Search Results for Computers -- Access control - Narrowed by: Computer networks -- Security measuresSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dComputers$002b--$002bAccess$002bcontrol$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$0026ic$003dtrue$0026ps$003d300?dt=list2024-04-19T12:16:26ZThe Intrusion detection networks : a key to collaborative securityent://SD_ILS/0/SD_ILS:8372902024-04-19T12:16:26Z2024-04-19T12:16:26Zby Fung, Carol author<br/>Author Fung, Carol author, Boutaba, Raouf<br/>Format: Books<br/>Call Number QA76.9 A25 F85 2014<br/>Publisher Auerbach Pub.,<br/>Publication Date 2014<br/>ISBN 9781466564121<br/>UTM security with Fortinet : Mastering FortiOSent://SD_ILS/0/SD_ILS:8038172024-04-19T12:16:26Z2024-04-19T12:16:26Zby Tam, Kenneth<br/>Author Tam, Kenneth<br/>Format: Books<br/>Call Number TK5105.59 U86 2013 a<br/>Publisher Syngress,<br/>Publication Date 2013<br/>ISBN 9781597497473<br/>Analyzing pattern matching algorithms applied on snort intrusion detection systement://SD_ILS/0/SD_ILS:8045062024-04-19T12:16:26Z2024-04-19T12:16:26Zby Abdifatah Abdirahman Abdullahi, 1986-<br/>Author Abdifatah Abdirahman Abdullahi, 1986-, Mohd. Aizaini Maarof, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number TK5105.59 A234 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer ( Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Analyzing pattern matching algorithms applied on snort intrusion detection systement://SD_ILS/0/SD_ILS:8045072024-04-19T12:16:26Z2024-04-19T12:16:26Zby Abdifatah Abdirahman Abdullah, 1986- author<br/>Author Abdifatah Abdirahman Abdullah, 1986- author, Fakulti Komputeran<br/>Format: Books<br/>Call Number CP 030021 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer ( Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:8052872024-04-19T12:16:26Z2024-04-19T12:16:26Zby Williams, Barry L.<br/>Author Williams, Barry L.<br/>Format: Books<br/>Call Number QA76.9.A25 W55 2013<br/>Publisher CRC Press, Taylor & Francis Group,<br/>Publication Date 2013<br/>ISBN 9781466580589<br/>Enhancement of network access control architecture with virtualizationent://SD_ILS/0/SD_ILS:8408232024-04-19T12:16:26Z2024-04-19T12:16:26Zby Hairil Annuar Md Salleh, 1977-<br/>Author Hairil Annuar Md Salleh, 1977-, Shanmugam, Bharanidharan, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034013 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Enhancement of network access control architecture with virtualizationent://SD_ILS/0/SD_ILS:8408222024-04-19T12:16:26Z2024-04-19T12:16:26Zby Hairil Annuar Md Salleh, 1977-<br/>Author Hairil Annuar Md Salleh, 1977-, Shanmugam, Bharanidharan, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 H35 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Client-side attacks and defenseent://SD_ILS/0/SD_ILS:7979482024-04-19T12:16:26Z2024-04-19T12:16:26Zby Shimonski, Robert<br/>Author Shimonski, Robert, Oriyano, Sean-Philip<br/>Format: Books<br/>Call Number TK5105.59 S55 2012<br/>Publisher Syngress,<br/>Publication Date 2012<br/>ISBN 9781597495905<br/>Design a framework for a security information and events management (SIEM) programsent://SD_ILS/0/SD_ILS:8365182024-04-19T12:16:26Z2024-04-19T12:16:26Zby Khalid Mohamed Mirghani, 1974-<br/>Author Khalid Mohamed Mirghani, 1974-, Bharanidharan Shanmugam, Dr., Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number TK5105.59 K43 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Design a framework for a security information and events management (SIEM) programsent://SD_ILS/0/SD_ILS:8365192024-04-19T12:16:26Z2024-04-19T12:16:26Zby Khalid Mohamed Mirghani, 1974-<br/>Author Khalid Mohamed Mirghani, 1974-, Bharanidharan