Search Results for Electronic data processing - Narrowed by: Computer securitySirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dElectronic$002bdata$002bprocessing$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ps$003d300?dt=list2024-03-29T01:54:41ZComputer security : principles and practiceent://SD_ILS/0/SD_ILS:8041492024-03-29T01:54:41Z2024-03-29T01:54:41Zby Stallings, William<br/>Author Stallings, William, Brown, Lawrie<br/>Format: Books<br/>Call Number QA76.9.A25 S73 2012<br/>Edition 2nd ed. International ed.<br/>Publisher Pearson,<br/>Publication Date 2012<br/>ISBN 9780273764496<br/>Cyber security standards, practices and industrial applications : systems and methodologiesent://SD_ILS/0/SD_ILS:7729752024-03-29T01:54:41Z2024-03-29T01:54:41Zby Zubairi, Junaid Ahmed, 1961-<br/>Author Zubairi, Junaid Ahmed, 1961-, Mahboob, Athar, 1971-<br/>Format: Books<br/>Call Number TK5105.59 C93 2012 f<br/>Publisher Information Science Reference,<br/>Publication Date 2012<br/>ISBN 9781609608514 9781609608521 9781609608538<br/>IT auditing : using controls to protect information assetsent://SD_ILS/0/SD_ILS:7612902024-03-29T01:54:41Z2024-03-29T01:54:41Zby Davis, Chris (Christopher Michael)<br/>Author Davis, Chris (Christopher Michael), Schiller, Mike, Wheeler, Kevin<br/>Format: Books<br/>Call Number QA76.9.A93 D38 2011<br/>Edition 2nd ed.<br/>Publisher McGraw-Hill,<br/>Publication Date 2011<br/>ISBN 9780071742382<br/>Machine learning forensics for law enforcement, security, and intelligenceent://SD_ILS/0/SD_ILS:7891342024-03-29T01:54:41Z2024-03-29T01:54:41Zby Mena, Jesus.<br/>Author Mena, Jesus.<br/>Format: Books<br/>Call Number HV8073 M395 2011<br/>Publisher Taylor & Francis,<br/>Publication Date 2011<br/>ISBN 9781439860694<br/>Matlab implementation of digital rights management systement://SD_ILS/0/SD_ILS:7656232024-03-29T01:54:41Z2024-03-29T01:54:41Zby Loh, Samuel Howe Chuen, 1986-<br/>Author Loh, Samuel Howe Chuen, 1986-, Mohamed Khalil Mohd Hani, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number XX(765623.1)<br/>Publication Date 2010<br/>Project Paper (Sarjana Muda Kejuruteraan (Elektrik - Mikroelektronik)) - Universiti Teknologi Malaysia, 2010<br/>IT audit, control, and securityent://SD_ILS/0/SD_ILS:7815272024-03-29T01:54:41Z2024-03-29T01:54:41Zby Moeller, Robert R.<br/>Author Moeller, Robert R.<br/>Format: Books<br/>Call Number T58.5 M644 2010<br/>Publisher Wiley,<br/>Publication Date 2010<br/>ISBN 9780471406761<br/>Distributed systems security : issues, processes and solutionsent://SD_ILS/0/SD_ILS:2821492024-03-29T01:54:41Z2024-03-29T01:54:41Zby Belapurkar, Abhijit<br/>Author Belapurkar, Abhijit<br/>Format: Books<br/>Call Number QA76.9.A25 D57 2009<br/>Publisher Wiley,<br/>Publication Date 2009<br/>ISBN 9780470519882<br/>Security engineering : a guide to building dependable distributed systemsent://SD_ILS/0/SD_ILS:2769572024-03-29T01:54:41Z2024-03-29T01:54:41Zby Anderson, Ross J.<br/>Author Anderson, Ross J.<br/>Format: Books<br/>Call Number QA76.9.A25 A56 2008<br/>Edition 2nd ed.