Search Results for Electronic data processing - Narrowed by: Computers -- Access controlSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dElectronic$002bdata$002bprocessing$0026qf$003dSUBJECT$002509Subject$002509Computers$002b--$002bAccess$002bcontrol$002509Computers$002b--$002bAccess$002bcontrol$0026ps$003d300?dt=list2024-04-26T05:56:21ZAdvances in computer system securityent://SD_ILS/0/SD_ILS:1729312024-04-26T05:56:21Z2024-04-26T05:56:21Zby Turn, Rein,. 1931-<br/>Author Turn, Rein,. 1931-<br/>Format: Books<br/>Call Number QA76.9.A25 A38 1981-1988<br/>Publisher Artech House,<br/>Publication Date 2020 2019 2018 2017 2016<br/>ISBN 9780890061541 9780890060964<br/>Enhancing time-stamping techniqe by implementing media access control addressent://SD_ILS/0/SD_ILS:8037832024-04-26T05:56:21Z2024-04-26T05:56:21Zby Pacu Putra Suarli, 1989-<br/>Author Pacu Putra Suarli, 1989-, Mazleena Salleh, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 P33 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Enhancing time-stamping techniqe by implementing media access control addressent://SD_ILS/0/SD_ILS:8040882024-04-26T05:56:21Z2024-04-26T05:56:21Zby Pacu Putra Suarli, 1989-<br/>Author Pacu Putra Suarli, 1989-<br/>Format: Books<br/>Call Number CP 030214 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat))) - Universiti Teknologi Malaysia, 2013<br/>Network security : private communications in a public worldent://SD_ILS/0/SD_ILS:3288602024-04-26T05:56:21Z2024-04-26T05:56:21Zby Kaufman, Charlie<br/>Author Kaufman, Charlie, Perlman, Radia, Speciner, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 K34 2008<br/>Edition 2nd ed.<br/>Publisher Prentice Hall of India,<br/>Publication Date 2008<br/>ISBN 9788120322134<br/>Network security : private communication in a public worldent://SD_ILS/0/SD_ILS:3913992024-04-26T05:56:21Z2024-04-26T05:56:21Zby Kaufman, Charlie<br/>Author Kaufman, Charlie, Perlman, Radia, Speciner, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 K34 2002<br/>Edition 2nd ed.<br/>Publisher Prentice Hall PTR,<br/>Publication Date 2002<br/>ISBN 9780130460196<br/>Pengimplementasian teknik cincangan dan penyulitan data dalam sistem pembayaran bil Maxis Mobile di internetent://SD_ILS/0/SD_ILS:209292024-04-26T05:56:21Z2024-04-26T05:56:21Zby Izatul Farita Yusof<br/>Author Izatul Farita Yusof<br/>Format: Visual Materials<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Project Paper(Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Penganalisisan corak Bahasa Melayu untuk kajian kriptografi ... [et al.]ent://SD_ILS/0/SD_ILS:138512024-04-26T05:56:21Z2024-04-26T05:56:21Zby Chua, Soo Yaw<br/>Author Chua, Soo Yaw, Mohd. Suhaizal Md. Kamari, Mona Effarina Zakaria, Nik Raihan Nik Omar, Wan Nur Ilyana Wan Zahari<br/>Format: Visual Materials<br/>Call Number MFL 10606<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/>Network security monitoring software on network systement://SD_ILS/0/SD_ILS:1475012024-04-26T05:56:21Z2024-04-26T05:56:21Zby Tan, Kok Kuan<br/>Author Tan, Kok Kuan<br/>Format: Books<br/>Call Number QA76.9.A25 T36 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2000<br/>Sistem