06-22T23:05:31Z2024-06-22T23:05:31Zby Pomerance, Carl<br/>Author Pomerance, Carl, Goldwasser, S.<br/>Format: Books<br/>Call Number QA76.9.A25 C79 1990<br/>Publisher American Mathematical Society,<br/>Publication Date 1990<br/>ISBN 9780821801550<br/>Security in computingent://SD_ILS/0/SD_ILS:2364252024-06-22T23:05:31Z2024-06-22T23:05:31Zby Peleeger, Charles P.<br/>Author Peleeger, Charles P.<br/>Format: Books<br/>Call Number QA76.9.A25 P44 1989<br/>Publisher Prentice-Hall,<br/>Publication Date 1989<br/>ISBN 9780137989430<br/>Security mechanisms for computer networksent://SD_ILS/0/SD_ILS:1916662024-06-22T23:05:31Z2024-06-22T23:05:31Zby Muftic, Sead<br/>Author Muftic, Sead<br/>Format: Books<br/>Call Number QA76.9.A25 S42 1989<br/>Publisher Ellis Horwood,<br/>Publication Date 1989<br/>ISBN 9780745806136<br/>Cryptography : an introduction to computer securityent://SD_ILS/0/SD_ILS:4423852024-06-22T23:05:31Z2024-06-22T23:05:31Zby Seberry, Jennifer<br/>Author Seberry, Jennifer, Pieprzyk, Josef<br/>Format: Books<br/>Call Number QA76.9.A25 S37 1989<br/>Publisher Prentice Hall,<br/>Publication Date 1989<br/>ISBN 9780724802746 9780131949867<br/>Security and protection in information systement://SD_ILS/0/SD_ILS:4546232024-06-22T23:05:31Z2024-06-22T23:05:31Zby IFIP TC 11 International Conference on Computer Security (4th : 1986 : Monte Carlo, Monaco)<br/>Author IFIP TC 11 International Conference on Computer Security (4th : 1986 : Monte Carlo, Monaco), Grissonnanche, Andre<br/>Format: Books<br/>Call Number QA76.9.A25 I34 1986<br/>Publisher North-Holland,<br/>Publication Date 1989<br/>ISBN 9780444873453<br/>Computer and communications security : strategies for the 1990sent://SD_ILS/0/SD_ILS:4546272024-06-22T23:05:31Z2024-06-22T23:05:31Zby Cooper, James Arlin<br/>Author Cooper, James Arlin<br/>Format: Books<br/>Call Number QA76.9.A25 C67 1989<br/>Publisher McGraw-Hill,<br/>Publication Date 1989<br/>ISBN 9780070129269<br/>Information security manualent://SD_ILS/0/SD_ILS:3316252024-06-22T23:05:31Z2024-06-22T23:05:31Zby United States. Administration and Resources Management<br/>Author United States. Administration and Resources Management, United States. Environmental Protection Agency<br/>Format: Books<br/>Call Number HF5548.2.I53 1989<br/>Publisher United States Environmental Protection Agency,<br/>Publication Date 1989<br/>Information security manual for personal computersent://SD_ILS/0/SD_ILS:3328292024-06-22T23:05:31Z2024-06-22T23:05:31Zby United States. Environmental Protection Agency<br/>Author United States. Environmental Protection Agency, United States. Administration and Resources Management<br/>Format: Books<br/>Call Number HF5548.2.I54 1989<br/>Publisher United States Environmental Protection Agency,<br/>Publication Date 1989<br/>Computer security in the age of informationent://SD_ILS/0/SD_ILS:2662192024-06-22T23:05:31Z2024-06-22T23:05:31Zby IFIP International Conference on Computer Security (5th : 1988 : Gold Coast, Queensland)<br/>Author IFIP International Conference on Computer Security (5th : 1988 : Gold Coast, Queensland), Caelli, William, International Federation for Information Processing<br/>Format: Books<br/>Call Number QA76.9.A25 I35 1988<br/>Publisher North-Holland,<br/>Publication Date 1989<br/>ISBN 9780444883247<br/>Auditing computer security : a manual with case studiesent://SD_ILS/0/SD_ILS:1048612024-06-22T23:05:31Z2024-06-22T23:05:31Zby