Search Results for Computers -- Access control - Narrowed by: Computers -- Access controlSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dComputers$002b--$002bAccess$002bcontrol$0026qf$003dSUBJECT$002509Subject$002509Computers$002b--$002bAccess$002bcontrol$002509Computers$002b--$002bAccess$002bcontrol$0026ps$003d300$0026isd$003dtrue?dt=list2024-04-30T23:51:50ZAdvances in computer system securityent://SD_ILS/0/SD_ILS:1729312024-04-30T23:51:50Z2024-04-30T23:51:50Zby Turn, Rein,. 1931-<br/>Author Turn, Rein,. 1931-<br/>Format: Books<br/>Call Number QA76.9.A25 A38 1981-1988<br/>Publisher Artech House,<br/>Publication Date 2020 2019 2018 2017 2016<br/>ISBN 9780890061541 9780890060964<br/>Acceptance towards using mobile phone number as single sign on identityent://SD_ILS/0/SD_ILS:8593532024-04-30T23:51:50Z2024-04-30T23:51:50Zby Sharifah Zabedah Ainon Azim, 1982-, author<br/>Author Sharifah Zabedah Ainon Azim, 1982-, author, Wardah Zainal Abidin, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 S538 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>Information security : principles and new conceptsent://SD_ILS/0/SD_ILS:8370582024-04-30T23:51:50Z2024-04-30T23:51:50Zby Hobbs, Fiona, editor<br/>Author Hobbs, Fiona, editor<br/>Format: Books<br/>Call Number QA76.9.A25 I549 2015 f v.1<br/>Publisher Clanrye Intl.,<br/>Publication Date 2015<br/>ISBN 9781632403063 9781632403070 9781632403087 9781632403094<br/>Acceptance towards using mobile phone number as single sign on identityent://SD_ILS/0/SD_ILS:8596382024-04-30T23:51:50Z2024-04-30T23:51:50Zby Sharifah Zabedah Ainon Azim, 1982-, author<br/>Author Sharifah Zabedah Ainon Azim, 1982-, author, Wardah Zainal Abidin, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034744 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>Enhancing password storage securityent://SD_ILS/0/SD_ILS:8603072024-04-30T23:51:50Z2024-04-30T23:51:50Zby Yeoh, Soon Yau, 1991-, author<br/>Author Yeoh, Soon Yau, 1991-, author, Mazleena Salleh, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 Y46 2015 raf<br/>Publication Date 2015<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Enhancing password storage securityent://SD_ILS/0/SD_ILS:8603372024-04-30T23:51:50Z2024-04-30T23:51:50Zby Yeoh, Soon Yau, 1991-, author<br/>Author Yeoh, Soon Yau, 1991-, author, Mazleena Salleh, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number CP 061137 ra<br/>Publication Date 2015<br/>Project Paper (Sarjana Muda Sains Komputer (Rangkaian dan Keselamatan Komputer)) - Universiti Teknologi Malaysia, 2015<br/>Access control, authentication, and public key infrastructureent://SD_ILS/0/SD_ILS:8329842024-04-30T23:51:50Z2024-04-30T23:51:50Zby Chapple, Mike, author<br/>Author Chapple, Mike, author<br/>Format: Books<br/>Call Number TK5105.59 A234 2014<br/>Edition 2nd ed.<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2014<br/>ISBN 9781284031591<br/>The Intrusion detection networks : a key to collaborative securityent://SD_ILS/0/SD_ILS:8372902024-04-30T23:51:50Z2024-04-30T23:51:50Zby Fung, Carol author<br/>Author Fung, Carol author, Boutaba, Raouf<br/>Format: Books<br/>Call Number QA76.9 A25 F85 2014<br/>Publisher Auerbach Pub.,<br/>Publication Date 2014<br/>ISBN 9781466564121<br/>Flat role based access control and encryption scheme for database securityent://SD_ILS/0/SD_ILS:8034762024-04-30T23:51:50Z2024-04-30T23:51:50Zby Al Farissi, 1985-<br/>Author Al Farissi, 1985-<br/>Format: Books<br/>Call Number CP 032498 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Enhancing time-stamping techniqe by implementing media access control addressent://SD_ILS/0/SD_ILS:8037832024-04-30T23:51:50Z2024-04-30T23:51:50Zby Pacu Putra Suarli, 1989-<br/>Author Pacu Putra Suarli, 1989-, Mazleena Salleh, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 P33 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Enhancing time-stamping techniqe by implementing media access control addressent://SD_ILS/0/SD_ILS:8040882024-04-30T23:51:50Z2024-04-30T23:51:50Zby Pacu Putra Suarli, 1989-<br/>Author Pacu Putra Suarli, 1989-<br/>Format: Books<br/>Call Number CP 030214 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat))) - Universiti Teknologi Malaysia, 2013<br/>Flat role based access control and encryption scheme for database securityent://SD_ILS/0/SD_ILS:8034752024-04-30T23:51:50Z2024-04-30T23:51:50Zby Al Farissi, 1985-<br/>Author Al Farissi, 1985-, Subariah Ibrahim, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.D314 A44 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>FSKSM UTM information security governance frameworkent://SD_ILS/0/SD_ILS:7931432024-04-30T23:51:50Z2024-04-30T23:51:50Zby Amir Haziq Loh Bojeng, 1986-<br/>Author Amir Haziq Loh Bojeng, 1986-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 A457 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Role mining in business : taming role-based access control administrationent://SD_ILS/0/SD_ILS:8083182024-04-30T23:51:50Z2024-04-30T23:51:50Zby Colantonio, Alessandro<br/>Author Colantonio, Alessandro, Di Pietro, Roberto, Ocello, Alberto<br/>Format: Books<br/>Call Number QA76.9.A25 C657 2012<br/>Publisher World Scientific,<br/>Publication Date 2012<br/>ISBN 9789814374002<br/>Human factor computer security awareness conceptual frameworkent://SD_ILS/0/SD_ILS:7782652024-04-30T23:51:50Z2024-04-30T23:51:50Zby Nasrin Badie, 1982-<br/>Author Nasrin Badie, 1982-<br/>Format: Books<br/>Call Number CP 027518 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Encryption implementation enhancement of AES-CCMP in 802.11Ient://SD_ILS/0/SD_ILS:7784012024-04-30T23:51:50Z2024-04-30T23:51:50Zby Iman Saberi, 1984-<br/>Author Iman Saberi, 1984-, Mazleena Salleh, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 I434 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Encryption implementation enhancement of AES-CCMP in 802.11Ient://SD_ILS/0/SD_ILS:7784052024-04-30T23:51:50Z2024-04-30T23:51:50Zby Iman Saberi, 1984-<br/>Author Iman Saberi, 1984-<br/>Format: Books<br/>Call Number CP 027521 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>A study and development of graphical user authentication for web based applicationent://SD_ILS/0/SD_ILS:7864962024-04-30T23:51:50Z2024-04-30T23:51:50Zby Mohd. Zamri Osman, 1987-<br/>Author Mohd. Zamri Osman, 1987-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M644 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>A study and development of graphical user authentication for web based applicationent://SD_ILS/0/SD_ILS:7864982024-04-30T23:51:50Z2024-04-30T23:51:50Zby Mohd. Zamri Osman, 1987-<br/>Author Mohd. Zamri Osman, 1987-<br/>Format: Books<br/>Call Number CP 027919 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Human factor computer security awareness conceptual frameworkent://SD_ILS/0/SD_ILS:7782632024-04-30T23:51:50Z2024-04-30T23:51:50Zby Nasrin Badie, 1982-<br/>Author Nasrin Badie, 1982-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A28 N37 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>FSKSM UTM information security governance frameworkent://SD_ILS/0/SD_ILS:7931442024-04-30T23:51:50Z2024-04-30T23:51:50Zby Amir Haziq Loh Bojeng, 1986-<br/>Author Amir Haziq Loh Bojeng, 1986-<br/>Format: Books<br/>Call Number CP 028362 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Design a framework for a security information and events management (SIEM) programsent://SD_ILS/0/SD_ILS:8365182024-04-30T23:51:50Z2024-04-30T23:51:50Zby Khalid Mohamed Mirghani, 1974-<br/>Author Khalid Mohamed Mirghani, 1974-, Bharanidharan Shanmugam, Dr., Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number TK5105.59 K43 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Design a framework for a security information and events management (SIEM) programsent://SD_ILS/0/SD_ILS:8365192024-04-30T23:51:50Z2024-04-30T23:51:50Zby Khalid Mohamed Mirghani, 1974-<br/>Author Khalid Mohamed Mirghani, 1974-, Bharanidharan Shanmugam, Dr., Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034114 