Search Results for Computers -- Access control - Narrowed by: Cryptography - Database securitySirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dComputers$002b--$002bAccess$002bcontrol$0026qf$003dSUBJECT$002509Subject$002509Cryptography$002509Cryptography$0026qf$003dSUBJECT$002509Subject$002509Database$002bsecurity$002509Database$002bsecurity$0026ps$003d300?dt=list2024-05-28T17:33:58ZAuditors' introduction to crytography and its application in database securityent://SD_ILS/0/SD_ILS:3458482024-05-28T17:33:58Z2024-05-28T17:33:58Zby Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author Zailani Mohamed Sidek, Assoc.Prof.Dr., Norbik Bashah Idris, Harihodin Selamat, International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format: Books<br/>Call Number QA76.9.D314 Z34 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Rekabentuk keselamatan untuk modul pembelajaran siber dalam kampus siber ... [et al. ]ent://SD_ILS/0/SD_ILS:131342024-05-28T17:33:58Z2024-05-28T17:33:58Zby Mazlan Talib<br/>Author Mazlan Talib, Mohd. Anuar Jaafar, Nurbaya Kardy, Rohazlina Jarudin, Shehnaaz Yusuf Patel Dowoodi<br/>Format: Visual Materials<br/>Call Number MFL 9473<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1999<br/>Cryptolib: cryptography in softwareent://SD_ILS/0/SD_ILS:4157092024-05-28T17:33:58Z2024-05-28T17:33:58Zby Lacy, John B.<br/>Author Lacy, John B.<br/>Format: Books<br/>Call Number MAK 5972<br/>