Search Results for Computers -- Access control - Narrowed by: Computer networks -- Security measures SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dComputers$002b--$002bAccess$002bcontrol$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$0026ps$003d300$0026isd$003dtrue?dt=list 2024-04-16T11:40:14Z The Intrusion detection networks : a key to collaborative security ent://SD_ILS/0/SD_ILS:837290 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Fung, Carol author<br/>Author&#160;Fung, Carol author,&#160;Boutaba, Raouf<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9 A25 F85 2014<br/>Publisher&#160;Auerbach Pub.,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466564121<br/> UTM security with Fortinet : Mastering FortiOS ent://SD_ILS/0/SD_ILS:803817 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Tam, Kenneth<br/>Author&#160;Tam, Kenneth<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 U86 2013 a<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781597497473<br/> Analyzing pattern matching algorithms applied on snort intrusion detection system ent://SD_ILS/0/SD_ILS:804506 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Abdifatah Abdirahman Abdullahi, 1986-<br/>Author&#160;Abdifatah Abdirahman Abdullahi, 1986-,&#160;Mohd. Aizaini Maarof, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A234 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer ( Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Analyzing pattern matching algorithms applied on snort intrusion detection system ent://SD_ILS/0/SD_ILS:804507 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Abdifatah Abdirahman Abdullah, 1986- author<br/>Author&#160;Abdifatah Abdirahman Abdullah, 1986- author,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;CP 030021 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer ( Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:805287 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Williams, Barry L.<br/>Author&#160;Williams, Barry L.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W55 2013<br/>Publisher&#160;CRC Press, Taylor &amp; Francis Group,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781466580589<br/> Enhancement of network access control architecture with virtualization ent://SD_ILS/0/SD_ILS:840823 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Hairil Annuar Md Salleh, 1977-<br/>Author&#160;Hairil Annuar Md Salleh, 1977-,&#160;Shanmugam, Bharanidharan, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 034013 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Enhancement of network access control architecture with virtualization ent://SD_ILS/0/SD_ILS:840822 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Hairil Annuar Md Salleh, 1977-<br/>Author&#160;Hairil Annuar Md Salleh, 1977-,&#160;Shanmugam, Bharanidharan, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H35 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Client-side attacks and defense ent://SD_ILS/0/SD_ILS:797948 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Shimonski, Robert<br/>Author&#160;Shimonski, Robert,&#160;Oriyano, Sean-Philip<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S55 2012<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781597495905<br/> Design a framework for a security information and events management (SIEM) programs ent://SD_ILS/0/SD_ILS:836518 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Khalid Mohamed Mirghani, 1974-<br/>Author&#160;Khalid Mohamed Mirghani, 1974-,&#160;Bharanidharan Shanmugam, Dr.,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 K43 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Design a framework for a security information and events management (SIEM) programs ent://SD_ILS/0/SD_ILS:836519 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Khalid Mohamed Mirghani, 1974-<br/>Author&#160;Khalid Mohamed Mirghani, 1974-,&#160;Bharanidharan Shanmugam, Dr.,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034114 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/> Devising usability and security features for graphical password scheme ent://SD_ILS/0/SD_ILS:603479 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Muhammad Daniel Hafiz Abdullah, 1978-<br/>Author&#160;Muhammad Daniel Hafiz Abdullah, 1978-,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 017398 ra<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Seven deadliest network attacks ent://SD_ILS/0/SD_ILS:758900 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Prowell, Stacy J.