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2012<br/>Managed code rootkits : hooking into runtime environmentsent://SD_ILS/0/SD_ILS:7587782024-04-30T23:51:50Z2024-04-30T23:51:50Zby Metula, Erez<br/>Author Metula, Erez<br/>Format: Books<br/>Call Number QA76.9.A25 M487 2011<br/>Publisher Syngress,<br/>Publication Date 2011<br/>ISBN 9781597495745<br/>Access control, security, and trust : a logical approachent://SD_ILS/0/SD_ILS:7594052024-04-30T23:51:50Z2024-04-30T23:51:50Zby Chin, Shiu-Kai<br/>Author Chin, Shiu-Kai, Older, Susan Beth<br/>Format: Books<br/>Call Number QA76.9.A25 C45 2011<br/>Publisher Chapman & Hall/CRC,<br/>Publication Date 2011<br/>ISBN 9781584888628<br/>Relation based access controlent://SD_ILS/0/SD_ILS:6378232024-04-30T23:51:50Z2024-04-30T23:51:50Zby Zhang, Rui<br/>Author Zhang, Rui<br/>Format: Books<br/>Call Number QA76.9.A25 Z43 2010<br/>Publisher IOS Pr.,<br/>Publication Date 2010<br/>ISBN 9783898386265<br/>Designing an IAM framework with Oracle identity and access management suiteent://SD_ILS/0/SD_ILS:8507512024-04-30T23:51:50Z2024-04-30T23:51:50Zby Scheidel, Jeff, author<br/>Author Scheidel, Jeff, author<br/>Format: Books<br/>Call Number QA76.9.A25 S337 2010<br/>Publisher Oracle/McGraw-Hill,<br/>Publication Date 2010<br/>ISBN 9780071741378<br/>Cryptography technique in securing the e-passport authentication systement://SD_ILS/0/SD_ILS:6035442024-04-30T23:51:50Z2024-04-30T23:51:50Zby Tham, Yuew Chyi, 1986-<br/>Author Tham, Yuew Chyi, 1986-<br/>Format: Computer file<br/>Call Number CP 026313 ra<br/>Publication Date 2009<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2009<br/>Expert SQL server 2008 encryptionent://SD_ILS/0/SD_ILS:6407182024-04-30T23:51:50Z2024-04-30T23:51:50Zby Coles, Michael, 1972-<br/>Author Coles, Michael, 1972-, Landrum, Rodney<br/>Format: Books<br/>Call Number QA76.9.A25 C653 2009<br/>Publisher Apress,<br/>Publication Date 2009<br/>ISBN 9781430224648 9781430224655<br/>Cryptography technique in securing the e-passport authentication systement://SD_ILS/0/SD_ILS:3699632024-04-30T23:51:50Z2024-04-30T23:51:50Zby Tham, Yuew Chyi, 1986-<br/>Author Tham, Yuew Chyi, 1986-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 T43 2009 raf<br/>Publication Date 2009<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2009<br/>Access denied : the practice and policy of global Internet filteringent://SD_ILS/0/SD_ILS:3622982024-04-30T23:51:50Z2024-04-30T23:51:50Zby Deibert, Ronald J.<br/>Author Deibert, Ronald J.<br/>Format: Books<br/>Call Number QA76.9.A25 A22 2008<br/>Publisher MIT Press,<br/>Publication Date 2008<br/>ISBN 9780262541961<br/>Network security : private communications in a public worldent://SD_ILS/0/SD_ILS:3288602024-04-30T23:51:50Z2024-04-30T23:51:50Zby Kaufman, Charlie<br/>Author Kaufman, Charlie, Perlman, Radia, Speciner, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 K34 2008<br/>Edition 2nd ed.<br/>Publisher Prentice Hall of India,<br/>Publication Date 2008<br/>ISBN 9788120322134<br/>Oracle identity management : governance, risk, and compliance architectureent://SD_ILS/0/SD_ILS:3347672024-04-30T23:51:50Z2024-04-30T23:51:50Zby Pohlman, Marlin B.<br/>Author Pohlman, Marlin B.<br/>Format: Books<br/>Call Number QA76.9.A25 P63 2008<br/>Publisher Auerbach Publications,<br/>Publication Date 2008<br/>ISBN 9781420072471<br/>Role-based access controlent://SD_ILS/0/SD_ILS:2096172024-04-30T23:51:50Z2024-04-30T23:51:50Zby Ferraiolo, David F.<br/>Author Ferraiolo, David F., Kuhn, D. Richard, Chandramouli, Ramaswamy<br/>Format: Books<br/>Call Number QA76.9.A25 F47 2007<br/>Edition 2nd ed.<br/>Publisher Artech House,<br/>Publication Date 2007<br/>ISBN 9781596931138<br/>Journal of computer securityent://SD_ILS/0/SD_ILS:1555682024-04-30T23:51:50Z2024-04-30T23:51:50ZFormat: Books<br/>Call Number QA76.9.A25 J68 2007<br/>Publisher IOS Press,<br/>Publication Date 2007<br/>ISSN 0926227X<br/><a href="http://search.ebscohost.com/login.aspx?direct=true&db=a3h&jid=LCY&site=ehost-live">Online via EBSCOhost</a><br/>Accessible within UTM campus<br/>IT security governance guidebook with security program metrics on CD-ROMent://SD_ILS/0/SD_ILS:1566612024-04-30T23:51:50Z2024-04-30T23:51:50Zby Cohen, Fred, 1956-<br/>Author Cohen, Fred, 1956-<br/>Format: Books<br/>Call Number TK5105.59 C63 2007<br/>Publisher Auerbach Publications,<br/>Publication Date 2007<br/>ISBN 9780849384356<br/>Integrated security systems design : concepts, specifications, and implementationent://SD_ILS/0/SD_ILS:1610252024-04-30T23:51:50Z2024-04-30T23:51:50Zby Norman, Thomas<br/>Author Norman, Thomas<br/>Format: Books<br/>Call Number TK5105.59 N674 2007<br/>Publisher Elsevier Butterworth-Heinemann,<br/>Publication Date 2007<br/>ISBN 9780750679091<br/>Network security architecture design for Malaysian maritime enforcement agencyent://SD_ILS/0/SD_ILS:1553732024-04-30T23:51:50Z2024-04-30T23:51:50Zby Mahathir Abdul Hamid<br/>Author Mahathir Abdul Hamid, Shamsul Sahibuddin, supervisor<br/>Format: Books<br/>Call Number QA76.9.A25 M35 2007 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2007<br/>IT security governance guidebook with security program metrics on CD-ROMent://SD_ILS/0/SD_ILS:5702202024-04-30T23:51:50Z2024-04-30T23:51:50Zby Cohen, Fred, 1956-<br/>Author Cohen, Fred, 1956-<br/>Format: Computer file<br/>Call Number CP 8941<br/>Publisher Auerbach Publications,<br/>Publication Date 2007<br/>ISBN 9780849384356<br/>Snort : IDS and IPS toolkitent://SD_ILS/0/SD_ILS:5780422024-04-30T23:51:50Z2024-04-30T23:51:50Zby Beale, Jay<br/>Author Beale, Jay, Baker, Andrew R., Esler, Joel<br/>Format: Computer file<br/>Call Number CP 7232<br/>Publisher Syngress Publishing,<br/>Publication Date 2007<br/>ISBN 9781597490993<br/>Network security architecture design for Malaysian maritime enforcement agencyent://SD_ILS/0/SD_ILS:5680862024-04-30T23:51:50Z2024-04-30T23:51:50Zby Mahathir Abdul Hamid<br/>Author Mahathir Abdul Hamid, Shamsul Sahibuddin, supervisor<br/>Format: Computer file<br/>Call Number CP 015120<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2007<br/>Restricted<br/>Mechanics of user identification and authentication : fundamentals of identity managementent://SD_ILS/0/SD_ILS:2480742024-04-30T23:51:50Z2024-04-30T23:51:50Zby Todorov, Dobromir<br/>Author Todorov, Dobromir<br/>Format: Books<br/>Call Number TK5105.59 T62 2007<br/>Publisher Auerbach Publications,<br/>Publication Date 2007<br/>ISBN 9781420052190<br/>Cryptography and security services : mechanisms and applicationsent://SD_ILS/0/SD_ILS:2853262024-04-30T23:51:50Z2024-04-30T23:51:50Zby Mogollon, Manuel<br/>Author Mogollon, Manuel<br/>Format: Books<br/>Call Number QA76.9.A25 M634 2007<br/>Publisher CyberTech Publishing,<br/>Publication Date 2007<br/>ISBN 9781599048376<br/>Professional rootkitsent://SD_ILS/0/SD_ILS:2723272024-04-30T23:51:50Z2024-04-30T23:51:50Zby Vieler, Ric<br/>Author Vieler, Ric<br/>Format: Books<br/>Call Number QA76.9.A25 V56 2007<br/>Publisher Wiley Publishing,<br/>Publication Date 2007 2004<br/>ISBN 9780470101544<br/>Computer system security : basic concepts and solved exercisesent://SD_ILS/0/SD_ILS:3283722024-04-30T23:51:50Z2024-04-30T23:51:50Zby Avoine, Gildas<br/>Author Avoine, Gildas, Junod, Pascal, Oechslin, Philippe<br/>Format: Books<br/>Call Number QA76.9.A25 A96 2004<br/>Publisher EFPL Press,<br/>Publication Date 2007<br/>ISBN 9781420046205<br/>Linux firewalls : attack detection and response with iptables, psad, and fwsnortent://SD_ILS/0/SD_ILS:3330412024-04-30T23:51:50Z2024-04-30T23:51:50Zby Rash, Michael<br/>Author Rash, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 R36 2007<br/>Publisher No Starch Press,<br/>Publication Date 2007<br/>ISBN 9781593271411<br/>Critical information infrastructures : resilience and protectionent://SD_ILS/0/SD_ILS:2544812024-04-30T23:51:50Z2024-04-30T23:51:50Zby Hyslop, Maitland<br/>Author Hyslop, Maitland<br/>Format: Books<br/>Call Number QA76.9.A25 H97 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9780387718613<br/><a