<br/>Publisher John Wiley & Sons,<br/>Publication Date 2008<br/>ISBN 9780470068526<br/>Network security : private communications in a public worldent://SD_ILS/0/SD_ILS:3288602024-03-29T01:54:41Z2024-03-29T01:54:41Zby Kaufman, Charlie<br/>Author Kaufman, Charlie, Perlman, Radia, Speciner, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 K34 2008<br/>Edition 2nd ed.<br/>Publisher Prentice Hall of India,<br/>Publication Date 2008<br/>ISBN 9788120322134<br/>Electronic postage systems : technology, security, economicsent://SD_ILS/0/SD_ILS:1875652024-03-29T01:54:41Z2024-03-29T01:54:41Zby Bleumer, Gerrit<br/>Author Bleumer, Gerrit<br/>Format: Books<br/>Call Number HE6125 B53 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9780387293134<br/><a href="http://dx.doi.org/10.1007/978-0-387-44606-6">Full Text</a><br/>Accessible within UTM campus<br/>Electronic postage systems technology, security, economicsent://SD_ILS/0/SD_ILS:5170942024-03-29T01:54:41Z2024-03-29T01:54:41Zby Bleumer, Gerrit<br/>Author Bleumer, Gerrit, SpringerLink (Online service)<br/>Format: Computer file<br/>Call Number EB 000703<br/>Publisher Springer Science+Business Media, LLC,<br/>Publication Date 2007<br/>ISBN 9780387446066 9780387293134<br/><a href="http://dx.doi.org/10.1007/978-0-387-44606-6">Full Text</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>The Ciso handbook : a practical guide to securing your companyent://SD_ILS/0/SD_ILS:1566492024-03-29T01:54:41Z2024-03-29T01:54:41Zby Gentile, Mike<br/>Author Gentile, Mike, Collette, Ronald D., August, Thomas D.<br/>Format: Books<br/>Call Number HF5548.37 G46 2006<br/>Publisher Auerbach Publications,<br/>Publication Date 2006<br/>ISBN 9780849319525<br/>Trusted computing platforms : design and applicationsent://SD_ILS/0/SD_ILS:1189292024-03-29T01:54:41Z2024-03-29T01:54:41Zby Smith, Sean W.<br/>Author Smith, Sean W.<br/>Format: Books<br/>Call Number QA76.9.A25 S645 2005<br/>Publisher Springer,<br/>Publication Date 2005<br/>ISBN 9780387239163<br/>A practical guide to security assessmentsent://SD_ILS/0/SD_ILS:1566642024-03-29T01:54:41Z2024-03-29T01:54:41Zby Kairab, Sudhanshu<br/>Author Kairab, Sudhanshu<br/>Format: Books<br/>Call Number HF5548.32 K344 2005<br/>Publisher Auerbach Publications,<br/>Publication Date 2005<br/>ISBN 9780849317064<br/>Principles of computer security security and beyondent://SD_ILS/0/SD_ILS:6115992024-03-29T01:54:41Z2024-03-29T01:54:41Zby Conklin, Wm. Arthur<br/>Author Conklin, Wm. Arthur<br/>Format: Computer file<br/>Call Number CP 6460<br/>Publisher McGraw-Hill,<br/>Publication Date 2004<br/>ISBN 9780072256444<br/>Principles of computer security : security and beyondent://SD_ILS/0/SD_ILS:4241192024-03-29T01:54:41Z2024-03-29T01:54:41Zby Conklin, Wm. Arthur<br/>Author Conklin, Wm. Arthur<br/>Format: Books<br/>Call Number QA76.9.A25 P74 2004<br/>Publisher McGraw-Hill,<br/>Publication Date 2004<br/>ISBN 9780072255096<br/>Intrusion detection system for host computersent://SD_ILS/0/SD_ILS:79562024-03-29T01:54:41Z2024-03-29T01:54:41Zby Andrea Jok<br/>Author Andrea Jok<br/>Format: Visual Materials<br/>Call Number MFL 12898<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Sains komputer) - Universiti Teknologi Malaysia, 2003<br/>Mastering Web