kawalan inventori pusat perubatanent://SD_ILS/0/SD_ILS:157712024-04-26T05:56:21Z2024-04-26T05:56:21Zby Hafiza Ibrahim<br/>Author Hafiza Ibrahim<br/>Format: Visual Materials<br/>Call Number MFL 11127<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/>Sistem kawalan kualiti bahagian 'Housing Product' Matsushita Electric Co. (M) Bhd.ent://SD_ILS/0/SD_ILS:167132024-04-26T05:56:21Z2024-04-26T05:56:21Zby Haslinda M. Ros<br/>Author Haslinda M. Ros<br/>Format: Visual Materials<br/>Call Number MFL 11194<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/>Computers and securityent://SD_ILS/0/SD_ILS:5404372024-04-26T05:56:21Z2024-04-26T05:56:21ZFormat: Continuing Resources<br/>Call Number QA76.4.C65<br/>Publisher North-Holland Pub,<br/>Publication Date 1999 1998 1997 1996 1995<br/>ISSN 01674048<br/><a href="http://www.sciencedirect.com/science/journal/01674048">Covers from Vol. 14, Issue 1, (1995) to present</a><br/>Accessible within UTM campus<br/>Technology's march towards total securityent://SD_ILS/0/SD_ILS:62302024-04-26T05:56:21Z2024-04-26T05:56:21Zby Akumanyi, Kofi<br/>Author Akumanyi, Kofi<br/>Format: Maps<br/>Call Number FTG 973<br/>Publisher London Press Service,<br/>Publication Date 1997<br/>Security mechanisms for computer networksent://SD_ILS/0/SD_ILS:1916662024-04-26T05:56:21Z2024-04-26T05:56:21Zby Muftic, Sead<br/>Author Muftic, Sead<br/>Format: Books<br/>Call Number QA76.9.A25 S42 1989<br/>Publisher Ellis Horwood,<br/>Publication Date 1989<br/>ISBN 9780745806136<br/>Computer and communications security : strategies for the 1990sent://SD_ILS/0/SD_ILS:4546272024-04-26T05:56:21Z2024-04-26T05:56:21Zby Cooper, James Arlin<br/>Author Cooper, James Arlin<br/>Format: Books<br/>Call Number QA76.9.A25 C67 1989<br/>Publisher McGraw-Hill,<br/>Publication Date 1989<br/>ISBN 9780070129269<br/>Auditing computer security : a manual with case studiesent://SD_ILS/0/SD_ILS:1048612024-04-26T05:56:21Z2024-04-26T05:56:21Zby Vallabhaneni, S. Rao<br/>Author Vallabhaneni, S. Rao<br/>Format: Books<br/>Call Number QA76.9.A25 V35 1989 f<br/>Publisher Wiley,<br/>Publication Date 1989<br/>ISBN 9780471626046<br/>Penyemak ejaan Bahasa Malaysia; Sistem sokongan kataputus untuk penjadualan waktu pemeriksaan : pelaksanaan pada komputer mikro; Penjanaan berkomputer ayat-ayat Bahasa Malaysia mudah; Pembentukan penghurai dalam pengkompil; Kajian keselamatan maklumat dalam Bahasa Malaysia yang telah dienkrip; Perisian pemampatan/nyahmampatan teksent://SD_ILS/0/SD_ILS:1667702024-04-26T05:56:21Z2024-04-26T05:56:21Zby Siti Nurliza Mokhtar<br/>Author Siti Nurliza Mokhtar, Hendri Dwisatrya Sabir Husin Athar, Mohd. Nasir A. Rahman, Zaleha @ Siti Zaleha Yusof, Zalila Sumari<br/>Format: Books<br/>Call Number MFL 3864-3869 ra<br/>Publication Date 1988<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1988<br/>A Handbook of computer securityent://SD_ILS/0/SD_ILS:1715982024-04-26T05:56:21Z2024-04-26T05:56:21Zby Hearnden, Keith<br/>Author Hearnden, Keith<br/>Format: Books<br/>Call Number HF5548.2.H363 1987<br/>Publisher Kogan page,<br/>Publication Date 1987<br/>ISBN 9781850913481<br/>Computer securityent://SD_ILS/0/SD_ILS:1824672024-04-26T05:56:21Z2024-04-26T05:56:21Zby Carrol, John M.