href="http://dx.doi.org/10.1007/978-0-387-71862-0">Fulltext</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Privacy-respecting intrusion detectionent://SD_ILS/0/SD_ILS:2716382024-04-30T23:51:50Z2024-04-30T23:51:50Zby Flegel, Ulrich<br/>Author Flegel, Ulrich<br/>Format: Books<br/>Call Number QA76.9.A25 F53 2007<br/>Publisher Springer-Verlag,<br/>Publication Date 2007<br/>ISBN 9780387343464<br/>Enhancement of snort intrusion detection systement://SD_ILS/0/SD_ILS:1118882024-04-30T23:51:50Z2024-04-30T23:51:50Zby Rabia Bakhteri Jahangir Bakhteri<br/>Author Rabia Bakhteri Jahangir Bakhteri<br/>Format: Books<br/>Call Number TK5105.59 R32 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Project Paper (Sarjana Muda Kejuruteraan (Komputer)) - Universiti Teknologi Malaysia, 2006<br/>Cryptography and its applicationent://SD_ILS/0/SD_ILS:102992024-04-30T23:51:50Z2024-04-30T23:51:50Zby Chong, Sook Leng<br/>Author Chong, Sook Leng<br/>Format: Visual Materials<br/>Call Number MFL 13793<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Project Paper (Sarjana Muda Sains (Mathematik)) - Universiti Teknologi Malaysia, 2006<br/>Multivariate public key cryptosystemsent://SD_ILS/0/SD_ILS:1581642024-04-30T23:51:50Z2024-04-30T23:51:50Zby Ding, Jintai<br/>Author Ding, Jintai, Gower, Jason E., Schmidt, Dieter S.<br/>Format: Books<br/>Call Number QA76.9.A25 D56 2006<br/>Publisher Springer-Verlag,<br/>Publication Date 2006<br/>ISBN 9780387322292<br/>Development of an online signature verification software using support vector machinesent://SD_ILS/0/SD_ILS:1209462024-04-30T23:51:50Z2024-04-30T23:51:50Zby Leong, Hui Yee<br/>Author Leong, Hui Yee<br/>Format: Books<br/>Call Number QA76.9.A25 L46 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Mekatronik)) - Universiti Teknologi Malaysia, 2006<br/>Developing information security policy : case study of Biruni Remote Sensing Center (BRSC)ent://SD_ILS/0/SD_ILS:1316702024-04-30T23:51:50Z2024-04-30T23:51:50Zby Mohamed. K. Bayoud<br/>Author Mohamed. K. Bayoud<br/>Format: Books<br/>Call Number QA76.9.A25 M525 2006 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Thesis (Sarjana Sains Komputer - Keselamatan Maklumat)) - Fakulti Sains Komputer dan Sistem Maklumat, Universiti Teknologi Malaysia, 2006<br/>An XML-based model for integrating and managing label-based access control of heterogeneous legacy databasesent://SD_ILS/0/SD_ILS:6172062024-04-30T23:51:50Z2024-04-30T23:51:50Zby Awad Mohed Awadelkarim<br/>Author Awad Mohed Awadelkarim<br/>Format: Computer file<br/>Call Number CP 4586<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Tesis (Doctor of Philosophy) - Universiti Teknologi Malaysia, 2006<br/>Cryptography and its applicationent://SD_ILS/0/SD_ILS:6189992024-04-30T23:51:50Z2024-04-30T23:51:50Zby Chong, Sook Leng<br/>Author Chong, Sook Leng<br/>Format: Computer file<br/>Call Number CP 4596<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Project Paper (Sarjana Muda Sains (Matematik)) - Universiti Teknologi Malaysia, 2006<br/>An XML-based model for integrating and managing label-based access control of heterogeneous legacy databasesent://SD_ILS/0/SD_ILS:7848312024-04-30T23:51:50Z2024-04-30T23:51:50Zby Awad Mohed Awadelkarim<br/>Author Awad Mohed Awadelkarim, Sekolah Pengajian Siswazah<br/>Format: Visual Materials<br/>Call Number MFL 14301 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Tesis (Doctor of Philosophy) - Universiti Teknologi Malaysia, 2006<br/>An XML-based model for integrating and managing label-based access control of heterogeneous legacy databasesent://SD_ILS/0/SD_ILS:4685992024-04-30T23:51:50Z2024-04-30T23:51:50Zby Awad Mohed Awadelkarim<br/>Author Awad Mohed Awadelkarim<br/>Format: Books<br/>Call Number QA76.9.A25 A82 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Thesis (Doctor of Philosophy) - Universiti Teknologi Malaysia, 2006<br/>Cryptography and its applicationent://SD_ILS/0/SD_ILS:4777142024-04-30T23:51:50Z2024-04-30T23:51:50Zby Chong, Sook Leng<br/>Author Chong, Sook Leng<br/>Format: Books<br/>Call Number Z103 C46 2006 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Project Paper (Sarjana Muda Sains (Mathematik)) - Universiti Teknologi Malaysia, 2006<br/>Linux firewallsent://SD_ILS/0/SD_ILS:1429062024-04-30T23:51:50Z2024-04-30T23:51:50Zby Suehring, Steve<br/>Author Suehring, Steve, Ziegler, Robert L. (Robert Loren), 1954-<br/>Format: Books<br/>Call Number QA76.9.A25 Z54 2006<br/>Edition 3rd ed.<br/>Publisher Novell Pr.,<br/>Publication Date 2006 2005<br/>ISBN 9780672327711<br/>Global monitoring : the challenges of access to dataent://SD_ILS/0/SD_ILS:1546572024-04-30T23:51:50Z2024-04-30T23:51:50Zby Harris, Ray<br/>Author Harris, Ray, Browning, Richard<br/>Format: Books<br/>Call Number TD193 H37 2005<br/>Publisher UCL Press,<br/>Publication Date 2005<br/>ISBN 9781844720248<br/>Cisco security agentent://SD_ILS/0/SD_ILS:4442292024-04-30T23:51:50Z2024-04-30T23:51:50Zby Sullivan, Chad<br/>Author Sullivan, Chad<br/>Format: Books<br/>Call Number TK5105.59 S84 2005<br/>Publisher Cisco Press,<br/>Publication Date 2005<br/>ISBN 9781587052057<br/>Online certificate injection systement://SD_ILS/0/SD_ILS:8407492024-04-30T23:51:50Z2024-04-30T23:51:50Zby Mohd. Nor Haizam Samsun Baharun, author<br/>Author Mohd. Nor Haizam Samsun Baharun, author, Othman Yusop, supervisor, Soo, Lester Ngai Kwong, supervisor, Faculty of Advanced Informatics School<br/>Format: Books<br/>Call Number TK5105.59 M644 2005 raf<br/>Publication Date 2005<br/>Thesis (Sarjana Sains (Sains Komputer - Real Time Software Engineering)) - Universiti Teknologi Malaysia, 2005<br/>Online certificate injection systement://SD_ILS/0/SD_ILS:8407502024-04-30T23:51:50Z2024-04-30T23:51:50Zby Mohd. Nor Haizam Samsun Baharun, author<br/>Author Mohd. Nor Haizam Samsun Baharun, author<br/>Format: Books<br/>Call Number CP 033963 ra<br/>Publication Date 2005<br/>Thesis (Sarjana Sains (Sains Komputer - Real Time Software Engineering)) - Universiti Teknologi Malaysia, 2005<br/>Modern cryptography : theory and practiceent://SD_ILS/0/SD_ILS:1563142024-04-30T23:51:50Z2024-04-30T23:51:50Zby Mao, Wenbo<br/>Author Mao, Wenbo<br/>Format: Books<br/>Call Number QA76.9.A25 M36 2004<br/>Publisher Prentice Hall,<br/>Publication Date 2004<br/>ISBN 9780130669438<br/>Analisa tindak balas aktif bagi simulasi serangan teragih secara selari ke atas hos IRSent://SD_ILS/0/SD_ILS:3669592024-04-30T23:51:50Z2024-04-30T23:51:50Zby Wahidah Md. Shah<br/>Author Wahidah Md. Shah<br/>Format: Books<br/>Call Number TK5105.59 W33 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Tesis (Sarjana Sains (Komputer)) - Universiti Teknologi Malaysia, 2004<br/>Analisa tindak balas aktif bagi simulasi serangan teragih secara selari ke atas hos IRSent://SD_ILS/0/SD_ILS:5997712024-04-30T23:51:50Z2024-04-30T23:51:50Zby Wahidah Md. Shah<br/>Author Wahidah Md. Shah<br/>Format: Computer file<br/>Call Number CP 8886<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Tesis (Sarjana Sains (Komputer)) - Universiti Teknologi Malaysia, 2004<br/>Snort for dummiesent://SD_ILS/0/SD_ILS:6057412024-04-30T23:51:50Z2024-04-30T23:51:50Zby Scott, Charline<br/>Author Scott, Charline, Wolfe, Paul, Hayes, Bert<br/>Format: Computer file<br/>Call Number CP 5376<br/>Publisher Wiley,<br/>Publication Date 2004<br/>ISBN 9780764568350<br/>Snort for dummiesent://SD_ILS/0/SD_ILS:3946162024-04-30T23:51:50Z2024-04-30T23:51:50Zby Scott, Charline<br/>Author Scott, Charline, Wolfe, Paul, Hayes, Bert<br/>Format: Books<br/>Call Number TK5105.59 S36 2004<br/>Publisher Wiley,<br/>Publication Date 2004<br/>ISBN 9780764568350<br/>Detecting outlier on intrusion detection system using data set of system callsent://SD_ILS/0/SD_ILS:3965472024-04-30T23:51:50Z2024-04-30T23:51:50Zby Dahliyusmanto Dahlan<br/>Author Dahliyusmanto Dahlan, Abdul Hanan Abdullah, International Conference on Information and Computer Science (2004 : Dhahran, Saudi Arabia)<br/>Format: Books<br/>Call Number QA76.9.A25 