services securityent://SD_ILS/0/SD_ILS:3864442024-03-29T01:54:41Z2024-03-29T01:54:41Zby Hartman, Bret<br/>Author Hartman, Bret<br/>Format: Books<br/>Call Number QA76.9.A25 M374 2003<br/>Publisher Wiley Technology Pub.,<br/>Publication Date 2003<br/>ISBN 9780471267164<br/>Secure E-voting with blind signatureent://SD_ILS/0/SD_ILS:3274562024-03-29T01:54:41Z2024-03-29T01:54:41Zby Subariah Ibrahim<br/>Author Subariah Ibrahim, Maznah Kamat, 1960-, Mazleena Salleh, Shah Rizan Abdul Aziz, National Conference on Telecommunication Technology (4th : 2003 : Shah Alam, Selangor)<br/>Format: Books<br/>Call Number QA76.9.A25 S424 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Network security : private communication in a public worldent://SD_ILS/0/SD_ILS:3913992024-03-29T01:54:41Z2024-03-29T01:54:41Zby Kaufman, Charlie<br/>Author Kaufman, Charlie, Perlman, Radia, Speciner, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 K34 2002<br/>Edition 2nd ed.<br/>Publisher Prentice Hall PTR,<br/>Publication Date 2002<br/>ISBN 9780130460196<br/>Security guidelines of electronic academic assetsent://SD_ILS/0/SD_ILS:3220882024-03-29T01:54:41Z2024-03-29T01:54:41Zby Subariah Ibrahim<br/>Author Subariah Ibrahim, Mazleena Salleh, Shah Rizan Abdul Aziz, Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format: Books<br/>Call Number QA76.9.A25 S92 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Sistem faraid di dalam webent://SD_ILS/0/SD_ILS:205852024-03-29T01:54:41Z2024-03-29T01:54:41Zby Azwan Hazle Aminuddin<br/>Author Azwan Hazle Aminuddin<br/>Format: Visual Materials<br/>Call Number MFL 11992<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/>Access denied : the complete guide to protecting your business onlineent://SD_ILS/0/SD_ILS:3030272024-03-29T01:54:41Z2024-03-29T01:54:41Zby Cronkhite, Cathy<br/>Author Cronkhite, Cathy<br/>Format: Books<br/>Call Number LC belum proses<br/>Publisher Osborne / McGraw-Hill ,<br/>Publication Date 2001<br/>ISBN 9780072133684<br/>Pengimplementasian teknik cincangan dan penyulitan data dalam sistem pembayaran bil Maxis Mobile di internetent://SD_ILS/0/SD_ILS:209292024-03-29T01:54:41Z2024-03-29T01:54:41Zby Izatul Farita Yusof<br/>Author Izatul Farita Yusof<br/>Format: Visual Materials<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Project Paper(Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Network security monitoring software on network systement://SD_ILS/0/SD_ILS:1475012024-03-29T01:54:41Z2024-03-29T01:54:41Zby Tan, Kok Kuan<br/>Author Tan, Kok Kuan<br/>Format: Books<br/>Call Number QA76.9.A25 T36 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2000<br/>Security and control in information systems : a guide for business and accountingent://SD_ILS/0/SD_ILS:3645012024-03-29T01:54:41Z2024-03-29T01:54:41Zby Hawker, Andrew<br/>Author Hawker, Andrew<br/>Format: Books<br/>Call Number HF5548.35 H38 2000<br/>Publisher Routledge,<br/>Publication Date 2000<br/>ISBN 9780415205344<br/>Sistem kawalan keselamatan terpusat Universiti Teknologi Malaysia ... [et al.]ent://SD_ILS/0/SD_ILS:134042024-03-29T01:54:41Z2024-03-29T01:54:41Zby Balakrishnan Subramanian<br/>Author