Search Results for Cryptography - Narrowed by: Cryptography - Computer networks -- Security measures SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dCryptography$0026qf$003dSUBJECT$002509Subject$002509Cryptography$002509Cryptography$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list 2024-06-04T19:56:00Z Cryptography for developers ent://SD_ILS/0/SD_ILS:170967 2024-06-04T19:56:00Z 2024-06-04T19:56:00Z by&#160;St. Denis, Tom<br/>Author&#160;St. Denis, Tom,&#160;Johnson, Simon<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S725 2007<br/>Publisher&#160;Syngrees Publishing,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781597491044<br/> Introduction to cryptography : principles and applications ent://SD_ILS/0/SD_ILS:164219 2024-06-04T19:56:00Z 2024-06-04T19:56:00Z by&#160;Delfs, Hans<br/>Author&#160;Delfs, Hans,&#160;Knebl, Helmut<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D44 2007<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540492436<br/><a href="http://dx.doi.org/10.1007/3-540-49244-5">Fulltext</a><br/> Applications of cryptography and network security ent://SD_ILS/0/SD_ILS:836934 2024-06-04T19:56:00Z 2024-06-04T19:56:00Z by&#160;Mason, Stephen<br/>Author&#160;Mason, Stephen<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.94 A675 2015<br/>Publisher&#160;Clanrye Intl.,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781632400659<br/> Introduction to cryptography and network security ent://SD_ILS/0/SD_ILS:155877 2024-06-04T19:56:00Z 2024-06-04T19:56:00Z by&#160;Forouzan, Behrouz A.<br/>Author&#160;Forouzan, Behrouz A.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 F67 2008<br/>Publisher&#160;McGraw-Hill Higher Education,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780073327532<br/> RSA Securitys official guide to cryptography ent://SD_ILS/0/SD_ILS:615019 2024-06-04T19:56:00Z 2024-06-04T19:56:00Z by&#160;Burnett, Steve<br/>Author&#160;Burnett, Steve,&#160;Paine, Stephen,&#160;RSA Security<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 6691<br/>Publisher&#160;McGraw-Hill/Osborne,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780072254969<br/> RSA Securitys official guide to cryptography ent://SD_ILS/0/SD_ILS:437144 2024-06-04T19:56:00Z 2024-06-04T19:56:00Z by&#160;Burnett, Steve<br/>Author&#160;Burnett, Steve,&#160;Paine, Stephen,&#160;RSA Security<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 B87 2004<br/>Publisher&#160;McGraw-Hill/Osborne,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780072254952<br/> Disappearing cryptography : information hiding : steganography and watermarking ent://SD_ILS/0/SD_ILS:335029 2024-06-04T19:56:00Z 2024-06-04T19:56:00Z by&#160;Wayner, Peter<br/>Author&#160;Wayner, Peter<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W39 2009<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Morgan Kaufmann,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780123744791<br/> Protocols and procedures of cryptography and network security ent://SD_ILS/0/SD_ILS:835156 2024-06-04T19:56:00Z 2024-06-04T19:56:00Z by&#160;Mason, Stephen<br/>Author&#160;Mason, Stephen<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P768 2015<br/>Publisher&#160;Clanrye International,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781632404237<br/> Comprehensive possible attacks on RSA ent://SD_ILS/0/SD_ILS:588292 2024-06-04T19:56:00Z 2024-06-04T19:56:00Z by&#160;Majid Bakhtiari, 1961-<br/>Author&#160;Majid Bakhtiari, 1961-,&#160;Rabiah Ahmad, supervisor,&#160;Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 016838<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2008&#160;20<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/> Comprehensive possible attacks on RSA ent://SD_ILS/0/SD_ILS:306904 2024-06-04T19:56:00Z 2024-06-04T19:56:00Z by&#160;Majid Bakhtiari, 1961-<br/>Author&#160;Majid Bakhtiari, 1961-,&#160;Rabiah Ahmad, supervisor,&#160;Universiti Teknologi Malaysia. Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M23 2008 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2008<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/> Information hiding using steganography ent://SD_ILS/0/SD_ILS:358844 2024-06-04T19:56:00Z 2024-06-04T19:56:00Z by&#160;Muhalim Mohamed Amin<br/>Author&#160;Muhalim Mohamed Amin,&#160;Mazleena Salleh,&#160;Subariah Ibrahim,&#160;M. R. Katmin,&#160;National Conference on Telecommunication Technology (4th : 2003 : Shah Alam, Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M83 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Pengurusan kekunci dalam sistem penyediaan dan pencapaian keputusan pelajar secara on-line ent://SD_ILS/0/SD_ILS:7278 2024-06-04T19:56:00Z 2024-06-04T19:56:00Z by&#160;Ng, Swee Lim<br/>Author&#160;Ng, Swee Lim<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12835<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/> Sistem pelayan khas untuk pengurusan penyimpanan data imej bagi aplikasi grafik 2D menggunakan JAVA RMI ent://SD_ILS/0/SD_ILS:7628 2024-06-04T19:56:00Z 2024-06-04T19:56:00Z by&#160;Afnizawati Mohamad Noh<br/>Author&#160;Afnizawati Mohamad Noh<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12991<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/> Prototaip sistem pengesahan untuk aplikasi CSCW dalam persekitaran web yang menggunakan protokol stesen ke stesen ent://SD_ILS/0/SD_ILS:308408 2024-06-04T19:56:00Z 2024-06-04T19:56:00Z by&#160;Han, Maisie Wi-Mei<br/>Author&#160;Han, Maisie Wi-Mei<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H36 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/> Integrating security services into computer supported cooperative work ent://SD_ILS/0/SD_ILS:121726 2024-06-04T19:56:00Z 2024-06-04T19:56:00Z by&#160;Mohd. Aizaini Maarof<br/>Author&#160;Mohd. Aizaini Maarof<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M34 2000 raf<br/>Publisher&#160;Aston University,<br/>Publication Date&#160;2000<br/>Thesis (Doctor of Philosophy) - Aston University, 2000<br/> Flexural behaviour and durability of glass fibre reinforced ent://SD_ILS/0/SD_ILS:13642 2024-06-04T19:56:00Z 2024-06-04T19:56:00Z by&#160;Abdul Rahman Mohd. Sam<br/>Author&#160;Abdul Rahman Mohd. Sam<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 10498<br/>Publisher&#160;University of Sheffield,<br/>Publication Date&#160;1999<br/>Thesis (PhD) - University of Sheffield, 1999<br/> Tutorial : the security of data in networks ent://SD_ILS/0/SD_ILS:254409 2024-06-04T19:56:00Z 2024-06-04T19:56:00Z by&#160;Davies, D. W.<br/>Author&#160;Davies, D. W.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5 D36 1981 f<br/>Publisher&#160;IEEE Computer Society,<br/>Publication Date&#160;1981<br/> Hacking the Hacker: Learn From the Experts Who Take Down Hackers ent://SD_ILS/0/SD_ILS:872613 2024-06-04T19:56:00Z 2024-06-04T19:56:00Z by&#160;Grimes, Roger A.<br/>Author&#160;Grimes, Roger A.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G75 2017<br/>ISBN&#160;9781119396215<br/>