D335 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Public key crypto hardware for real-time security applicationent://SD_ILS/0/SD_ILS:4001652024-04-30T23:51:50Z2024-04-30T23:51:50Zby Mohamed Khalil Mohd. Hani<br/>Author Mohamed Khalil Mohd. Hani, Hau, Yuan Wen, 1980-, Lim, Kie Woon, National Real-Time Technology and Applications Symposium (2nd : 2004 Serdang, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 M54 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Sistem penilaian permarkahan latihan praktik (FSKSM) secara atas talianent://SD_ILS/0/SD_ILS:70712024-04-30T23:51:50Z2024-04-30T23:51:50Zby Farrah Maslina Umar<br/>Author Farrah Maslina Umar<br/>Format: Visual Materials<br/>Call Number MFL 12994<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/>Ke arah pengurangan jurang masa sistem penindakbalasan pencerobohan melalui penggunaan pendekatan penjejakan pencerobohan pantasent://SD_ILS/0/SD_ILS:3536272024-04-30T23:51:50Z2024-04-30T23:51:50Zby Mohd. Nizam Omar<br/>Author Mohd. Nizam Omar, Mohd. Aizaini Maarof, Subariah Ibrahim, Persidangan Sempena Pameran Penyelidikan dan Pembangunan IPTA (2003 : Kuala Lumpur )<br/>Format: Books<br/>Call Number TK5105.59 M54 2003<br/>Publication Date 2003<br/>Perisian keselamatan data menggunakan gabungan teknik penyulitan data dan teknik pemampatan dataent://SD_ILS/0/SD_ILS:3623822024-04-30T23:51:50Z2024-04-30T23:51:50Zby Norfadzila Mohd. Yusof<br/>Author Norfadzila Mohd. Yusof<br/>Format: Books<br/>Call Number QA76.9.A25 N674 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=57193">Full text</a><br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/>Counting the number of system calls to detect intrusion using discriminant analysisent://SD_ILS/0/SD_ILS:3866162024-04-30T23:51:50Z2024-04-30T23:51:50Zby Dahliyusmanto Dahlan<br/>Author Dahliyusmanto Dahlan, Abdul Hanan Abdullah, Seminar Quality in Research (2003 : Indonesia)<br/>Format: Books<br/>Call Number QA76.9.A25 D334 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Perisian keselamatan data menggunakan gabungan teknik penyulitan data dan teknik pemampatan dataent://SD_ILS/0/SD_ILS:5999532024-04-30T23:51:50Z2024-04-30T23:51:50Zby Norfadzila Mohd. Yusof<br/>Author Norfadzila Mohd. Yusof<br/>Format: Computer file<br/>Call Number CP 5544<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/>A methodology to detect intrusion using system call base on discriminant analysisent://SD_ILS/0/SD_ILS:3534312024-04-30T23:51:50Z2024-04-30T23:51:50Zby Dahliyusmanto Dahlan<br/>Author Dahliyusmanto Dahlan, Abdul Hanan Abdullah, International Symposium on Information Technology (2003 : Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.9.A25 D33 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Role-based access controlent://SD_ILS/0/SD_ILS:3401532024-04-30T23:51:50Z2024-04-30T23:51:50Zby Ferraiolo, David F.<br/>Author Ferraiolo, David F., Kuhn, D. Richard, Chandramouli, Ramaswamy<br/>Format: Books<br/>Call Number QA76.9.A25 F47 2003<br/>Publisher Artech House,<br/>Publication Date 2003<br/>ISBN 9781580533706<br/>Red hat linux firewallsent://SD_ILS/0/SD_ILS:3273022024-04-30T23:51:50Z2024-04-30T23:51:50Zby McCarty, Bill<br/>Author McCarty, Bill<br/>Format: Books<br/>Call Number QA76.9.A25 M42 2003<br/>Publisher Wiley Pubs,<br/>Publication Date 2003<br/>ISBN 9780764524639<br/>Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohanent://SD_ILS/0/SD_ILS:111802024-04-30T23:51:50Z2024-04-30T23:51:50Zby Ali Yusny Daud<br/>Author Ali Yusny Daud<br/>Format: Visual Materials<br/>Call Number MFL 13917<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/>Linux firewallsent://SD_ILS/0/SD_ILS:3824282024-04-30T23:51:50Z2024-04-30T23:51:50Zby Ziegler, Robert<br/>Author Ziegler, Robert, Constantine, Carl B.<br/>Format: Books<br/>Call Number QA76.9.A25 Z54 2002<br/>Edition 2nd ed.<br/>Publisher New Riders,<br/>Publication Date 2002<br/>ISBN 9780735710993<br/>Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohanent://SD_ILS/0/SD_ILS:6010022024-04-30T23:51:50Z2024-04-30T23:51:50Zby Ali Yusny Daud<br/>Author Ali Yusny Daud<br/>Format: Computer file<br/>Call Number CP 8375<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/>Network security : private communication in a public worldent://SD_ILS/0/SD_ILS:3913992024-04-30T23:51:50Z2024-04-30T23:51:50Zby Kaufman, Charlie<br/>Author Kaufman, Charlie, Perlman, Radia, Speciner, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 K34 2002<br/>Edition 2nd ed.<br/>Publisher Prentice Hall PTR,<br/>Publication Date 2002<br/>ISBN 9780130460196<br/>Database encrytion schemes : a comparative studyent://SD_ILS/0/SD_ILS:3515112024-04-30T23:51:50Z2024-04-30T23:51:50Zby Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author Zailani Mohamed Sidek, Assoc.Prof.Dr., Norbik Bashah Idris, Harihodin Selamat, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.9.A25 Z34 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohanent://SD_ILS/0/SD_ILS:3711612024-04-30T23:51:50Z2024-04-30T23:51:50Zby Ali Yusny Daud<br/>Author Ali Yusny Daud<br/>Format: Books<br/>Call Number TK5105.59 A44 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=51186">Preview</a><br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/>Auditors' introduction to crytography and its application in database securityent://SD_ILS/0/SD_ILS:3458482024-04-30T23:51:50Z2024-04-30T23:51:50Zby Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author Zailani Mohamed Sidek, Assoc.Prof.Dr., Norbik Bashah Idris, Harihodin Selamat, International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format: Books<br/>Call Number QA76.9.D314 Z34 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>A novel key recovery scheme implemented in public key infrastructureent://SD_ILS/0/SD_ILS:3162052024-04-30T23:51:50Z2024-04-30T23:51:50Zby Teoh, Su Chi<br/>Author Teoh, Su Chi, Norbik Bashah Idris, World Engineering Congress (2nd : 2002 : Sarawak, Malaysia)<br/>Format: Books<br/>Call Number QA76.9.A25 T48 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Detection & prevention of DoS attacks using intrusion detection system : design & developmentent://SD_ILS/0/SD_ILS:3224812024-04-30T23:51:50Z2024-04-30T23:51:50Zby Pathmenanthan Ramakrishna<br/>Author Pathmenanthan Ramakrishna, Mohd. Aizaini Maarof, Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format: Books<br/>Call Number TK5105.59 P376 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>DoS attacks detection using intrusion detection system and system callsent://SD_ILS/0/SD_ILS:3214622024-04-30T23:51:50Z2024-04-30T23:51:50Zby Mohd. Aizaini Maarof<br/>Author Mohd. Aizaini Maarof, Pathmenanthan Ramakrishna, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number TK5105.59 M346 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Internet and intranet securityent://SD_ILS/0/SD_ILS:3032032024-04-30T23:51:50Z2024-04-30T23:51:50Zby Oppliger, Rolf<br/>Author Oppliger, Rolf<br/>Format: Books<br/>Call Number TK5105.875.I57 O67 2002<br/>Edition 2nd ed.