Vallabhaneni, S. Rao<br/>Author Vallabhaneni, S. Rao<br/>Format: Books<br/>Call Number QA76.9.A25 V35 1989 f<br/>Publisher Wiley,<br/>Publication Date 1989<br/>ISBN 9780471626046<br/>Introduction to cryptologyent://SD_ILS/0/SD_ILS:1732122024-06-22T23:05:31Z2024-06-22T23:05:31Zby Beckett, Brian<br/>Author Beckett, Brian<br/>Format: Books<br/>Call Number QA76.9.A25 B42 1988<br/>Publisher Blackwell Scientific Pub.,<br/>Publication Date 1988<br/>ISBN 9780632022434<br/>Access control and personal identification systemsent://SD_ILS/0/SD_ILS:1842942024-06-22T23:05:31Z2024-06-22T23:05:31Zby Bowers, Dan M.<br/>Author Bowers, Dan M.<br/>Format: Books<br/>Call Number QA76.9.A25 B68 1988<br/>Publisher Butterworths,<br/>Publication Date 1988<br/>ISBN 9780409900835<br/>Building a secure computer systemsent://SD_ILS/0/SD_ILS:4598132024-06-22T23:05:31Z2024-06-22T23:05:31Zby Gasser, Morrie<br/>Author Gasser, Morrie<br/>Format: Books<br/>Call Number QA76.9.A25 G37 1988<br/>Publisher Van Nostrand Reinhold,<br/>Publication Date 1988<br/>ISBN 9780442230227<br/>Database security : status and prospectsent://SD_ILS/0/SD_ILS:2955532024-06-22T23:05:31Z2024-06-22T23:05:31Zby Landwehr, Carl E.<br/>Author Landwehr, Carl E.<br/>Format: Books<br/>Call Number QA76.9.D32 D37 1988<br/>Publisher North Holland,<br/>Publication Date 1988<br/>ISBN 9780444704795<br/>A Handbook of computer securityent://SD_ILS/0/SD_ILS:1715982024-06-22T23:05:31Z2024-06-22T23:05:31Zby Hearnden, Keith<br/>Author Hearnden, Keith<br/>Format: Books<br/>Call Number HF5548.2.H363 1987<br/>Publisher Kogan page,<br/>Publication Date 1987<br/>ISBN 9781850913481<br/>Computer securityent://SD_ILS/0/SD_ILS:1824672024-06-22T23:05:31Z2024-06-22T23:05:31Zby Carrol, John M.<br/>Author Carrol, John M.<br/>Format: Books<br/>Call Number HF5548.2.C27 1987<br/>Edition 2nd ed<br/>Publisher Butterworth Pub.,<br/>Publication Date 1987<br/>ISBN 9780409900323<br/>Data & computer security : dictionary of standards, concepts and termsent://SD_ILS/0/SD_ILS:1909472024-06-22T23:05:31Z2024-06-22T23:05:31Zby Longley, Dennis<br/>Author Longley, Dennis, Shain, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 L67 1987 rd<br/>Publisher Stockton Pr,<br/>Publication Date 1987<br/>ISBN 9780333429358<br/>Computers, business and security : the new role for securityent://SD_ILS/0/SD_ILS:4687072024-06-22T23:05:31Z2024-06-22T23:05:31Zby Schweitzer, James A.<br/>Author Schweitzer, James A.<br/>Format: Books<br/>Call Number QA76.9.A25 S23 1987<br/>Publisher Butterworths,<br/>Publication Date 1987<br/>ISBN 9780409900651<br/>Computer auditing, security and internal control manualent://SD_ILS/0/SD_ILS:4506502024-06-22T23:05:31Z2024-06-22T23:05:31Zby Kuong, Javier F.<br/>Author Kuong, Javier F.<br/>Format: Books<br/>Call Number QA76.9.A25 K86 1987<br/>Publisher Prentice-Hall,<br/>Publication Date 1987<br/>ISBN 9780131629677<br/>Foiling the systems breakers : computer security and access controlent://SD_ILS/0/SD_ILS:4603882024-06-22T23:05:31Z2024-06-22T23:05:31Zby Lobel, Jerome<br/>Author Lobel, Jerome<br/>Format: Books<br/>Call Number QA76.9.A25 L62 1986<br/>Publisher McGraw-Hill,<br/>Publication Date 1986<br/>ISBN 9780070383579<br/>Computer securityent://SD_ILS/0/SD_ILS:4032152024-06-22T23:05:31Z2024-06-22T23:05:31ZFormat: Books<br/>Call Number QA76.9.A25 C67 1986 f<br/>Publisher Time life Books,<br/>Publication Date 1986<br/>ISBN 