Balakrishnan Subramanian, Jainthi Rajoo, Lee, Yoke Mooi, Shanthan Subramaniam, Vijendran Subramaniam<br/>Format: Visual Materials<br/>Call Number MFL 9461<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Kertas projek (Sarjana Muda Kejuruteraan Komputer) - Universiti Teknologi Malaysia, 1999<br/>Security in distributed computing : did you lock the door?ent://SD_ILS/0/SD_ILS:1219912024-03-29T01:54:41Z2024-03-29T01:54:41Zby Bruce, Glen<br/>Author Bruce, Glen, Dempsey, Rob<br/>Format: Books<br/>Call Number QA76.9.A25 B78 1997<br/>Publisher Prentice Hall,<br/>Publication Date 1997<br/>ISBN 9780131829084<br/>Sampel aplikasi pemprosesan teragih dengan menggunakan perisian MPI; Pemprosesan teragih di persekitaran komputer peribadi; Pengsimulasi digital di komputer peribadi; Pemprosesan borang berelektronik; Sistem fail berkriptorent://SD_ILS/0/SD_ILS:76522024-03-29T01:54:41Z2024-03-29T01:54:41Zby Khor, Boon Ping<br/>Author Khor, Boon Ping, Mohd. Syamsul Maksud, Lee, Charlie Kheng Hui, Wong, Che Hau, Lee, Kon Seea<br/>Format: Visual Materials<br/>Call Number MFL 9033 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1997<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1997<br/>Computer securityent://SD_ILS/0/SD_ILS:4397212024-03-29T01:54:41Z2024-03-29T01:54:41Zby Carroll, John M. (John Millar), 1950-<br/>Author Carroll, John M. (John Millar), 1950-<br/>Format: Books<br/>Call Number HF5548.2 C37 1996<br/>Edition 3rd ed.<br/>Publisher Butterworth-Heinemann,<br/>Publication Date 1996<br/>ISBN 9780750696005<br/>Protecting business information : a manager's guideent://SD_ILS/0/SD_ILS:4674702024-03-29T01:54:41Z2024-03-29T01:54:41Zby Schweitzer, James A.<br/>Author Schweitzer, James A.<br/>Format: Books<br/>Call Number HD38.7 S34 1996<br/>Publisher Butterworth-Heinemann,<br/>Publication Date 1996<br/>ISBN 9780750696586<br/>Sistem pendaftaran matapelajaran fakulti menggunakan kad pintar; Kad pintar pelbagai kegunaan (modul sistem pilihanraya Majlis Perwakilan Pelajar); Kad pintar pelbagai kegunaan modul sistem fail mudahalih kakitangan; Sistem kad pintar pelbagai kegunaan modul sistem kawalan pintu; Kad pintar : pelbagai perkhidmatan modul sistem nilai bayar terdahuluent://SD_ILS/0/SD_ILS:146582024-03-29T01:54:41Z2024-03-29T01:54:41Zby Kamaruszaman Jufri<br/>Author Kamaruszaman Jufri, Lee, Gim Chuan, Nazaruddin Omar, 1971, Teh, Teong Wee, Wong, Twee Wan<br/>Format: Visual Materials<br/>Call Number MFL 8135 ra<br/>Publisher UTM,<br/>Publication Date 1994<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1994<br/>The support features for the intelligent terminal emulator; Building a network adapter card for IBM working in a ring topology local area network Part II; Building a standard central controller for local area network using star topology; Pengkod dan penyahkod DTMF Bahagian I (Perisian); Screen transferring and massege switching across a network; A point to point computer communication link using communication controller chip; Bit error rate measurement for high data transmission; Pemproses enkripsi piawai (Bahagian 3) : implementasi DES dengan perisianent://SD_ILS/0/SD_ILS:2712022024-03-29T01:54:41Z2024-03-29T01:54:41Zby