<br/>Publisher Artech House,<br/>Publication Date 2002<br/>ISBN 9781580531665<br/>Capaian alatan yang selamat dalam pembelajaran kolaboratif = Secure tools access in collaborative learningent://SD_ILS/0/SD_ILS:209352024-04-30T23:51:50Z2024-04-30T23:51:50Zby Faaz Anwar Asan<br/>Author Faaz Anwar Asan<br/>Format: Visual Materials<br/>Call Number MFL 12189<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Sistem kawalan capaian groupware menggunakan skima perkongsian rahsia shamirent://SD_ILS/0/SD_ILS:210752024-04-30T23:51:50Z2024-04-30T23:51:50Zby Azhar Ali<br/>Author Azhar Ali<br/>Format: Visual Materials<br/>Call Number MFL 12075<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Sistem kawalan capaian groupware menggunakan skima perkongsian rahsia shamirent://SD_ILS/0/SD_ILS:3013942024-04-30T23:51:50Z2024-04-30T23:51:50Zby Azhar Ali<br/>Author Azhar Ali<br/>Format: Books<br/>Call Number QA76.9.A25 A83 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Prototaip sistem pengesahan pengguna dengan algoritma RSA untuk persekitaran aplikasi pelayan pelanggan menggunakan kad pintarent://SD_ILS/0/SD_ILS:3014272024-04-30T23:51:50Z2024-04-30T23:51:50Zby Akash Rosen Ram Kalaish<br/>Author Akash Rosen Ram Kalaish<br/>Format: Books<br/>Call Number QA76.9.A25 A42 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Capaian alatan yang selamat dalam pembelajaran kolaboratif = Secure tools access in collaborative learningent://SD_ILS/0/SD_ILS:3019972024-04-30T23:51:50Z2024-04-30T23:51:50Zby Faaz Anwar Asan<br/>Author Faaz Anwar Asan<br/>Format: Books<br/>Call Number QA76.9.A25 F33 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Rijndael : comparison with other symmetric-key ciphersent://SD_ILS/0/SD_ILS:3016312024-04-30T23:51:50Z2024-04-30T23:51:50Zby Mazleena Salleh<br/>Author Mazleena Salleh, Subariah Ibrahim, International Conference on Information Technology and Multimedia (2001 : UNITEN, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 R54 2001<br/>Publisher UNITEN,<br/>Publication Date 2001<br/>Sistem keselamatan kata laluan untuk aplikasi pengurusan data di Jabatan Pendidikan Agama Negeri Johor menggunakan teknik pengesahan fungsi cincanganent://SD_ILS/0/SD_ILS:3019082024-04-30T23:51:50Z2024-04-30T23:51:50Zby Masni Othman<br/>Author Masni Othman<br/>Format: Books<br/>Call Number QA76.9.A25 M37 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Development, analysis and comparison of connectionist models for real time optimisationent://SD_ILS/0/SD_ILS:202492024-04-30T23:51:50Z2024-04-30T23:51:50Zby Khairiyah Mohd. Yusof, 1965-<br/>Author Khairiyah Mohd. Yusof, 1965-<br/>Format: Visual Materials<br/>Call Number MFL 11900<br/>Publisher University of Waterloo,<br/>Publication Date 2001<br/>Thesis (Doctor of Philosophy) - University of Waterloo, 2001<br/>Prototaip sistem pengesahan pengguna dengan algoritma RSA untuk persekitaran aplikasi pelayan pelanggan menggunakan kad pintarent://SD_ILS/0/SD_ILS:209282024-04-30T23:51:50Z2024-04-30T23:51:50Zby Akash Rosen Ram Kalaish<br/>Author Akash Rosen Ram Kalaish<br/>Format: Visual Materials<br/>Call Number MFL 12118<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Pengimplementasian teknik cincangan dan penyulitan data dalam sistem pembayaran bil Maxis Mobile di internetent://SD_ILS/0/SD_ILS:209292024-04-30T23:51:50Z2024-04-30T23:51:50Zby Izatul Farita Yusof<br/>Author Izatul Farita Yusof<br/>Format: Visual Materials<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Project Paper(Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Penganalisisan corak Bahasa Melayu untuk kajian kriptografi ... [et al.]ent://SD_ILS/0/SD_ILS:138512024-04-30T23:51:50Z2024-04-30T23:51:50Zby Chua, Soo Yaw<br/>Author Chua, Soo Yaw, Mohd. Suhaizal Md. Kamari, Mona Effarina Zakaria, Nik Raihan Nik Omar, Wan Nur Ilyana Wan Zahari<br/>Format: Visual Materials<br/>Call Number MFL 10606<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/>Military vehicle sound signature analysisent://SD_ILS/0/SD_ILS:210892024-04-30T23:51:50Z2024-04-30T23:51:50Zby Firuz Giry Naidu Ramanujaloo Naidu<br/>Author Firuz Giry Naidu Ramanujaloo Naidu<br/>Format: Visual Materials<br/>Call Number MFL 12124<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Project Paper (Bachelor of Computer Engineering) - Universiti Teknologi Malaysia /ATMA, 2000<br/>Infrastruktur kekunci awam - perpustakaan keselamatanent://SD_ILS/0/SD_ILS:1502202024-04-30T23:51:50Z2024-04-30T23:51:50Zby Teoh, Su Chi<br/>Author Teoh, Su Chi<br/>Format: Books<br/>Call Number QA76.9.A25 T46 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/>Sistem capaian data dalam depoh bantuan TLDMent://SD_ILS/0/SD_ILS:1588162024-04-30T23:51:50Z2024-04-30T23:51:50Zby Mohd. Yusri Md. Sah<br/>Author Mohd. Yusri Md. Sah<br/>Format: Books<br/>Call Number QA76.9.A25 M98 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia /ATMA, 2000<br/>Sistem capaian data dalam depoh bantuan TLDMent://SD_ILS/0/SD_ILS:1586662024-04-30T23:51:50Z2024-04-30T23:51:50Zby Khairul Kamarul Ariffin<br/>Author Khairul Kamarul Ariffin<br/>Format: Books<br/>Call Number QA76.9.A25 K52 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia /ATMA, 2000<br/>Sistem keselamatan kata laluan urusan gaji angkatan tentera (UGAT) menggunakan teknik kriptografi kekunci umument://SD_ILS/0/SD_ILS:1590032024-04-30T23:51:50Z2024-04-30T23:51:50Zby Roslina Abd. Rahman<br/>Author Roslina Abd. Rahman<br/>Format: Books<br/>Call Number QA76.9.A25 R67 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/>Aplikasi teknologi agen di dalam jualan barangan elektrikent://SD_ILS/0/SD_ILS:1595312024-04-30T23:51:50Z2024-04-30T23:51:50Zby Noor Azyyati Mohd. Mansor<br/>Author Noor Azyyati Mohd. Mansor<br/>Format: Books<br/>Call Number QA76.9.A25 N667 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/>Network security monitoring software on network systement://SD_ILS/0/SD_ILS:1475012024-04-30T23:51:50Z2024-04-30T23:51:50Zby Tan, Kok Kuan<br/>Author Tan, Kok Kuan<br/>Format: Books<br/>Call Number QA76.9.A25 T36 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2000<br/>Penganalisisan corak Bahasa Melayu untuk kajian kriptografient://SD_ILS/0/SD_ILS:1480352024-04-30T23:51:50Z2024-04-30T23:51:50Zby Chua, Tee Khoon @ Chua Yong Peng<br/>Author Chua, Tee Khoon @ Chua Yong Peng<br/>Format: Books<br/>Call Number QA76.9.A25 C58 2000 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/>Infrastruktur kekunci awam : penerbitan dan revokasi sijil digitalent://SD_ILS/0/SD_ILS:1483262024-04-30T23:51:50Z2024-04-30T23:51:50Zby Lim, Ban Hong<br/>Author Lim, Ban Hong<br/>Format: Books<br/>Call Number QA76.9.A25 L553 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/>Practical firewallsent://SD_ILS/0/SD_ILS:3848612024-04-30T23:51:50Z2024-04-30T23:51:50Zby Ogletree, Terry William<br/>Author Ogletree, Terry William<br/>Format: Books<br/>Call Number QA76.9.A25 O35 2000<br/>Publisher QUE,<br/>Publication Date 2000<br/>ISBN 9780789724168<br/>Taman perumahan maya - : permodelan bangunan kediamanent://SD_ILS/0/SD_ILS:156052024-04-30T23:51:50Z2024-04-30T23:51:50Zby Aini Hazila Hamzah<br/>Author Aini Hazila Hamzah<br/>Format: Visual Materials<br/>Call Number MFL 11193<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/>Sistem kawalan inventori pusat perubatanent://SD_ILS/0/SD_ILS:157712024-04-30T23:51:50Z2024-04-30T23:51:50Zby Hafiza Ibrahim<br/>Author Hafiza Ibrahim<br/>Format: Visual Materials<br/>Call Number MFL 11127<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/>Sistem kawalan kualiti bahagian 'Housing Product' Matsushita Electric Co. (M) Bhd.ent://SD_ILS/0/SD_ILS:167132024-04-30T23:51:50Z2024-04-30T23:51:50Zby Haslinda M. Ros<br/>Author Haslinda M. Ros<br/>Format: Visual Materials<br/>Call Number MFL 11194<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/>Kriptografi untuk unit pengurusan operasi TLDMent://SD_ILS/0/SD_ILS:202502024-04-30T23:51:50Z2024-04-30T23:51:50Zby Ayuwati Suraya Abu Bakar<br/>Author Ayuwati Suraya Abu Bakar<br/>Format: Visual Materials<br/>Call Number MFL 12095<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia /ATMA, 2000<br/>Enkripsi imej digital untuk format JPEGent://SD_ILS/0/SD_ILS:1233022024-04-30T23:51:50Z2024-04-30T23:51:50Zby Arif Fadhlan Yusoff<br/>Author Arif Fadhlan Yusoff<br/>Format: Books<br/>Call Number QA76.9.A25 A74 1999 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Kertas Projek (Sarjana Muda Kejuruteraan Elektrik) - Universiti Teknologi Malaysia, 1999<br/>Electronic delinquentsent://SD_ILS/0/SD_ILS:95262024-04-30T23:51:50Z2024-04-30T23:51:50ZFormat: Visual Materials<br/>Call Number KVD 368<br/>Publisher MTI Teleprograms,<br/>Publication Date 1999 1998 1997 1996 1995<br/>Membangunkan alatan yang membenarkan perkongsian fail di antara Linux dan Windows NT ... [et al.]ent://SD_ILS/0/SD_ILS:130522024-04-30T23:51:50Z2024-04-30T23:51:50Zby Norhamin Amit<br/>Author Norhamin Amit, Syukrie Mohd. Nasir, Wan Saari Wan Alias, Yuhasliza Mohd. Yusoh, Yusmariani