<br/>Author&#160;Prowell, Stacy J.,&#160;Kraus, Rob,&#160;Borkin, Mike<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P76 2010<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781597495493<br/> Devising usability and security features for graphical password scheme ent://SD_ILS/0/SD_ILS:390590 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Muhammad Daniel Hafiz Abdullah, 1978-<br/>Author&#160;Muhammad Daniel Hafiz Abdullah, 1978-,&#160;Abdul Hanan Abdullah,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M325 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2010<br/> Implementing NAP and NAC security technologies : the complete guide to network access control ent://SD_ILS/0/SD_ILS:232208 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Hoffman, Daniel (Daniel V.), 1972-<br/>Author&#160;Hoffman, Daniel (Daniel V.), 1972-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.597 H63 2008<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470238387<br/> Implementing NAP and NAC security technologies : the complete guide to network access control ent://SD_ILS/0/SD_ILS:292712 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Hoffman, Daniel V.<br/>Author&#160;Hoffman, Daniel V.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.597 H64 2008<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470238387<br/> Network security : private communications in a public world ent://SD_ILS/0/SD_ILS:328860 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Kaufman, Charlie<br/>Author&#160;Kaufman, Charlie,&#160;Perlman, Radia,&#160;Speciner, Michael<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K34 2008<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Prentice Hall of India,<br/>Publication Date&#160;2008<br/>ISBN&#160;9788120322134<br/> IT security governance guidebook with security program metrics on CD-ROM ent://SD_ILS/0/SD_ILS:156661 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Cohen, Fred, 1956-<br/>Author&#160;Cohen, Fred, 1956-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C63 2007<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780849384356<br/> Integrated security systems design : concepts, specifications, and implementation ent://SD_ILS/0/SD_ILS:161025 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Norman, Thomas<br/>Author&#160;Norman, Thomas<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N674 2007<br/>Publisher&#160;Elsevier Butterworth-Heinemann,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780750679091<br/> IT security governance guidebook with security program metrics on CD-ROM ent://SD_ILS/0/SD_ILS:570220 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Cohen, Fred, 1956-<br/>Author&#160;Cohen, Fred, 1956-<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 8941<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780849384356<br/> Snort : IDS and IPS toolkit ent://SD_ILS/0/SD_ILS:578042 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Beale, Jay<br/>Author&#160;Beale, Jay,&#160;Baker, Andrew R.,&#160;Esler, Joel<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 7232<br/>Publisher&#160;Syngress Publishing,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781597490993<br/> Cisco Network Admission Control ent://SD_ILS/0/SD_ILS:623505 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Helfrich, Denise<br/>Author&#160;Helfrich, Denise<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C574 2007 v.1<br/>Publisher&#160;Cisco,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781587052415<br/> Mechanics of user identification and authentication : fundamentals of identity management ent://SD_ILS/0/SD_ILS:248074 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Todorov, Dobromir<br/>Author&#160;Todorov, Dobromir<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 T62 2007<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781420052190<br/> Enhancement of snort intrusion detection system ent://SD_ILS/0/SD_ILS:111888 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Rabia Bakhteri Jahangir Bakhteri<br/>Author&#160;Rabia Bakhteri Jahangir Bakhteri<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 R32 2006<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Project Paper (Sarjana Muda Kejuruteraan (Komputer)) - Universiti Teknologi Malaysia, 2006<br/> Access control systems : security, identity management and trust models ent://SD_ILS/0/SD_ILS:176900 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Benantar, Messaoud<br/>Author&#160;Benantar, Messaoud<br/>Format:&#160;Books<br/>Call Number&#160;TK5109.59 B46 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387004457<br/> Advanced host intrusion prevention with CSA ent://SD_ILS/0/SD_ILS:101840 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Sullivan, Chad<br/>Author&#160;Sullivan, Chad,&#160;Mauvais, Paul,&#160;Asher, Jeff<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S94 2006<br/>Publisher&#160;Cisco Press,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781587052521<br/> Intrusion prevention fundamentals ent://SD_ILS/0/SD_ILS:101850 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Carter, Earl<br/>Author&#160;Carter, Earl,&#160;Hogue, Jonathan<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C377 2006<br/>Publisher&#160;Cisco Press,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781587052392<br/> Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohan ent://SD_ILS/0/SD_ILS:617575 