Fauziah Hanim Omar<br/>Author Fauziah Hanim Omar, Jasmi Mohd Daron, Jayaseelan Manickam, Mohd. Zaki Yahaya, Ooi, Foong Yen<br/>Format: Books<br/>Call Number MFL 7750 ra<br/>Publisher UTM,<br/>Publication Date 1992<br/>Project paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1992<br/>Menentukan kedudukan stesen janakuasa elektrik; Pengawalan vektor motor aruhan; Penyelaku Z80 pada komputer peribadi IBM/XT Bahagian II; Sistem perlindungan arus lebih untuk pembelajaran; Kajian konsep kakisan pada perkakasan talian penghantaran disebabkan oleh pemendakan garam bahagian 1; Sistem keselamatan berasakan komputer peribadi IBM/XT; Penyelakuan digital mesin segerak menggunakan kuantiti fasa terus; Mengenal pasti kaedah menentukan perangkap luruan dengan menggunakan harmonik; Kaedah penurunan untuk model linear dalam sistem kuasa; Merekabentuk "petri net" dan ladder logic bagi proses berkumpulanent://SD_ILS/0/SD_ILS:1095122024-03-29T01:54:41Z2024-03-29T01:54:41Zby Khairul Anuar Shaharuddin<br/>Author Khairul Anuar Shaharuddin, Medhi Abd Rahman, Mohd. Daud Isa, Muhd Hadzir Abu Hassan, Mohd. Isnari Idris<br/>Format: Books<br/>Call Number MFL 7717 ra<br/>Publication Date 1991<br/>Kertas projek (Sarjana Muda Kejuruteraan Elektrik) -- Universiti TEknologi Malaysia, 1991<br/>Computer security handbookent://SD_ILS/0/SD_ILS:4816042024-03-29T01:54:41Z2024-03-29T01:54:41Zby Baker, Richard H.<br/>Author Baker, Richard H.<br/>Format: Books<br/>Call Number QA76.9.A25 B35 1991<br/>Edition 2nd ed.<br/>Publisher TAB Professional and Reference Books,<br/>Publication Date 1991<br/>ISBN 9780830675920<br/>Computer audit, control and securityent://SD_ILS/0/SD_ILS:1296882024-03-29T01:54:41Z2024-03-29T01:54:41Zby Moeller, Robert R.<br/>Author Moeller, Robert R.<br/>Format: Books<br/>Call Number QA76.9.A93 M63 1989<br/>Publisher Wiley,<br/>Publication Date 1989<br/>ISBN 9780471853107<br/>Computer audit, control and securityent://SD_ILS/0/SD_ILS:1297942024-03-29T01:54:41Z2024-03-29T01:54:41Zby Moeller, Robert R.<br/>Author Moeller, Robert R.<br/>Format: Books<br/>Call Number DSK 376<br/>Publisher Wiley,<br/>Publication Date 1989<br/>Security of computer based information systemsent://SD_ILS/0/SD_ILS:1810032024-03-29T01:54:41Z2024-03-29T01:54:41Zby Lane, V. P.<br/>Author Lane, V. P.<br/>Format: Books<br/>Call Number HF5548.2.L35 1985<br/>Publisher Macmillan Education,<br/>Publication Date 1985<br/>ISBN 9780333364369<br/>Computer securityent://SD_ILS/0/SD_ILS:2468762024-03-29T01:54:41Z2024-03-29T01:54:41Zby Carroll, John Millar, 1950-<br/>Author Carroll, John Millar, 1950-<br/>Format: Books<br/>Call Number HF5548.2 C37 1977<br/>Publisher Security Wold Pub.,<br/>Publication Date 1977<br/>ISBN 9780913708286<br/>Computer Security Digestent://SD_ILS/0/SD_ILS:5675442024-03-29T01:54:41Z2024-03-29T01:54:41ZFormat: Computer file<br/>Call Number http://proquest.umi.com/pqdweb<br/><a href="http://proquest.umi.com/pqdweb?RQT=318&TS=1089613007&clientId=21690&VType=PQD&VName=PQD&VInst=PROD&pmid=000034941&PageNum=1">Online access via ProQuest Computing</a><br/>Open access to UTM community only<br/>