Mohd. Yusoff<br/>Format: Visual Materials<br/>Call Number MFL 9508<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1999<br/>Windows based file encryption and decryption systement://SD_ILS/0/SD_ILS:1167252024-04-30T23:51:50Z2024-04-30T23:51:50Zby Ling, Hua Lay<br/>Author Ling, Hua Lay<br/>Format: Books<br/>Call Number QA76.9.A25 L56 1999 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologoi Malaysia, 1999<br/>Design and analysis of a dynamic access control schemeent://SD_ILS/0/SD_ILS:1391502024-04-30T23:51:50Z2024-04-30T23:51:50Zby Md. Rafiqul Islam<br/>Author Md. Rafiqul Islam<br/>Format: Books<br/>Call Number QA76.9.A25 M72 1999<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Thesis (PhD) - Universiti Teknologi Malaysia, 1999<br/>Rekabentuk keselamatan untuk modul pembelajaran siber dalam kampus siber ... [et al. ]ent://SD_ILS/0/SD_ILS:131342024-04-30T23:51:50Z2024-04-30T23:51:50Zby Mazlan Talib<br/>Author Mazlan Talib, Mohd. Anuar Jaafar, Nurbaya Kardy, Rohazlina Jarudin, Shehnaaz Yusuf Patel Dowoodi<br/>Format: Visual Materials<br/>Call Number MFL 9473<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1999<br/>Active noise control system ... [et al.]ent://SD_ILS/0/SD_ILS:133072024-04-30T23:51:50Z2024-04-30T23:51:50Zby Lakshmi Venkatarama Subramaniam<br/>Author Lakshmi Venkatarama Subramaniam, Lee, Sen How, Ling, Hua Lay, Mat Nizam Ngathinee, Tan, Kok Kean<br/>Format: Visual Materials<br/>Call Number MFL 9763<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1999<br/>Rekabentuk keselamatan pangkalan data dan pelayan pada modul sistem pendaftaran pelajar kampus siberent://SD_ILS/0/SD_ILS:989102024-04-30T23:51:50Z2024-04-30T23:51:50Zby Mohd. Anuar Jaafar<br/>Author Mohd. Anuar Jaafar<br/>Format: Books<br/>Call Number QA76.9.D314 M36 1999 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1999<br/>Kajian keselamatan data berbantukan agen mobileent://SD_ILS/0/SD_ILS:1013552024-04-30T23:51:50Z2024-04-30T23:51:50Zby Yuhasliza Mohd. Yusoh<br/>Author Yuhasliza Mohd. Yusoh<br/>Format: Books<br/>Call Number QA76.9.A25 Y83 1999 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1999<br/>Computers and securityent://SD_ILS/0/SD_ILS:5404372024-04-30T23:51:50Z2024-04-30T23:51:50ZFormat: Continuing Resources<br/>Call Number QA76.4.C65<br/>Publisher North-Holland Pub,<br/>Publication Date 1999 1998 1997 1996 1995<br/>ISSN 01674048<br/><a href="http://www.sciencedirect.com/science/journal/01674048">Covers from Vol. 14, Issue 1, (1995) to present</a><br/>Accessible within UTM campus<br/>Understanding security on the netent://SD_ILS/0/SD_ILS:4722092024-04-30T23:51:50Z2024-04-30T23:51:50Zby Teo, Lu Ling<br/>Author Teo, Lu Ling<br/>Format: Books<br/>Call Number QA76.9.A25 T46 1998 raf<br/>Publisher UTM,<br/>Publication Date 1998<br/>Project paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1998<br/>Fundamental steps for fixed-font character recognition in image processing ... [et al.]ent://SD_ILS/0/SD_ILS:130912024-04-30T23:51:50Z2024-04-30T23:51:50Zby Khor, Sock Choo<br/>Author Khor, Sock Choo, Mohamad Azlie Mohamad Yusof, Tan, Yee Fei, Teo, Lu Ling, Thoo, Wei Ping<br/>Format: Visual Materials<br/>Call Number MFL 9464<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1998<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1998<br/>Technology's march towards total securityent://SD_ILS/0/SD_ILS:62302024-04-30T23:51:50Z2024-04-30T23:51:50Zby Akumanyi, Kofi<br/>Author Akumanyi, Kofi<br/>Format: Maps<br/>Call Number FTG 973<br/>Publisher London Press Service,<br/>Publication Date 1997<br/>Public-key crytographyent://SD_ILS/0/SD_ILS:1573092024-04-30T23:51:50Z2024-04-30T23:51:50Zby Salomaa, Arto<br/>Author Salomaa, Arto<br/>Format: Books<br/>Call Number QA76.9.A25 S26 1996<br/>Edition 2nd ed.<br/>Publisher Springer-Verlag,<br/>Publication Date 1996<br/>ISBN 9783540613565<br/>Kriptologi; Pengiraan berangka pangkat matriks; Sistem pemilihan dan perancangan kerjaya untuk pelajar sekolah menengah atas; Pembinaan perisian pengajaran berbantukan komputer dalam pembelajaran bumi sebagai sfera; Sistem maklumat analisis keputusan peperiksaan SPMent://SD_ILS/0/SD_ILS:146532024-04-30T23:51:50Z2024-04-30T23:51:50Zby Bong, Thai Kwong<br/>Author Bong, Thai Kwong, Chi, Chong Ching, Ismail Shaari, Tan, Wooi Nee, Yew, Wai Hon<br/>Format: Visual Materials<br/>Call Number MFL 8151 ra<br/>Publisher UTM,<br/>Publication Date 1994<br/>Kertas Projek (Sarjana Muda Sains dan Komputer serta Pendidikan) - Universiti Teknologi Malaysia, 1994<br/>Kriptologient://SD_ILS/0/SD_ILS:3362182024-04-30T23:51:50Z2024-04-30T23:51:50Zby Bong, Thai Kwong<br/>Author Bong, Thai Kwong<br/>Format: Books<br/>Call Number QA76.9.A25 B66 1994 raf<br/>Publisher UTM,<br/>Publication Date 1994<br/>Kertas projek (Sarjana Muda Sains dan Komputer serta Pendidikan (Matematik)) - Universiti Teknologi Malaysia, 1994<br/>Kriptologient://SD_ILS/0/SD_ILS:3362202024-04-30T23:51:50Z2024-04-30T23:51:50Zby Bong, Thai Kwong<br/>Author Bong, Thai Kwong<br/>Format: Books<br/>Call Number DSK 616 ra<br/>Publisher UTM,<br/>Publication Date 1994<br/>Kertas projek (Sarjana Muda Sains dan Komputer serta Pendidikan (Matematik)) - Universiti Teknologi Malaysia, 1994<br/>Cryptography workbench for windowsent://SD_ILS/0/SD_ILS:1646352024-04-30T23:51:50Z2024-04-30T23:51:50Zby Hishamudi Bahari<br/>Author Hishamudi Bahari<br/>Format: Books<br/>Call Number Z103.H57 1993 raf<br/>Publisher UTM,<br/>Publication Date 1993<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1993<br/>Penyusunan pengetahuan dan persembahan kaedah multimedia perubatan secara Islam; Cryptography workbench for windows; Sistem perancangan pengagihan barangan petroleum; Mengukur prestasi fakulti; Pakej penjana nombor rawak dan teknik pengurangan variansent://SD_ILS/0/SD_ILS:3525772024-04-30T23:51:50Z2024-04-30T23:51:50Zby Che Aziz Lahi<br/>Author Che Aziz Lahi, Hishamudi Bahari, Mohd. Azman Arshad, Nora Rosdin, Zainudin @ Ridzuan Mohamed<br/>Format: Books<br/>Call Number MFL 8207 ra<br/>Publisher UTM,<br/>Publication Date 1993<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1993<br/>Sistem pemetaan utiliti berintegrasi ; Kajian terhadap ancaman-ancaman pusat komputer dan perancangan diMalaysia ; Pakej inventori ; Sistem pakar untuk rekabentuk rangkaian berkomputer = expert system for computerized network design ; Sistem pengurusan maklumat pameran Muzium Negara ; Sistem jadual waktu sekolah berkomputer ; Kajian maklumat dan data grafik diSyarikat Telekom Malaysia (STM) ;ent://SD_ILS/0/SD_ILS:1622732024-04-30T23:51:50Z2024-04-30T23:51:50Zby Safian Mohamed Sahari<br/>Author Safian Mohamed Sahari, Sofiah Daud, Suriah Hasan, Tee, Chee Kiat, Zamri Tebi<br/>Format: Books<br/>Call Number MFL 7768 ra<br/>Publication Date 1991<br/>Kajian terhadap ancaman-ancaman pusat komputer dan perancangannya di Malaysiaent://SD_ILS/0/SD_ILS:1596132024-04-30T23:51:50Z2024-04-30T23:51:50Zby Sofiah Daud<br/>Author Sofiah Daud<br/>Format: Books<br/>Call Number QA76.9.A25 S63 1991 raf<br/>Publisher UTM,<br/>Publication Date 1991<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1991<br/>Security in computingent://SD_ILS/0/SD_ILS:2364252024-04-30T23:51:50Z2024-04-30T23:51:50Zby Peleeger, Charles P.<br/>Author Peleeger, Charles P.