9780809456703<br/>Computer-security technologyent://SD_ILS/0/SD_ILS:4665612024-06-22T23:05:31Z2024-06-22T23:05:31Zby Cooper, James Arlin<br/>Author Cooper, James Arlin<br/>Format: Books<br/>Call Number QA76.9.A25 C66 1984<br/>Publisher Lexington Books,<br/>Publication Date 1984<br/>ISBN 9780669064360<br/>Information systems securityent://SD_ILS/0/SD_ILS:2367372024-06-22T23:05:31Z2024-06-22T23:05:31Zby Fisher, Royal P., 1932-<br/>Author Fisher, Royal P., 1932-<br/>Format: Books<br/>Call Number HF5548.2.F57 1984<br/>Publisher Prentice-Hall,<br/>Publication Date 1984<br/>ISBN 9780134647272<br/>Computer security : a global challengeent://SD_ILS/0/SD_ILS:2960852024-06-22T23:05:31Z2024-06-22T23:05:31Zby IFIP International Conference on Computer Security, 2nd: 1984 : Toronto, Ontario, Canada)<br/>Author IFIP International Conference on Computer Security, 2nd: 1984 : Toronto, Ontario, Canada), Finch, James H., Dougall, E. Graham<br/>Format: Books<br/>Call Number QA76.9.A25 I35 1984<br/>Publisher North Holland,<br/>Publication Date 1984<br/>ISBN 9780444876188<br/>How to prevent computer crime : a guide for managersent://SD_ILS/0/SD_ILS:1705312024-06-22T23:05:31Z2024-06-22T23:05:31Zby Bequai, August<br/>Author Bequai, August<br/>Format: Books<br/>Call Number HF5548.2B44 1983<br/>Publisher Wiley<br/>Publication Date 1983<br/>ISBN 9780471093671<br/>Information intergrity : a structures for its defination and managementent://SD_ILS/0/SD_ILS:4570992024-06-22T23:05:31Z2024-06-22T23:05:31Zby Becker, Hal B.<br/>Author Becker, Hal B.<br/>Format: Books<br/>Call Number QA76.9.M3 B42 1983<br/>Publisher McGraw-Hill,<br/>Publication Date 1983<br/>ISBN 9780070041912<br/>Geodetic computation crime : a guide for managersent://SD_ILS/0/SD_ILS:2918732024-06-22T23:05:31Z2024-06-22T23:05:31Zby Bequai, August<br/>Author Bequai, August<br/>Format: Books<br/>Call Number HF5548.2 B44 1983<br/>Publisher John Wiley,<br/>Publication Date 1983<br/>ISBN 9780471093671<br/>Cryptography and data securityent://SD_ILS/0/SD_ILS:2960312024-06-22T23:05:31Z2024-06-22T23:05:31Zby Denning, Dorothy Elizabeth Robling<br/>Author Denning, Dorothy Elizabeth Robling<br/>Format: Books<br/>Call Number QA76.9.A25 D46 1982<br/>Publisher Addison-Wesley,<br/>Publication Date 1983 1982<br/>ISBN 9780201101508<br/>Database security and integrityent://SD_ILS/0/SD_ILS:4571612024-06-22T23:05:31Z2024-06-22T23:05:31Zby Fernandez, Eduardo B., 1936-<br/>Author Fernandez, Eduardo B., 1936-, Summers, Rita C., Wood, Christopher<br/>Format: Books<br/>Call Number QA76.9.D3 F47 1981<br/>Publisher Addison-Wesley,<br/>Publication Date 1981<br/>ISBN 9780201144673<br/>Computer fraud and counter measuresent://SD_ILS/0/SD_ILS:4628502024-06-22T23:05:31Z2024-06-22T23:05:31Zby Krauss, Leonard I.<br/>Author Krauss, Leonard I., Macgahan, Aileen<br/>Format: Books<br/>Call Number HV6773.K73 1979<br/>Publisher Prentice-Hall,<br/>Publication Date 1979<br/>ISBN 9780131647725<br/>Computer securityent://SD_ILS/0/SD_ILS:2960082024-06-22T23:05:31Z2024-06-22T23:05:31Zby Hsiao, David K.<br/>Author Hsiao, David K., Kerr, Douglas S., Madnick, Stuart E.<br/>Format: Books<br/>Call Number QA76.9.A25 H74 1979<br/>Publisher Academic,<br/>Publication Date 1979<br/>ISBN 9780123576507<br/>Foundations of secure computationent://SD_ILS/0/SD_ILS:4588992024-06-22T23:05:31Z2024-06-22T23:05:31Zby DeMillo, Richard A.<br/>Author DeMillo, Richard A.