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Mohd. Nizam Omar<br/>Author&#160;Mohd. Nizam Omar<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 11356<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2005<br/> Cisco security agent ent://SD_ILS/0/SD_ILS:444229 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Sullivan, Chad<br/>Author&#160;Sullivan, Chad<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S84 2005<br/>Publisher&#160;Cisco Press,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781587052057<br/> Pengoptimuman algoritma pengesanan batu loncatan dalam sistem pengesanan pencerobohan ent://SD_ILS/0/SD_ILS:470105 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Mohd. Nizam Omar<br/>Author&#160;Mohd. Nizam Omar<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M544 2005 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=40824">Preview</a><br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2005<br/> Analisa tindak balas aktif bagi simulasi serangan teragih secara selari ke atas hos IRS ent://SD_ILS/0/SD_ILS:366959 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Wahidah Md. Shah<br/>Author&#160;Wahidah Md. Shah<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W33 2004<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/>Tesis (Sarjana Sains (Komputer)) - Universiti Teknologi Malaysia, 2004<br/> Analisa tindak balas aktif bagi simulasi serangan teragih secara selari ke atas hos IRS ent://SD_ILS/0/SD_ILS:599771 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Wahidah Md. Shah<br/>Author&#160;Wahidah Md. Shah<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 8886<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/>Tesis (Sarjana Sains (Komputer)) - Universiti Teknologi Malaysia, 2004<br/> Snort for dummies ent://SD_ILS/0/SD_ILS:605741 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Scott, Charline<br/>Author&#160;Scott, Charline,&#160;Wolfe, Paul,&#160;Hayes, Bert<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 5376<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780764568350<br/> The hackers handbook : the strategy behind breaking into and defending networks ent://SD_ILS/0/SD_ILS:427103 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Young, Susan (Susan Elizabeth), 1968-<br/>Author&#160;Young, Susan (Susan Elizabeth), 1968-,&#160;Aitel, Dave<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 Y68 2004<br/>Publisher&#160;Auerbach Pub.,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780849308888<br/> Snort for dummies ent://SD_ILS/0/SD_ILS:394616 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Scott, Charline<br/>Author&#160;Scott, Charline,&#160;Wolfe, Paul,&#160;Hayes, Bert<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S36 2004<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780764568350<br/> Ke arah pengurangan jurang masa sistem penindakbalasan pencerobohan melalui penggunaan pendekatan penjejakan pencerobohan pantas ent://SD_ILS/0/SD_ILS:353627 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Mohd. Nizam Omar<br/>Author&#160;Mohd. Nizam Omar,&#160;Mohd. Aizaini Maarof,&#160;Subariah Ibrahim,&#160;Persidangan Sempena Pameran Penyelidikan dan Pembangunan IPTA (2003 : Kuala Lumpur )<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M54 2003<br/>Publication Date&#160;2003<br/> NIRS : Network intrusion detection and active-response system : group report ent://SD_ILS/0/SD_ILS:352764 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Adedayo Adetoye<br/>Author&#160;Adedayo Adetoye,&#160;Andy Choi,&#160;Marina Md. Arshad,&#160;Olufemi Soretire<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N475 2003<br/>Publisher&#160;University College London,<br/>Publication Date&#160;2003<br/>Thesis (Sarjana Sains (Sains Komputer) - University College London, 2003<br/> Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan ent://SD_ILS/0/SD_ILS:11180 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Ali Yusny Daud<br/>Author&#160;Ali Yusny Daud<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 13917<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/> Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan ent://SD_ILS/0/SD_ILS:601002 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Ali Yusny Daud<br/>Author&#160;Ali Yusny Daud<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 8375<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/> Network security : private communication in a public world ent://SD_ILS/0/SD_ILS:391399 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Kaufman, Charlie<br/>Author&#160;Kaufman, Charlie,&#160;Perlman, Radia,&#160;Speciner, Michael<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K34 2002<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Prentice Hall PTR,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780130460196<br/> Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan ent://SD_ILS/0/SD_ILS:371161 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Ali Yusny