<br/>Format: Books<br/>Call Number QA76.9.A25 P44 1989<br/>Publisher Prentice-Hall,<br/>Publication Date 1989<br/>ISBN 9780137989430<br/>Security mechanisms for computer networksent://SD_ILS/0/SD_ILS:1916662024-04-30T23:51:50Z2024-04-30T23:51:50Zby Muftic, Sead<br/>Author Muftic, Sead<br/>Format: Books<br/>Call Number QA76.9.A25 S42 1989<br/>Publisher Ellis Horwood,<br/>Publication Date 1989<br/>ISBN 9780745806136<br/>Cryptography : an introduction to computer securityent://SD_ILS/0/SD_ILS:4423852024-04-30T23:51:50Z2024-04-30T23:51:50Zby Seberry, Jennifer<br/>Author Seberry, Jennifer, Pieprzyk, Josef<br/>Format: Books<br/>Call Number QA76.9.A25 S37 1989<br/>Publisher Prentice Hall,<br/>Publication Date 1989<br/>ISBN 9780724802746 9780131949867<br/>Computer and communications security : strategies for the 1990sent://SD_ILS/0/SD_ILS:4546272024-04-30T23:51:50Z2024-04-30T23:51:50Zby Cooper, James Arlin<br/>Author Cooper, James Arlin<br/>Format: Books<br/>Call Number QA76.9.A25 C67 1989<br/>Publisher McGraw-Hill,<br/>Publication Date 1989<br/>ISBN 9780070129269<br/>Auditing computer security : a manual with case studiesent://SD_ILS/0/SD_ILS:1048612024-04-30T23:51:50Z2024-04-30T23:51:50Zby Vallabhaneni, S. Rao<br/>Author Vallabhaneni, S. Rao<br/>Format: Books<br/>Call Number QA76.9.A25 V35 1989 f<br/>Publisher Wiley,<br/>Publication Date 1989<br/>ISBN 9780471626046<br/>Introduction to cryptologyent://SD_ILS/0/SD_ILS:1732122024-04-30T23:51:50Z2024-04-30T23:51:50Zby Beckett, Brian<br/>Author Beckett, Brian<br/>Format: Books<br/>Call Number QA76.9.A25 B42 1988<br/>Publisher Blackwell Scientific Pub.,<br/>Publication Date 1988<br/>ISBN 9780632022434<br/>Access control and personal identification systemsent://SD_ILS/0/SD_ILS:1842942024-04-30T23:51:50Z2024-04-30T23:51:50Zby Bowers, Dan M.<br/>Author Bowers, Dan M.<br/>Format: Books<br/>Call Number QA76.9.A25 B68 1988<br/>Publisher Butterworths,<br/>Publication Date 1988<br/>ISBN 9780409900835<br/>Penyemak ejaan Bahasa Malaysia; Sistem sokongan kataputus untuk penjadualan waktu pemeriksaan : pelaksanaan pada komputer mikro; Penjanaan berkomputer ayat-ayat Bahasa Malaysia mudah; Pembentukan penghurai dalam pengkompil; Kajian keselamatan maklumat dalam Bahasa Malaysia yang telah dienkrip; Perisian pemampatan/nyahmampatan teksent://SD_ILS/0/SD_ILS:1667702024-04-30T23:51:50Z2024-04-30T23:51:50Zby Siti Nurliza Mokhtar<br/>Author Siti Nurliza Mokhtar, Hendri Dwisatrya Sabir Husin Athar, Mohd. Nasir A. Rahman, Zaleha @ Siti Zaleha Yusof, Zalila Sumari<br/>Format: Books<br/>Call Number MFL 3864-3869 ra<br/>Publication Date 1988<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1988<br/>Kajian keselamatan maklumat dalam Bahasa Malaysia yang telah dienkripent://SD_ILS/0/SD_ILS:4327612024-04-30T23:51:50Z2024-04-30T23:51:50Zby Salina Salam<br/>Author Salina Salam<br/>Format: Books<br/>Call Number QA76.9.D37 S34 1988 raf<br/>Publisher UTM,<br/>Publication Date 1988<br/>Tesis (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1988<br/>Konsep kerahsiaan dan keselamatan dengan menggunakan kriptografi kunci umument://SD_ILS/0/SD_ILS:4370742024-04-30T23:51:50Z2024-04-30T23:51:50Zby Fauziah Abu Mansor<br/>Author Fauziah Abu Mansor<br/>Format: Books<br/>Call Number Z104.F48 1988 raf<br/>Publisher UTM,<br/>Publication Date 1988<br/>Tesis (Sarjana Muda Kejuruteraan Elektrik) - Universiti Teknologi Malaysia, 1988<br/>Building a secure computer systemsent://SD_ILS/0/SD_ILS:4598132024-04-30T23:51:50Z2024-04-30T23:51:50Zby Gasser, Morrie<br/>Author Gasser, Morrie<br/>Format: Books<br/>Call Number QA76.9.A25 G37 1988<br/>Publisher Van Nostrand Reinhold,<br/>Publication Date 1988<br/>ISBN 9780442230227<br/>Konsep kerahsiaan dan keselamatan dengan menggunakan kriptografi kunci umum; Sistem kawalan pemacuan motor aruhan lelurus; Optimal control design in frequency domain; Versatile auto programmer system; Biomedical telemetry system for freely moving patients; Considerations in technology upgrading; Slow scan TV (SSTV)ent://SD_ILS/0/SD_ILS:88982024-04-30T23:51:50Z2024-04-30T23:51:50Zby Fauziah Abu Mansor @ Mash-hod<br/>Author Fauziah Abu Mansor @ Mash-hod, Nik Din Muhamad, Chean, Kooi Chyi, Chua, Poh Cheng, Nilavarasan Periasamy<br/>Format: Visual Materials<br/>Call Number MFL 3914-3920 ra<br/>Publisher UTM,<br/>Publication Date 1988<br/>Kertas projek (Sarjana Muda Kejuruteraan Elektrik) - Universiti Teknologi Malaysia,1988.<br/>A Handbook of computer securityent://SD_ILS/0/SD_ILS:1715982024-04-30T23:51:50Z2024-04-30T23:51:50Zby Hearnden, Keith<br/>Author Hearnden, Keith<br/>Format: Books<br/>Call Number HF5548.2.H363 1987<br/>Publisher Kogan page,<br/>Publication Date 1987<br/>ISBN 9781850913481<br/>Computer securityent://SD_ILS/0/SD_ILS:1824672024-04-30T23:51:50Z2024-04-30T23:51:50Zby Carrol, John M.<br/>Author Carrol, John M.<br/>Format: Books<br/>Call Number HF5548.2.C27 1987<br/>Edition 2nd ed<br/>Publisher Butterworth Pub.,<br/>Publication Date 1987<br/>ISBN 9780409900323<br/>Computers, business and security : the new role for securityent://SD_ILS/0/SD_ILS:4687072024-04-30T23:51:50Z2024-04-30T23:51:50Zby Schweitzer, James A.<br/>Author Schweitzer, James A.<br/>Format: Books<br/>Call Number QA76.9.A25 S23 1987<br/>Publisher Butterworths,<br/>Publication Date 1987<br/>ISBN 9780409900651<br/>Computer auditing, security and internal control manualent://SD_ILS/0/SD_ILS:4506502024-04-30T23:51:50Z2024-04-30T23:51:50Zby Kuong, Javier F.<br/>Author Kuong, Javier F.<br/>Format: Books<br/>Call Number QA76.9.A25 K86 1987<br/>Publisher Prentice-Hall,<br/>Publication Date 1987<br/>ISBN 9780131629677<br/>Foiling the systems breakers : computer security and access controlent://SD_ILS/0/SD_ILS:4603882024-04-30T23:51:50Z2024-04-30T23:51:50Zby Lobel, Jerome<br/>Author Lobel, Jerome<br/>Format: Books<br/>Call Number QA76.9.A25 L62 1986<br/>Publisher McGraw-Hill,<br/>Publication Date 1986<br/>ISBN 9780070383579<br/>Computer securityent://SD_ILS/0/SD_ILS:4032152024-04-30T23:51:50Z2024-04-30T23:51:50ZFormat: Books<br/>Call Number QA76.9.A25 C67 1986 f<br/>Publisher Time life Books,<br/>Publication Date 1986<br/>ISBN 9780809456703<br/>Spies in the wiresent://SD_ILS/0/SD_ILS:96662024-04-30T23:51:50Z2024-04-30T23:51:50ZFormat: Visual Materials<br/>Call Number KVD 446<br/>Publisher BBC,<br/>Publication Date 1985<br/>Computer-security technologyent://SD_ILS/0/SD_ILS:4665612024-04-30T23:51:50Z2024-04-30T23:51:50Zby Cooper, James Arlin<br/>Author Cooper, James Arlin<br/>Format: Books<br/>Call Number QA76.9.A25 C66 1984<br/>Publisher Lexington Books,<br/>Publication Date 1984<br/>ISBN 9780669064360<br/>Information systems securityent://SD_ILS/0/SD_ILS:2367372024-04-30T23:51:50Z2024-04-30T23:51:50Zby Fisher, Royal P., 1932-<br/>Author Fisher, Royal P., 1932-<br/>Format: Books<br/>Call Number HF5548.2.F57 1984<br/>Publisher Prentice-Hall,<br/>Publication Date 1984<br/>ISBN 9780134647272<br/>How to prevent computer crime : a guide for managersent://SD_ILS/0/SD_ILS:1705312024-04-30T23:51:50Z2024-04-30T23:51:50Zby Bequai, August<br/>Author Bequai, August<br/>Format: Books<br/>Call Number HF5548.2B44 1983<br/>Publisher Wiley<br/>Publication Date 1983<br/>ISBN 9780471093671<br/>Information intergrity : a structures for its defination and managementent://SD_ILS/0/SD_ILS:4570992024-04-30T23:51:50Z2024-04-30T23:51:50Zby Becker, Hal B.<br/>Author Becker, Hal B.<br/>Format: Books<br/>Call Number QA76.9.M3 B42 1983<br/>Publisher McGraw-Hill,<br/>Publication Date 1983<br/>ISBN 9780070041912<br/>Geodetic computation crime : a guide for managersent://SD_ILS/0/SD_ILS:2918732024-04-30T23:51:50Z2024-04-30T23:51:50Zby Bequai, August<br/>Author Bequai, August<br/>Format: Books<br/>Call Number HF5548.2 B44 1983<br/>Publisher John Wiley,<br/>Publication Date 1983<br/>ISBN 9780471093671<br/>Cryptography and data securityent://SD_ILS/0/SD_ILS:2960312024-04-30T23:51:50Z2024-04-30T23:51:50Zby Denning, Dorothy Elizabeth Robling<br/>Author Denning, Dorothy Elizabeth Robling<br/>Format: Books<br/>Call Number QA76.9.A25 D46 1982<br/>Publisher Addison-Wesley,<br/>Publication Date 1983 1982<br/>ISBN 9780201101508<br/>Database security and integrityent://SD_ILS/0/SD_ILS:4571612024-04-30T23:51:50Z2024-04-30T23:51:50Zby Fernandez, Eduardo B., 1936-<br/>Author Fernandez, Eduardo B., 1936-, Summers, Rita C., Wood, Christopher<br/>Format: Books<br/>Call Number QA76.9.D3 F47 1981<br/>Publisher Addison-Wesley,<br/>Publication Date 1981<br/>ISBN 9780201144673<br/>Computer fraud and counter measuresent://SD_ILS/0/SD_ILS:4628502024-04-30T23:51:50Z2024-04-30T23:51:50Zby Krauss, Leonard I.<br/>Author Krauss, Leonard I., Macgahan, Aileen<br/>Format: Books<br/>Call Number HV6773.K73 1979<br/>Publisher Prentice-Hall,<br/>Publication Date 1979<br/>ISBN 9780131647725<br/>Computer securityent://SD_ILS/0/SD_ILS:2960082024-04-30T23:51:50Z2024-04-30T23:51:50Zby Hsiao, David K.