Search Results for Computers -- Access control - Narrowed by: Computers -- Access control - Open Access Book - Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)SirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dComputers$002b--$002bAccess$002bcontrol$0026qf$003dSUBJECT$002509Subject$002509Computers$002b--$002bAccess$002bcontrol$002509Computers$002b--$002bAccess$002bcontrol$0026qf$003dITYPE$002509Material$002bType$0025091$00253AOPEN_BK$002509Open$002bAccess$002bBook$0026qf$003dAUTHOR$002509Author$002509Conference$002bon$002bInformation$002bTechnology$002bResearch$002band$002bApplications$002b$0025282002$002b$00253A$002bUNITAR$00252C$002bKuala$002bLumpur$002529$002509Conference$002bon$002bInformation$002bTechnology$002bResearch$002band$002bApplications$002b$0025282002$002b$00253A$002bUNITAR$00252C$002bKuala$002bLumpur$002529$0026ps$003d300$0026isd$003dtrue?dt=list2024-05-26T23:38:46ZDatabase encrytion schemes : a comparative studyent://SD_ILS/0/SD_ILS:3515112024-05-26T23:38:46Z2024-05-26T23:38:46Zby Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author Zailani Mohamed Sidek, Assoc.Prof.Dr., Norbik Bashah Idris, Harihodin Selamat, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.9.A25 Z34 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>DoS attacks detection using intrusion detection system and system callsent://SD_ILS/0/SD_ILS:3214622024-05-26T23:38:46Z2024-05-26T23:38:46Zby Mohd. Aizaini Maarof<br/>Author Mohd. Aizaini Maarof, Pathmenanthan Ramakrishna, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number TK5105.59 M346 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>