<br/>Format: Books<br/>Call Number QA76.9.A25 F68 1978<br/>Publisher Academic Press,<br/>Publication Date 1978<br/>ISBN 9780122103506<br/>Modern methods for computer security and privacyent://SD_ILS/0/SD_ILS:4637312024-06-22T23:05:31Z2024-06-22T23:05:31Zby Hoffman, Lance J.<br/>Author Hoffman, Lance J.<br/>Format: Books<br/>Call Number QA76.9.A25 H63 1977<br/>Publisher Prentice-Hall,<br/>Publication Date 1977<br/>ISBN 9780135952078<br/>System 360/370 : job control language and the access methodsent://SD_ILS/0/SD_ILS:3002012024-06-22T23:05:31Z2024-06-22T23:05:31Zby Hannula, Reino<br/>Author Hannula, Reino<br/>Format: Books<br/>Call Number QA76.8.I12 H28 1977<br/>Publisher Addison-Wesley Pub.,<br/>Publication Date 1977<br/>ISBN 9780201027556<br/>Data base and computer systems securityent://SD_ILS/0/SD_ILS:2985402024-06-22T23:05:31Z2024-06-22T23:05:31Zby Carroll, John Millar, 1950-<br/>Author Carroll, John Millar, 1950-<br/>Format: Books<br/>Call Number QA76.9. D3 D37 1976 f<br/>Publisher Q.E.D. Information Sciences,<br/>Publication Date 1976<br/>ISBN 9780894350023<br/>Access mechanisms and data structure support in data base management systemsent://SD_ILS/0/SD_ILS:2985752024-06-22T23:05:31Z2024-06-22T23:05:31Zby Curtice, Robert M.<br/>Author Curtice, Robert M.<br/>Format: Books<br/>Call Number QA76.9.D3 D37 1975 f<br/>Publisher Q.E.D. Information Sciences,<br/>Publication Date 1975<br/>SECURED ACCESS CONTROL MODEL FOR KNOWLEDGE MANAGEMENT SYSTEMent://SD_ILS/0/SD_ILS:8440852024-06-22T23:05:31Z2024-06-22T23:05:31Zby Azlina Ahmad, author<br/>Author Azlina Ahmad, author, Saiful Adli Ismail, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 A955 2014 raf<br/>Thesis Sarjana Sains (Jaminan Maklumat)<br/>SECURED ACCESS CONTROL MODEL FOR KNOWLEDGE MANAGEMENT SYSTEMent://SD_ILS/0/SD_ILS:8440862024-06-22T23:05:31Z2024-06-22T23:05:31Zby Azlina Ahmad, author<br/>Author Azlina Ahmad, author, Saiful Adli Ismail, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034515 ra<br/>Thesis Sarjana Sains (Jaminan Maklumat)<br/>AWARENESS OF THE SIGNIFICANT OF BIOMETRIC SYSTEMSent://SD_ILS/0/SD_ILS:8441392024-06-22T23:05:31Z2024-06-22T23:05:31Zby Fadzrina Ramli, 1983-, author<br/>Author Fadzrina Ramli, 1983-, author, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number TK7882.B56 F33 2014 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>AWARENESS OF THE SIGNIFICANT OF BIOMETRIC SYSTEMSent://SD_ILS/0/SD_ILS:8441422024-06-22T23:05:31Z2024-06-22T23:05:31Zby Fadzrina Ramli, 1983-, author<br/>Author Fadzrina Ramli, 1983-, author, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034513 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>APPLICATION OF K-MEANS IN REDUCING FALSE POSITIVE ALARMS IN INTRUSION PREVENTION SYSTEMSent://SD_ILS/0/SD_ILS:8361662024-06-22T23:05:31Z2024-06-22T23:05:31Zby Iman Biglari, 1982-, author<br/>Author Iman Biglari, 1982-, author, Bharanidharan Shanmugam, Dr., Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034123 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>WEB-BASED DIGITAL RIGHTS MANAGEMENT SYSTEM FOR THE MALAYSIAN CULTURE AND HERITAGE DIGITAL BANK PROJECTent://SD_ILS/0/SD_ILS:8375652024-06-22T23:05:31Z2024-06-22T23:05:31Zby Wan Mohd. Khairi Wan Mohamed, 1983-, author<br/>Author Wan Mohd. Khairi Wan Mohamed, 1983-, author, Rusni Daruis, Assoc.Prof., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 W366 2012 raf<br/>Thesis Sarjana Sains (Teknologi