Shanmugam, Dr., Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034114 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Devising usability and security features for graphical password schemeent://SD_ILS/0/SD_ILS:6034792024-04-19T12:16:26Z2024-04-19T12:16:26Zby Muhammad Daniel Hafiz Abdullah, 1978-<br/>Author Muhammad Daniel Hafiz Abdullah, 1978-, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 017398 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Seven deadliest network attacksent://SD_ILS/0/SD_ILS:7589002024-04-19T12:16:26Z2024-04-19T12:16:26Zby Prowell, Stacy J.<br/>Author Prowell, Stacy J., Kraus, Rob, Borkin, Mike<br/>Format: Books<br/>Call Number TK5105.59 P76 2010<br/>Publisher Syngress,<br/>Publication Date 2010<br/>ISBN 9781597495493<br/>Devising usability and security features for graphical password schemeent://SD_ILS/0/SD_ILS:3905902024-04-19T12:16:26Z2024-04-19T12:16:26Zby Muhammad Daniel Hafiz Abdullah, 1978-<br/>Author Muhammad Daniel Hafiz Abdullah, 1978-, Abdul Hanan Abdullah, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 M325 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/>Implementing NAP and NAC security technologies : the complete guide to network access controlent://SD_ILS/0/SD_ILS:2322082024-04-19T12:16:26Z2024-04-19T12:16:26Zby Hoffman, Daniel (Daniel V.), 1972-<br/>Author Hoffman, Daniel (Daniel V.), 1972-<br/>Format: Books<br/>Call Number TK5105.597 H63 2008<br/>Publisher Wiley,<br/>Publication Date 2008<br/>ISBN 9780470238387<br/>Implementing NAP and NAC security technologies : the complete guide to network access controlent://SD_ILS/0/SD_ILS:2927122024-04-19T12:16:26Z2024-04-19T12:16:26Zby Hoffman, Daniel V.<br/>Author Hoffman, Daniel V.<br/>Format: Books<br/>Call Number TK5105.597 H64 2008<br/>Publisher Wiley,<br/>Publication Date 2008<br/>ISBN 9780470238387<br/>Network security : private communications in a public worldent://SD_ILS/0/SD_ILS:3288602024-04-19T12:16:26Z2024-04-19T12:16:26Zby Kaufman, Charlie<br/>Author Kaufman, Charlie, Perlman, Radia, Speciner, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 K34 2008<br/>Edition 2nd ed.<br/>Publisher Prentice Hall of India,<br/>Publication Date 2008<br/>ISBN 9788120322134<br/>IT security governance guidebook with security program metrics on CD-ROMent://SD_ILS/0/SD_ILS:1566612024-04-19T12:16:26Z2024-04-19T12:16:26Zby Cohen, Fred, 1956-<br/>Author Cohen, Fred, 1956-<br/>Format: Books<br/>Call Number TK5105.59 C63 2007<br/>Publisher Auerbach Publications,<br/>Publication Date 2007<br/>ISBN 9780849384356<br/>Integrated security systems design : concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:1610252024-04-19T12:16:26Z2024-04-19T12:16:26Zby Norman, Thomas<br/>Author Norman, Thomas<br/>Format: Books<br/>Call Number TK5105.59 N674 2007<br/>Publisher Elsevier Butterworth-Heinemann,<br/>Publication Date 2007<br/>ISBN 9780750679091<br/>IT security governance guidebook with security program metrics on CD-ROMent://SD_ILS/0/SD_ILS:5702202024-04-19T12:16:26Z2024-04-19T12:16:26Zby Cohen, Fred, 1956-<br/>Author Cohen, Fred, 1956-<br/>Format: Computer file<br/>Call Number CP 8941<br/>Publisher Auerbach Publications,<br/>Publication Date 2007<br/>ISBN 9780849384356<br/>Snort : IDS and IPS toolkitent://SD_ILS/0/SD_ILS:5780422024-04-19T12:16:26Z2024-04-19T12:16:26Zby Beale, Jay<br/>Author Beale, Jay, Baker, Andrew R., Esler, Joel<br/>Format: Computer file<br/>Call Number CP 7232<br/>Publisher Syngress Publishing,<br/>Publication Date 2007<br/>ISBN 9781597490993<br/>Cisco Network Admission Controlent://SD_ILS/0/SD_ILS:6235052024-04-19T12:16:26Z2024-04-19T12:16:26Zby Helfrich, Denise<br/>Author Helfrich, Denise<br/>Format: Books<br/>Call Number QA76.9.A25 C574 2007 v.1<br/>Publisher Cisco,<br/>Publication Date 2007<br/>ISBN 9781587052415<br/>Mechanics of user identification and authentication : fundamentals of identity managementent://SD_ILS/0/SD_ILS:2480742024-04-19T12:16:26Z2024-04-19T12:16:26Zby Todorov, Dobromir<br/>Author Todorov, Dobromir<br/>Format: Books<br/>Call Number TK5105.59 T62 2007<br/>Publisher Auerbach Publications,<br/>Publication Date 2007<br/>ISBN 9781420052190<br/>Enhancement of snort intrusion detection systement://SD_ILS/0/SD_ILS:1118882024-04-19T12:16:26Z2024-04-19T12:16:26Zby Rabia Bakhteri Jahangir Bakhteri<br/>Author Rabia Bakhteri Jahangir Bakhteri<br/>Format: Books<br/>Call Number TK5105.59 R32 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Project Paper (Sarjana Muda Kejuruteraan (Komputer)) - Universiti Teknologi Malaysia, 2006<br/>Access control systems : security, identity management and trust modelsent://SD_ILS/0/SD_ILS:1769002024-04-19T12:16:26Z2024-04-19T12:16:26Zby Benantar, Messaoud<br/>Author Benantar, Messaoud<br/>Format: Books<br/>Call Number TK5109.59 B46 2006<br/>Publisher Springer,<br/>Publication Date 2006<br/>ISBN 9780387004457<br/>Advanced host intrusion prevention with CSAent://SD_ILS/0/SD_ILS:1018402024-04-19T12:16:26Z2024-04-19T12:16:26Zby Sullivan, Chad<br/>Author Sullivan, Chad, Mauvais, Paul, Asher, Jeff<br/>Format: Books<br/>Call Number TK5105.59 S94 2006<br/>Publisher Cisco Press,<br/>Publication Date 2006<br/>ISBN 9781587052521<br/>Intrusion prevention fundamentalsent://SD_ILS/0/SD_ILS:1018502024-04-19T12:16:26Z2024-04-19T12:16:26Zby Carter, Earl<br/>Author Carter, Earl, Hogue, Jonathan<br/>Format: Books<br/>Call Number TK5105.59 C377 2006<br/>Publisher Cisco Press,<br/>Publication Date 2006<br/>ISBN 9781587052392<br/>Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohanent://SD_ILS/0/SD_ILS:6175752024-04-19T12:16:26Z2024-04-19T12:16:26Zby Mohd. Nizam Omar<br/>Author Mohd. Nizam Omar<br/>Format: Computer file<br/>Call Number CP 11356<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2005<br/>Cisco security agentent://SD_ILS/0/SD_ILS:4442292024-04-19T12:16:26Z2024-04-19T12:16:26Zby Sullivan, Chad<br/>Author Sullivan, Chad<br/>Format: Books<br/>Call Number TK5105.59 S84 2005<br/>Publisher Cisco Press,<br/>Publication Date 2005<br/>ISBN 9781587052057<br/>Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohanent://SD_ILS/0/SD_ILS:4701052024-04-19T12:16:26Z2024-04-19T12:16:26Zby Mohd. Nizam Omar<br/>Author Mohd. Nizam Omar<br/>Format: Books<br/>Call Number TK5105.59 M544 2005 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=40824">Preview</a><br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2005<br/>Analisa tindak balas aktif bagi simulasi serangan teragih secara selari ke atas hos IRSent://SD_ILS/0/SD_ILS:3669592024-04-19T12:16:26Z2024-04-19T12:16:26Zby Wahidah Md. Shah<br/>Author Wahidah Md. Shah<br/>Format: Books<br/>Call Number TK5105.59 W33 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Tesis (Sarjana Sains (Komputer)) - Universiti Teknologi Malaysia, 2004<br/>Analisa tindak balas aktif bagi simulasi serangan teragih secara selari ke atas hos IRSent://SD_ILS/0/SD_ILS:5997712024-04-19T12:16:26Z2024-04-19T12:16:26Zby Wahidah Md. Shah<br/>Author Wahidah Md. Shah<br/>Format: Computer file<br/>Call Number CP 8886<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Tesis (Sarjana Sains (Komputer)) - Universiti Teknologi Malaysia, 2004<br/>Snort for dummiesent://SD_ILS/0/SD_ILS:6057412024-04-19T12:16:26Z2024-04-19T12:16:26Zby Scott, Charline<br/>Author Scott, Charline, Wolfe, Paul, Hayes, Bert<br/>Format: Computer file<br/>Call Number CP 5376<br/>Publisher