<br/>Author Carrol, John M.<br/>Format: Books<br/>Call Number HF5548.2.C27 1987<br/>Edition 2nd ed<br/>Publisher Butterworth Pub.,<br/>Publication Date 1987<br/>ISBN 9780409900323<br/>Computers, business and security : the new role for securityent://SD_ILS/0/SD_ILS:4687072024-04-26T05:56:21Z2024-04-26T05:56:21Zby Schweitzer, James A.<br/>Author Schweitzer, James A.<br/>Format: Books<br/>Call Number QA76.9.A25 S23 1987<br/>Publisher Butterworths,<br/>Publication Date 1987<br/>ISBN 9780409900651<br/>Computer auditing, security and internal control manualent://SD_ILS/0/SD_ILS:4506502024-04-26T05:56:21Z2024-04-26T05:56:21Zby Kuong, Javier F.<br/>Author Kuong, Javier F.<br/>Format: Books<br/>Call Number QA76.9.A25 K86 1987<br/>Publisher Prentice-Hall,<br/>Publication Date 1987<br/>ISBN 9780131629677<br/>Spies in the wiresent://SD_ILS/0/SD_ILS:96662024-04-26T05:56:21Z2024-04-26T05:56:21ZFormat: Visual Materials<br/>Call Number KVD 446<br/>Publisher BBC,<br/>Publication Date 1985<br/>Computer-security technologyent://SD_ILS/0/SD_ILS:4665612024-04-26T05:56:21Z2024-04-26T05:56:21Zby Cooper, James Arlin<br/>Author Cooper, James Arlin<br/>Format: Books<br/>Call Number QA76.9.A25 C66 1984<br/>Publisher Lexington Books,<br/>Publication Date 1984<br/>ISBN 9780669064360<br/>Information systems securityent://SD_ILS/0/SD_ILS:2367372024-04-26T05:56:21Z2024-04-26T05:56:21Zby Fisher, Royal P., 1932-<br/>Author Fisher, Royal P., 1932-<br/>Format: Books<br/>Call Number HF5548.2.F57 1984<br/>Publisher Prentice-Hall,<br/>Publication Date 1984<br/>ISBN 9780134647272<br/>How to prevent computer crime : a guide for managersent://SD_ILS/0/SD_ILS:1705312024-04-26T05:56:21Z2024-04-26T05:56:21Zby Bequai, August<br/>Author Bequai, August<br/>Format: Books<br/>Call Number HF5548.2B44 1983<br/>Publisher Wiley<br/>Publication Date 1983<br/>ISBN 9780471093671<br/>Information intergrity : a structures for its defination and managementent://SD_ILS/0/SD_ILS:4570992024-04-26T05:56:21Z2024-04-26T05:56:21Zby Becker, Hal B.<br/>Author Becker, Hal B.<br/>Format: Books<br/>Call Number QA76.9.M3 B42 1983<br/>Publisher McGraw-Hill,<br/>Publication Date 1983<br/>ISBN 9780070041912<br/>Geodetic computation crime : a guide for managersent://SD_ILS/0/SD_ILS:2918732024-04-26T05:56:21Z2024-04-26T05:56:21Zby Bequai, August<br/>Author Bequai, August<br/>Format: Books<br/>Call Number HF5548.2 B44 1983<br/>Publisher John Wiley,<br/>Publication Date 1983<br/>ISBN 9780471093671<br/>Computer fraud and counter measuresent://SD_ILS/0/SD_ILS:4628502024-04-26T05:56:21Z2024-04-26T05:56:21Zby Krauss, Leonard I.<br/>Author Krauss, Leonard I., Macgahan, Aileen<br/>Format: Books<br/>Call Number HV6773.K73 1979<br/>Publisher Prentice-Hall,<br/>Publication Date 1979<br/>ISBN 9780131647725<br/>Computer securityent://SD_ILS/0/SD_ILS:2960082024-04-26T05:56:21Z2024-04-26T05:56:21Zby Hsiao, David K.<br/>Author Hsiao, David K., Kerr, Douglas S., Madnick, Stuart E.<br/>Format: Books<br/>Call Number QA76.9.A25 H74 1979<br/>Publisher Academic,<br/>Publication Date 1979<br/>ISBN 9780123576507<br/>