Maklumat - Pengurusan)<br/>WEB-BASED DIGITAL RIGHTS MANAGEMENT SYSTEM FOR THE MALAYSIAN CULTURE AND HERITAGE DIGITAL BANK PROJECTent://SD_ILS/0/SD_ILS:8375722024-06-22T23:05:31Z2024-06-22T23:05:31Zby Wan Mohd. Khairi Wan Mohamed, 1983-, author<br/>Author Wan Mohd. Khairi Wan Mohamed, 1983-, author, Rusni Daruis, Assoc.Prof., author, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034145 ra<br/>Thesis Sarjana Sains (Teknologi Maklumat - Pengurusan))<br/>A ONE-TIME PASSWORD METHOD FOR USER AUTHENTICATION IN CLOUD COMPUTINGent://SD_ILS/0/SD_ILS:8378532024-06-22T23:05:31Z2024-06-22T23:05:31Zby Ahmad Azarnik, 1982-, author<br/>Author Ahmad Azarnik, 1982-, author, Mazdak Zamani, Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A363 2013 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>A ONE-TIME PASSWORD METHOD FOR USER AUTHENTICATION IN CLOUD COMPUTINGent://SD_ILS/0/SD_ILS:8378542024-06-22T23:05:31Z2024-06-22T23:05:31Zby Ahmad Azarnik, 1982-, author<br/>Author Ahmad Azarnik, 1982-, author, Mazdak Zamani, Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034155 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>ENHANCE KEY GENERATOR OF DATA ENCRYPTION STANDARD (DES)ent://SD_ILS/0/SD_ILS:8378642024-06-22T23:05:31Z2024-06-22T23:05:31Zby Mahan Niknafskermani, 1982-, author<br/>Author Mahan Niknafskermani, 1982-, author, Norbik Bashah Idris, Dato’ Prof. Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M343 2012 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>ANALYZING THE EFFECTIVENESS OF INFORMATION SECURITY PRACTICES IN IMPLEMENTING ISMS STANDARDent://SD_ILS/0/SD_ILS:8378782024-06-22T23:05:31Z2024-06-22T23:05:31Zby Rohaida Ismail, 1984-, author<br/>Author Rohaida Ismail, 1984-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034149 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>IMPLEMENTING A TWO-FACTOR AUTHENTICATION PHYSICAL ACCESS CONTROL SYSTEMent://SD_ILS/0/SD_ILS:8394302024-06-22T23:05:31Z2024-06-22T23:05:31Zby Usama Tharwat Farag Elhagari, 1970-, author<br/>Author Usama Tharwat Farag Elhagari, 1970-, author, Zailani Mohamed Sidek, Assoc.Prof., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 U83 2007 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>DBCRYPT : (MANUAL AND TRANSPARENT ENCRYPTION/DECRYPTION)ent://SD_ILS/0/SD_ILS:8417492024-06-22T23:05:31Z2024-06-22T23:05:31Zby Mustafa Ahmed Abdullah Aqel, 1979-, author<br/>Author Mustafa Ahmed Abdullah Aqel, 1979-, author, Mohd. Nazri Kama, 1963-, supervisor, Muhammad Sufyan Basri, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M878 2007 raf<br/>Thesis Sarjana Sains (Sains Komputer - Kejuruteraan Perisian Masa Nyata)<br/>Algorithms for use in banking message authenticationent://SD_ILS/0/SD_ILS:4352992024-06-22T23:05:31Z2024-06-22T23:05:31Zby British Standards Institution<br/>Author British Standards Institution<br/>Format: Books<br/>Call Number PIA BS 7102 : 1989<br/>A binary access control method using prime factorizationent://SD_ILS/0/SD_ILS:4527862024-06-22T23:05:31Z2024-06-22T23:05:31Zby Chin-Chen Chang<br/>Author Chin-Chen Chang, Lou, Der-Chyuan<br/>Format: Books<br/>Call Number MAK 7180<br/>Cryptolib: cryptography in softwareent://SD_ILS/0/SD_ILS:4157092024-06-22T23:05:31Z2024-06-22T23:05:31Zby Lacy, John B.<br/>Author Lacy, John B.