Wiley,<br/>Publication Date 2004<br/>ISBN 9780764568350<br/>The hackers handbook : the strategy behind breaking into and defending networksent://SD_ILS/0/SD_ILS:4271032024-04-19T12:16:26Z2024-04-19T12:16:26Zby Young, Susan (Susan Elizabeth), 1968-<br/>Author Young, Susan (Susan Elizabeth), 1968-, Aitel, Dave<br/>Format: Books<br/>Call Number TK5105.59 Y68 2004<br/>Publisher Auerbach Pub.,<br/>Publication Date 2004<br/>ISBN 9780849308888<br/>Snort for dummiesent://SD_ILS/0/SD_ILS:3946162024-04-19T12:16:26Z2024-04-19T12:16:26Zby Scott, Charline<br/>Author Scott, Charline, Wolfe, Paul, Hayes, Bert<br/>Format: Books<br/>Call Number TK5105.59 S36 2004<br/>Publisher Wiley,<br/>Publication Date 2004<br/>ISBN 9780764568350<br/>Ke arah pengurangan jurang masa sistem penindakbalasan pencerobohan melalui penggunaan pendekatan penjejakan pencerobohan pantasent://SD_ILS/0/SD_ILS:3536272024-04-19T12:16:26Z2024-04-19T12:16:26Zby Mohd. Nizam Omar<br/>Author Mohd. Nizam Omar, Mohd. Aizaini Maarof, Subariah Ibrahim, Persidangan Sempena Pameran Penyelidikan dan Pembangunan IPTA (2003 : Kuala Lumpur )<br/>Format: Books<br/>Call Number TK5105.59 M54 2003<br/>Publication Date 2003<br/>NIRS : Network intrusion detection and active-response system : group reportent://SD_ILS/0/SD_ILS:3527642024-04-19T12:16:26Z2024-04-19T12:16:26Zby Adedayo Adetoye<br/>Author Adedayo Adetoye, Andy Choi, Marina Md. Arshad, Olufemi Soretire<br/>Format: Books<br/>Call Number TK5105.59 N475 2003<br/>Publisher University College London,<br/>Publication Date 2003<br/>Thesis (Sarjana Sains (Sains Komputer) - University College London, 2003<br/>Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohanent://SD_ILS/0/SD_ILS:111802024-04-19T12:16:26Z2024-04-19T12:16:26Zby Ali Yusny Daud<br/>Author Ali Yusny Daud<br/>Format: Visual Materials<br/>Call Number MFL 13917<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/>Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohanent://SD_ILS/0/SD_ILS:6010022024-04-19T12:16:26Z2024-04-19T12:16:26Zby Ali Yusny Daud<br/>Author Ali Yusny Daud<br/>Format: Computer file<br/>Call Number CP 8375<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/>Network security : private communication in a public worldent://SD_ILS/0/SD_ILS:3913992024-04-19T12:16:26Z2024-04-19T12:16:26Zby Kaufman, Charlie<br/>Author Kaufman, Charlie, Perlman, Radia, Speciner, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 K34 2002<br/>Edition 2nd ed.<br/>Publisher Prentice Hall PTR,<br/>Publication Date 2002<br/>ISBN 9780130460196<br/>Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohanent://SD_ILS/0/SD_ILS:3711612024-04-19T12:16:26Z2024-04-19T12:16:26Zby Ali Yusny Daud<br/>Author Ali Yusny Daud<br/>Format: Books<br/>Call Number TK5105.59 A44 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=51186">Preview</a><br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/>Detection & prevention of DoS attacks using intrusion detection system : design & developmentent://SD_ILS/0/SD_ILS:3224812024-04-19T12:16:26Z2024-04-19T12:16:26Zby Pathmenanthan Ramakrishna<br/>Author Pathmenanthan Ramakrishna, Mohd. Aizaini Maarof, Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format: Books<br/>Call Number TK5105.59 P376 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>DoS attacks detection using intrusion detection system and system callsent://SD_ILS/0/SD_ILS:3214622024-04-19T12:16:26Z2024-04-19T12:16:26Zby Mohd. Aizaini Maarof<br/>Author Mohd. Aizaini Maarof, Pathmenanthan Ramakrishna, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number TK5105.59 M346 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Capaian alatan yang selamat dalam pembelajaran kolaboratif = Secure tools access in collaborative learningent://SD_ILS/0/SD_ILS:209352024-04-19T12:16:26Z2024-04-19T12:16:26Zby Faaz Anwar Asan<br/>Author Faaz Anwar Asan<br/>Format: Visual Materials<br/>Call Number MFL 12189<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Capaian alatan yang selamat dalam pembelajaran kolaboratif = Secure tools access in collaborative learningent://SD_ILS/0/SD_ILS:3019972024-04-19T12:16:26Z2024-04-19T12:16:26Zby Faaz Anwar Asan<br/>Author Faaz Anwar Asan<br/>Format: Books<br/>Call Number QA76.9.A25 F33 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Understanding security on the netent://SD_ILS/0/SD_ILS:4722092024-04-19T12:16:26Z2024-04-19T12:16:26Zby Teo, Lu Ling<br/>Author Teo, Lu Ling<br/>Format: Books<br/>Call Number QA76.9.A25 T46 1998 raf<br/>Publisher UTM,<br/>Publication Date 1998<br/>Project paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1998<br/>Fundamental steps for fixed-font character recognition in image processing ... [et al.]ent://SD_ILS/0/SD_ILS:130912024-04-19T12:16:26Z2024-04-19T12:16:26Zby Khor, Sock Choo<br/>Author Khor, Sock Choo, Mohamad Azlie Mohamad Yusof, Tan, Yee Fei, Teo, Lu Ling, Thoo, Wei Ping<br/>Format: Visual Materials<br/>Call Number MFL 9464<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1998<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1998<br/>APPLICATION OF K-MEANS IN REDUCING FALSE POSITIVE ALARMS IN INTRUSION PREVENTION SYSTEMSent://SD_ILS/0/SD_ILS:8361662024-04-19T12:16:26Z2024-04-19T12:16:26Zby Iman Biglari, 1982-, author<br/>Author Iman Biglari, 1982-, author, Bharanidharan Shanmugam, Dr., Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034123 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>A SECURITY AWARENESS MODEL OF SINGLE SIGN-ON IN UNDERSTANDING PRIVATE SECTOR USER’S ACCEPTANCE AND BEHAVIORent://SD_ILS/0/SD_ILS:8602372024-04-19T12:16:26Z2024-04-19T12:16:26Zby Raihan Yahya @ Zakaria, 1985-, author<br/>Author Raihan Yahya @ Zakaria, 1985-, author, Yusnaidi Md. Yusof, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 R35 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>INFORMATION SECURITY AWARENESS AMONG SYSTEM ADMINISTRATORS AND END-USER PERSPECTIVESent://SD_ILS/0/SD_ILS:8710102024-04-19T12:16:26Z2024-04-19T12:16:26Zby Pugneswary Panner Selvan, 1984-, author<br/>Author Pugneswary Panner Selvan, 1984-, author, Roslina Ibrahim, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 P84 2016 raf<br/>Thesis Master of Science (Information Technology Managent)<br/>APPLICATION OF K-MEANS IN REDUCING FALSE POSITIVE ALARMS IN INTRUSION PREVENTION SYSTEMSent://SD_ILS/0/SD_ILS:8361652024-04-19T12:16:26Z2024-04-19T12:16:26Zby Iman Biglari, 1982-, author<br/>Author Iman Biglari, 1982-, author, Bharanidharan Shanmugam, Dr., Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 I436 2010 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>A SECURITY AWARENESS MODEL OF SINGLE SIGN-ON IN UNDERSTANDING PRIVATE SECTOR USER’S ACCEPTANCE AND BEHAVIORent://SD_ILS/0/SD_ILS:8610272024-04-19T12:16:26Z2024-04-19T12:16:26Zby Raihan Yahya @ Zakaria, 1985-, author<br/>Author Raihan Yahya @ Zakaria, 1985-, author, Yusnaidi Md. Yusof, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035032 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>INFORMATION SECURITY AWARENESS AMONG SYSTEM ADMINISTRATORS AND END-USER PERSPECTIVESent://SD_ILS/0/SD_ILS:8721562024-04-19T12:16:26Z2024-04-19T12:16:26Zby Pugneswary Panner Selvan, 1984-, author<br/>Author Pugneswary Panner Selvan, 1984-, author, Roslina Ibrahim, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 064089 ra<br/>Thesis Master of Science (Information Technology Managent)<br/>