Daud<br/>Author&#160;Ali Yusny Daud<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A44 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=51186">Preview</a><br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/> Detection &amp; prevention of DoS attacks using intrusion detection system : design &amp; development ent://SD_ILS/0/SD_ILS:322481 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Pathmenanthan Ramakrishna<br/>Author&#160;Pathmenanthan Ramakrishna,&#160;Mohd. Aizaini Maarof,&#160;Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P376 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> DoS attacks detection using intrusion detection system and system calls ent://SD_ILS/0/SD_ILS:321462 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Mohd. Aizaini Maarof<br/>Author&#160;Mohd. Aizaini Maarof,&#160;Pathmenanthan Ramakrishna,&#160;Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M346 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Capaian alatan yang selamat dalam pembelajaran kolaboratif = Secure tools access in collaborative learning ent://SD_ILS/0/SD_ILS:20935 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Faaz Anwar Asan<br/>Author&#160;Faaz Anwar Asan<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12189<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/> Capaian alatan yang selamat dalam pembelajaran kolaboratif = Secure tools access in collaborative learning ent://SD_ILS/0/SD_ILS:301997 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Faaz Anwar Asan<br/>Author&#160;Faaz Anwar Asan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 F33 2001<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/> Understanding security on the net ent://SD_ILS/0/SD_ILS:472209 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Teo, Lu Ling<br/>Author&#160;Teo, Lu Ling<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T46 1998 raf<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1998<br/>Project paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1998<br/> Fundamental steps for fixed-font character recognition in image processing ... [et al.] ent://SD_ILS/0/SD_ILS:13091 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Khor, Sock Choo<br/>Author&#160;Khor, Sock Choo,&#160;Mohamad Azlie Mohamad Yusof,&#160;Tan, Yee Fei,&#160;Teo, Lu Ling,&#160;Thoo, Wei Ping<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 9464<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1998<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1998<br/> APPLICATION OF K-MEANS IN REDUCING FALSE POSITIVE ALARMS IN INTRUSION PREVENTION SYSTEMS ent://SD_ILS/0/SD_ILS:836166 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Iman Biglari, 1982-, author<br/>Author&#160;Iman Biglari, 1982-, author,&#160;Bharanidharan Shanmugam, Dr.,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 034123 ra<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> A SECURITY AWARENESS MODEL OF SINGLE SIGN-ON IN UNDERSTANDING PRIVATE SECTOR USER&rsquo;S ACCEPTANCE AND BEHAVIOR ent://SD_ILS/0/SD_ILS:860237 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Raihan Yahya @ Zakaria, 1985-, author<br/>Author&#160;Raihan Yahya @ Zakaria, 1985-, author,&#160;Yusnaidi Md. Yusof, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R35 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> INFORMATION SECURITY AWARENESS AMONG SYSTEM ADMINISTRATORS AND END-USER PERSPECTIVES ent://SD_ILS/0/SD_ILS:871010 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Pugneswary Panner Selvan, 1984-, author<br/>Author&#160;Pugneswary Panner Selvan, 1984-, author,&#160;Roslina Ibrahim, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P84 2016 raf<br/>Thesis&#160;Master of Science (Information Technology Managent)<br/> APPLICATION OF K-MEANS IN REDUCING FALSE POSITIVE ALARMS IN INTRUSION PREVENTION SYSTEMS ent://SD_ILS/0/SD_ILS:836165 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Iman Biglari, 1982-, author<br/>Author&#160;Iman Biglari, 1982-, author,&#160;Bharanidharan Shanmugam, Dr.,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I436 2010 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> A SECURITY AWARENESS MODEL OF SINGLE SIGN-ON IN UNDERSTANDING PRIVATE SECTOR USER&rsquo;S ACCEPTANCE AND BEHAVIOR ent://SD_ILS/0/SD_ILS:861027 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Raihan Yahya @ Zakaria, 1985-, author<br/>Author&#160;Raihan Yahya @ Zakaria, 1985-, author,&#160;Yusnaidi Md. Yusof, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 035032 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> INFORMATION SECURITY AWARENESS AMONG SYSTEM ADMINISTRATORS AND END-USER PERSPECTIVES ent://SD_ILS/0/SD_ILS:872156 2024-04-16T11:40:14Z 2024-04-16T11:40:14Z by&#160;Pugneswary Panner Selvan, 1984-, author<br/>Author&#160;Pugneswary Panner Selvan, 1984-, author,&#160;Roslina Ibrahim, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 064089 ra<br/>Thesis&#160;Master of Science (Information Technology Managent)<br/>