Search Results for Computers -- Access control - Narrowed by: Computer networks -- Security measures - Wahidah Md. ShahSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dComputers$002b--$002bAccess$002bcontrol$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$0026qf$003dAUTHOR$002509Author$002509Wahidah$002bMd.$002bShah$002509Wahidah$002bMd.$002bShah$0026ps$003d300?dt=list2024-04-19T19:53:41ZAnalisa tindak balas aktif bagi simulasi serangan teragih secara selari ke atas hos IRSent://SD_ILS/0/SD_ILS:3669592024-04-19T19:53:41Z2024-04-19T19:53:41Zby Wahidah Md. Shah<br/>Author Wahidah Md. Shah<br/>Format: Books<br/>Call Number TK5105.59 W33 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Tesis (Sarjana Sains (Komputer)) - Universiti Teknologi Malaysia, 2004<br/>Analisa tindak balas aktif bagi simulasi serangan teragih secara selari ke atas hos IRSent://SD_ILS/0/SD_ILS:5997712024-04-19T19:53:41Z2024-04-19T19:53:41Zby Wahidah Md. Shah<br/>Author Wahidah Md. Shah<br/>Format: Computer file<br/>Call Number CP 8886<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Tesis (Sarjana Sains (Komputer)) - Universiti Teknologi Malaysia, 2004<br/>