<br/>Author Hsiao, David K., Kerr, Douglas S., Madnick, Stuart E.<br/>Format: Books<br/>Call Number QA76.9.A25 H74 1979<br/>Publisher Academic,<br/>Publication Date 1979<br/>ISBN 9780123576507<br/>Modern methods for computer security and privacyent://SD_ILS/0/SD_ILS:4637312024-04-30T23:51:50Z2024-04-30T23:51:50Zby Hoffman, Lance J.<br/>Author Hoffman, Lance J.<br/>Format: Books<br/>Call Number QA76.9.A25 H63 1977<br/>Publisher Prentice-Hall,<br/>Publication Date 1977<br/>ISBN 9780135952078<br/>Data base and computer systems securityent://SD_ILS/0/SD_ILS:2985402024-04-30T23:51:50Z2024-04-30T23:51:50Zby Carroll, John Millar, 1950-<br/>Author Carroll, John Millar, 1950-<br/>Format: Books<br/>Call Number QA76.9. D3 D37 1976 f<br/>Publisher Q.E.D. Information Sciences,<br/>Publication Date 1976<br/>ISBN 9780894350023<br/>Access mechanisms and data structure support in data base management systemsent://SD_ILS/0/SD_ILS:2985752024-04-30T23:51:50Z2024-04-30T23:51:50Zby Curtice, Robert M.<br/>Author Curtice, Robert M.<br/>Format: Books<br/>Call Number QA76.9.D3 D37 1975 f<br/>Publisher Q.E.D. Information Sciences,<br/>Publication Date 1975<br/>Cryptography workbench version 2.0ent://SD_ILS/0/SD_ILS:1689952024-04-30T23:51:50Z2024-04-30T23:51:50Zby Mohd. Razali Mohamed Lis<br/>Author Mohd. Razali Mohamed Lis<br/>Format: Books<br/>Call Number QA76.9.A25 M53 1992 raf<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1992<br/>SECURED ACCESS CONTROL MODEL FOR KNOWLEDGE MANAGEMENT SYSTEMent://SD_ILS/0/SD_ILS:8440852024-04-30T23:51:50Z2024-04-30T23:51:50Zby Azlina Ahmad, author<br/>Author Azlina Ahmad, author, Saiful Adli Ismail, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 A955 2014 raf<br/>Thesis Sarjana Sains (Jaminan Maklumat)<br/>SECURED ACCESS CONTROL MODEL FOR KNOWLEDGE MANAGEMENT SYSTEMent://SD_ILS/0/SD_ILS:8440862024-04-30T23:51:50Z2024-04-30T23:51:50Zby Azlina Ahmad, author<br/>Author Azlina Ahmad, author, Saiful Adli Ismail, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034515 ra<br/>Thesis Sarjana Sains (Jaminan Maklumat)<br/>AWARENESS OF THE SIGNIFICANT OF BIOMETRIC SYSTEMSent://SD_ILS/0/SD_ILS:8441392024-04-30T23:51:50Z2024-04-30T23:51:50Zby Fadzrina Ramli, 1983-, author<br/>Author Fadzrina Ramli, 1983-, author, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number TK7882.B56 F33 2014 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>AWARENESS OF THE SIGNIFICANT OF BIOMETRIC SYSTEMSent://SD_ILS/0/SD_ILS:8441422024-04-30T23:51:50Z2024-04-30T23:51:50Zby Fadzrina Ramli, 1983-, author<br/>Author Fadzrina Ramli, 1983-, author, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034513 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>APPLICATION OF K-MEANS IN REDUCING FALSE POSITIVE ALARMS IN INTRUSION PREVENTION SYSTEMSent://SD_ILS/0/SD_ILS:8361662024-04-30T23:51:50Z2024-04-30T23:51:50Zby Iman Biglari, 1982-, author<br/>Author Iman Biglari, 1982-, author, Bharanidharan Shanmugam, Dr., Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034123 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>WEB-BASED DIGITAL RIGHTS MANAGEMENT SYSTEM FOR THE MALAYSIAN CULTURE AND HERITAGE DIGITAL BANK PROJECTent://SD_ILS/0/SD_ILS:8375652024-04-30T23:51:50Z2024-04-30T23:51:50Zby Wan Mohd. Khairi Wan Mohamed, 1983-, author<br/>Author Wan Mohd. Khairi Wan Mohamed, 1983-, author, Rusni Daruis, Assoc.Prof., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 W366 2012 raf<br/>Thesis Sarjana Sains (Teknologi Maklumat - Pengurusan)<br/>WEB-BASED DIGITAL RIGHTS MANAGEMENT SYSTEM FOR THE MALAYSIAN CULTURE AND HERITAGE DIGITAL BANK PROJECTent://SD_ILS/0/SD_ILS:8375722024-04-30T23:51:50Z2024-04-30T23:51:50Zby Wan Mohd. Khairi Wan Mohamed, 1983-, author<br/>Author Wan Mohd. Khairi Wan Mohamed, 1983-, author, Rusni Daruis, Assoc.Prof., author, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034145 ra<br/>Thesis Sarjana Sains (Teknologi Maklumat - Pengurusan))<br/>ENHANCE KEY GENERATOR OF DATA ENCRYPTION STANDARD (DES)ent://SD_ILS/0/SD_ILS:8378642024-04-30T23:51:50Z2024-04-30T23:51:50Zby Mahan Niknafskermani, 1982-, author<br/>Author Mahan Niknafskermani, 1982-, author, Norbik Bashah Idris, Dato’ Prof. Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M343 2012 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>ANALYZING THE EFFECTIVENESS OF INFORMATION SECURITY PRACTICES IN IMPLEMENTING ISMS STANDARDent://SD_ILS/0/SD_ILS:8378782024-04-30T23:51:50Z2024-04-30T23:51:50Zby Rohaida Ismail, 1984-, author<br/>Author Rohaida Ismail, 1984-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034149 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>IMPLEMENTING A TWO-FACTOR AUTHENTICATION PHYSICAL ACCESS CONTROL SYSTEMent://SD_ILS/0/SD_ILS:8394302024-04-30T23:51:50Z2024-04-30T23:51:50Zby Usama Tharwat Farag Elhagari, 1970-, author<br/>Author Usama Tharwat Farag Elhagari, 1970-, author, Zailani Mohamed Sidek, Assoc.Prof., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 U83 2007 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>DBCRYPT : (MANUAL AND TRANSPARENT ENCRYPTION/DECRYPTION)ent://SD_ILS/0/SD_ILS:8417492024-04-30T23:51:50Z2024-04-30T23:51:50Zby Mustafa Ahmed Abdullah Aqel, 1979-, author<br/>Author Mustafa Ahmed Abdullah Aqel, 1979-, author, Mohd. Nazri Kama, 1963-, supervisor, Muhammad Sufyan Basri, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 M878 2007 raf<br/>Thesis Sarjana Sains (Sains Komputer - Kejuruteraan Perisian Masa Nyata)<br/>A binary access control method using prime factorizationent://SD_ILS/0/SD_ILS:4527862024-04-30T23:51:50Z2024-04-30T23:51:50Zby Chin-Chen Chang<br/>Author Chin-Chen Chang, Lou, Der-Chyuan<br/>Format: Books<br/>Call Number MAK 7180<br/>Cryptolib: cryptography in softwareent://SD_ILS/0/SD_ILS:4157092024-04-30T23:51:50Z2024-04-30T23:51:50Zby Lacy, John B.<br/>Author Lacy, John B.<br/>Format: Books<br/>Call Number MAK 5972<br/>An access control scheme based on Chinese remainder theorem and time-stamp conceptent://SD_ILS/0/SD_ILS:4545512024-04-30T23:51:50Z2024-04-30T23:51:50Zby Min-Shiang, Hwang<br/>Author Min-Shiang, Hwang, Wen-Guey, Tzeng, Wei-Pang, Yang<br/>Format: Books<br/>Call Number MAK 7183<br/>A two-key-lock-pair access control method using prime factorization and time stampent://SD_ILS/0/SD_ILS:4597632024-04-30T23:51:50Z2024-04-30T23:51:50Zby Min-Shiang, Hwang<br/>Author Min-Shiang, Hwang, Wen-Guey, Tzeng, Wei-Pang, Yang<br/>Format: Books<br/>Call Number MAK 7184<br/>APPLICATION OF K-MEANS IN REDUCING FALSE POSITIVE ALARMS IN INTRUSION PREVENTION SYSTEMSent://SD_ILS/0/SD_ILS:8361652024-04-30T23:51:50Z2024-04-30T23:51:50Zby Iman Biglari, 1982-, author<br/>Author Iman Biglari, 1982-, author, Bharanidharan Shanmugam, Dr., Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 I436 2010 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>ENHANCE KEY GENERATOR OF DATA ENCRYPTION STANDARD (DES)ent://SD_ILS/0/SD_ILS:8378662024-04-30T23:51:50Z2024-04-30T23:51:50Zby Mahan Niknafskermani, 1982-, author<br/>Author Mahan Niknafskermani, 1982-, author, Norbik Bashah Idris, Dato’ Prof. Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034145 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>ANALYZING THE EFFECTIVENESS OF INFORMATION SECURITY PRACTICES IN IMPLEMENTING ISMS STANDARDent://SD_ILS/0/SD_ILS:8378772024-04-30T23:51:50Z2024-04-30T23:51:50Zby Rohaida Ismail, 1984-, author<br/>Author Rohaida Ismail, 1984-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 R643 2012 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>DYNAMIC AUTHENTICATION BASED ON USER BEHAVIOUR MODELINGent://SD_ILS/0/SD_ILS:8646682024-04-30T23:51:50Z2024-04-30T23:51:50Zby Saleh Zainolabedini Rafi, 1979-, author<br/>Author Saleh Zainolabedini Rafi, 1979-, author, Nurulhuda Firdaus Mohd. Azmi, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 S25 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>