<br/>Format: Books<br/>Call Number MAK 5972<br/>An access control scheme based on Chinese remainder theorem and time-stamp conceptent://SD_ILS/0/SD_ILS:4545512024-06-22T23:05:31Z2024-06-22T23:05:31Zby Min-Shiang, Hwang<br/>Author Min-Shiang, Hwang, Wen-Guey, Tzeng, Wei-Pang, Yang<br/>Format: Books<br/>Call Number MAK 7183<br/>A two-key-lock-pair access control method using prime factorization and time stampent://SD_ILS/0/SD_ILS:4597632024-06-22T23:05:31Z2024-06-22T23:05:31Zby Min-Shiang, Hwang<br/>Author Min-Shiang, Hwang, Wen-Guey, Tzeng, Wei-Pang, Yang<br/>Format: Books<br/>Call Number MAK 7184<br/>The need for securityent://SD_ILS/0/SD_ILS:1041142024-06-22T23:05:31Z2024-06-22T23:05:31Zby The Housley Computer Network Security Seminar (1987 : Melbourne)<br/>Author The Housley Computer Network Security Seminar (1987 : Melbourne), Davies, D. W.<br/>Format: Books<br/>Call Number QA76.9.A25 H68 1987 f<br/>A SECURITY AWARENESS MODEL OF SINGLE SIGN-ON IN UNDERSTANDING PRIVATE SECTOR USER’S ACCEPTANCE AND BEHAVIORent://SD_ILS/0/SD_ILS:8602372024-06-22T23:05:31Z2024-06-22T23:05:31Zby Raihan Yahya @ Zakaria, 1985-, author<br/>Author Raihan Yahya @ Zakaria, 1985-, author, Yusnaidi Md. Yusof, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 R35 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>INFORMATION SECURITY AWARENESS AMONG SYSTEM ADMINISTRATORS AND END-USER PERSPECTIVESent://SD_ILS/0/SD_ILS:8710102024-06-22T23:05:31Z2024-06-22T23:05:31Zby Pugneswary Panner Selvan, 1984-, author<br/>Author Pugneswary Panner Selvan, 1984-, author, Roslina Ibrahim, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 P84 2016 raf<br/>Thesis Master of Science (Information Technology Managent)<br/>ENHANCING GRAPHICAL PASSWORD AUTHENTICATION ON SMARTPHONESent://SD_ILS/0/SD_ILS:8712242024-06-22T23:05:31Z2024-06-22T23:05:31Zby al-Hashedi, Khaled Gubran Yahya, 1990-, author<br/>Author al-Hashedi, Khaled Gubran Yahya, 1990-, author, Mohd. Shahidan Abdullah, Assoc.Prof.Dr., 1960-, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 H377 2017 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/>APPLICATION OF K-MEANS IN REDUCING FALSE POSITIVE ALARMS IN INTRUSION PREVENTION SYSTEMSent://SD_ILS/0/SD_ILS:8361652024-06-22T23:05:31Z2024-06-22T23:05:31Zby Iman Biglari, 1982-, author<br/>Author Iman Biglari, 1982-, author, Bharanidharan Shanmugam, Dr., Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 I436 2010 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>ENHANCE KEY GENERATOR OF DATA ENCRYPTION STANDARD (DES)ent://SD_ILS/0/SD_ILS:8378662024-06-22T23:05:31Z2024-06-22T23:05:31Zby Mahan Niknafskermani, 1982-, author<br/>Author Mahan Niknafskermani, 1982-, author, Norbik Bashah Idris, Dato’ Prof. Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034145 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>ANALYZING THE EFFECTIVENESS OF INFORMATION SECURITY PRACTICES IN IMPLEMENTING ISMS STANDARDent://SD_ILS/0/SD_ILS:8378772024-06-22T23:05:31Z2024-06-22T23:05:31Zby Rohaida Ismail, 1984-, author<br/>Author Rohaida Ismail, 1984-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 R643 2012 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>DEVELOPING A GRAPHICAL PASSWORD AUTHENTICATION SCHEME WITH IMPROVED USABILITYent://SD_ILS/0/SD_ILS:8599022024-06-22T23:05:31Z2024-06-22T23:05:31Zby Nasrin Bahmaei, 1988-, author<br/>Author Nasrin Bahmaei, 1988-, author, Yusnaidi Md. Yusof, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 N378 2015 raf<br/>Thesis (Sarjana Sains (Kejuruteraan Sistem Komputer))-Universiti Teknologi Malaysia, 2015<br/>DEVELOPING A GRAPHICAL PASSWORD AUTHENTICATION SCHEME WITH IMPROVED USABILITYent://SD_ILS/0/SD_ILS:8607852024-06-22T23:05:31Z2024-06-22T23:05:31Zby Nasrin Bahmaei, 1988-, author<br/>Author Nasrin Bahmaei, 1988-, author, Yusnaidi Md. Yusof, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034790 ra<br/>Thesis (Sarjana Sains (Kejuruteraan Sistem Komputer))-Universiti Teknologi Malaysia, 2015<br/>A SECURITY AWARENESS MODEL OF SINGLE SIGN-ON IN UNDERSTANDING PRIVATE SECTOR USER’S ACCEPTANCE AND BEHAVIORent://SD_ILS/0/SD_ILS:8610272024-06-22T23:05:31Z2024-06-22T23:05:31Zby Raihan Yahya @ Zakaria, 1985-, author<br/>Author Raihan Yahya @ Zakaria, 1985-, author, Yusnaidi Md. Yusof, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035032 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>DYNAMIC AUTHENTICATION BASED ON USER BEHAVIOUR MODELINGent://SD_ILS/0/SD_ILS:8646682024-06-22T23:05:31Z2024-06-22T23:05:31Zby Saleh Zainolabedini Rafi, 1979-, author<br/>Author Saleh Zainolabedini Rafi, 1979-, author, Nurulhuda Firdaus Mohd. Azmi, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 S25 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>AN ENHANCED SECURE AUTHENTICATION USING ONE TIME PASSWORD AND QUICK RESPONSE CODEent://SD_ILS/0/SD_ILS:8649072024-06-22T23:05:31Z2024-06-22T23:05:31Zby Nurul Atiqa Mohammad Azuan, 1991-, author<br/>Author Nurul Atiqa Mohammad Azuan, 1991-, author, Azizah Abd. Manaf, Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 N877 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>AN ENHANCED SECURE AUTHENTICATION USING ONE TIME PASSWORD AND QUICK RESPONSE CODEent://SD_ILS/0/SD_ILS:8652662024-06-22T23:05:31Z2024-06-22T23:05:31Zby Nurul Atiqa Mohammad Azuan, 1991-, author<br/>Author Nurul Atiqa Mohammad Azuan, 1991-, author, Azizah Abd. Manaf, Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035100 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>ENHANCING GRAPHICAL PASSWORD AUTHENTICATION ON SMARTPHONESent://SD_ILS/0/SD_ILS:8719422024-06-22T23:05:31Z2024-06-22T23:05:31Zby al-Hashedi, Khaled Gubran Yahya, 1990-, author<br/>Author al-Hashedi, Khaled Gubran Yahya, 1990-, author, Mohd. Shahidan Abdullah, Assoc.Prof.Dr., 1960-, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 064064 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/>INFORMATION SECURITY AWARENESS AMONG SYSTEM ADMINISTRATORS AND END-USER PERSPECTIVESent://SD_ILS/0/SD_ILS:8721562024-06-22T23:05:31Z2024-06-22T23:05:31Zby Pugneswary Panner Selvan, 1984-, author<br/>Author Pugneswary Panner Selvan, 1984-, author, Roslina Ibrahim, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 064089 ra<br/>Thesis Master of Science (Information Technology Managent)<br/>Big Data Analytics with Applications in Insider Threat Detectionent://SD_ILS/0/SD_ILS:8823692024-06-22T23:05:31Z2024-06-22T23:05:31Zby Thuraisingham, Bhavani M., author<br/>Author Thuraisingham, Bhavani M., author, Parveen, Pallabi author, Mohammad Mahedy Masud author, Khan, Latifur author<br/>Format: Books<br/>Call Number QA76.9.A25 T487 2018<br/>ISBN 9781498705479<br/>The Insider Threat : Assessment and Mitigation of Risksent://SD_ILS/0/SD_ILS:8824312024-06-22T23:05:31Z2024-06-22T23:05:31Zby Thompson, Eleanor E.<br/>Author Thompson, Eleanor E.<br/>Format: Books<br/>Call Number QA76.9.A25 T466 2019<br/>ISBN 9781498747080<br/>