Search Results for Electronic data processing - Narrowed by: Computers -- Access control SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dElectronic$002bdata$002bprocessing$0026qf$003dSUBJECT$002509Subject$002509Computers$002b--$002bAccess$002bcontrol$002509Computers$002b--$002bAccess$002bcontrol$0026ps$003d300?dt=list 2024-04-26T05:56:21Z Advances in computer system security ent://SD_ILS/0/SD_ILS:172931 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z by&#160;Turn, Rein,. 1931-<br/>Author&#160;Turn, Rein,. 1931-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A38 1981-1988<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2020&#160;2019&#160;2018&#160;2017&#160;2016<br/>ISBN&#160;9780890061541&#160;9780890060964<br/> Enhancing time-stamping techniqe by implementing media access control address ent://SD_ILS/0/SD_ILS:803783 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z by&#160;Pacu Putra Suarli, 1989-<br/>Author&#160;Pacu Putra Suarli, 1989-,&#160;Mazleena Salleh,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P33 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Enhancing time-stamping techniqe by implementing media access control address ent://SD_ILS/0/SD_ILS:804088 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z by&#160;Pacu Putra Suarli, 1989-<br/>Author&#160;Pacu Putra Suarli, 1989-<br/>Format:&#160;Books<br/>Call Number&#160;CP 030214 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat))) - Universiti Teknologi Malaysia, 2013<br/> Network security : private communications in a public world ent://SD_ILS/0/SD_ILS:328860 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z by&#160;Kaufman, Charlie<br/>Author&#160;Kaufman, Charlie,&#160;Perlman, Radia,&#160;Speciner, Michael<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K34 2008<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Prentice Hall of India,<br/>Publication Date&#160;2008<br/>ISBN&#160;9788120322134<br/> Network security : private communication in a public world ent://SD_ILS/0/SD_ILS:391399 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z by&#160;Kaufman, Charlie<br/>Author&#160;Kaufman, Charlie,&#160;Perlman, Radia,&#160;Speciner, Michael<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K34 2002<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Prentice Hall PTR,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780130460196<br/> Pengimplementasian teknik cincangan dan penyulitan data dalam sistem pembayaran bil Maxis Mobile di internet ent://SD_ILS/0/SD_ILS:20929 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z by&#160;Izatul Farita Yusof<br/>Author&#160;Izatul Farita Yusof<br/>Format:&#160;Visual Materials<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/>Project Paper(Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/> Penganalisisan corak Bahasa Melayu untuk kajian kriptografi ... [et al.] ent://SD_ILS/0/SD_ILS:13851 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z by&#160;Chua, Soo Yaw<br/>Author&#160;Chua, Soo Yaw,&#160;Mohd. Suhaizal Md. Kamari,&#160;Mona Effarina Zakaria,&#160;Nik Raihan Nik Omar,&#160;Wan Nur Ilyana Wan Zahari<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 10606<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/> Network security monitoring software on network system ent://SD_ILS/0/SD_ILS:147501 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z by&#160;Tan, Kok Kuan<br/>Author&#160;Tan, Kok Kuan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T36 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 2000<br/> Sistem kawalan inventori pusat perubatan ent://SD_ILS/0/SD_ILS:15771 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z by&#160;Hafiza Ibrahim<br/>Author&#160;Hafiza Ibrahim<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 11127<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/> Sistem kawalan kualiti bahagian 'Housing Product' Matsushita Electric Co. (M) Bhd. ent://SD_ILS/0/SD_ILS:16713 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z by&#160;Haslinda M. Ros<br/>Author&#160;Haslinda M. Ros<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 11194<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/> Computers and security ent://SD_ILS/0/SD_ILS:540437 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z Format:&#160;Continuing Resources<br/>Call Number&#160;QA76.4.C65<br/>Publisher&#160;North-Holland Pub,<br/>Publication Date&#160;1999&#160;1998&#160;1997&#160;1996&#160;1995<br/>ISSN&#160;01674048<br/><a href="http://www.sciencedirect.com/science/journal/01674048">Covers from Vol. 14, Issue 1, (1995) to present</a><br/>Accessible within UTM campus<br/> Technology's march towards total security ent://SD_ILS/0/SD_ILS:6230 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z by&#160;Akumanyi, Kofi<br/>Author&#160;Akumanyi, Kofi<br/>Format:&#160;Maps<br/>Call Number&#160;FTG 973<br/>Publisher&#160;London Press Service,<br/>Publication Date&#160;1997<br/> Security mechanisms for computer networks ent://SD_ILS/0/SD_ILS:191666 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z by&#160;Muftic, Sead<br/>Author&#160;Muftic, Sead<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S42 1989<br/>Publisher&#160;Ellis Horwood,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780745806136<br/> Computer and communications security : strategies for the 1990s ent://SD_ILS/0/SD_ILS:454627 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z by&#160;Cooper, James Arlin<br/>Author&#160;Cooper, James Arlin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C67 1989<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780070129269<br/> Auditing computer security : a manual with case studies ent://SD_ILS/0/SD_ILS:104861 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z by&#160;Vallabhaneni, S. Rao<br/>Author&#160;Vallabhaneni, S. Rao<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 V35 1989 f<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;1989<br/>ISBN&#160;9780471626046<br/> Penyemak ejaan Bahasa Malaysia; Sistem sokongan kataputus untuk penjadualan waktu pemeriksaan : pelaksanaan pada komputer mikro; Penjanaan berkomputer ayat-ayat Bahasa Malaysia mudah; Pembentukan penghurai dalam pengkompil; Kajian keselamatan maklumat dalam Bahasa Malaysia yang telah dienkrip; Perisian pemampatan/nyahmampatan teks ent://SD_ILS/0/SD_ILS:166770 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z by&#160;Siti Nurliza Mokhtar<br/>Author&#160;Siti Nurliza Mokhtar,&#160;Hendri Dwisatrya Sabir Husin Athar,&#160;Mohd. Nasir A. Rahman,&#160;Zaleha @ Siti Zaleha Yusof,&#160;Zalila Sumari<br/>Format:&#160;Books<br/>Call Number&#160;MFL 3864-3869 ra<br/>Publication Date&#160;1988<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1988<br/> A Handbook of computer security ent://SD_ILS/0/SD_ILS:171598 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z by&#160;Hearnden, Keith<br/>Author&#160;Hearnden, Keith<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.H363 1987<br/>Publisher&#160;Kogan page,<br/>Publication Date&#160;1987<br/>ISBN&#160;9781850913481<br/> Computer security ent://SD_ILS/0/SD_ILS:182467 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z by&#160;Carrol, John M.<br/>Author&#160;Carrol, John M.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.C27 1987<br/>Edition&#160;2nd ed<br/>Publisher&#160;Butterworth Pub.,<br/>Publication Date&#160;1987<br/>ISBN&#160;9780409900323<br/> Computers, business and security : the new role for security ent://SD_ILS/0/SD_ILS:468707 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z by&#160;Schweitzer, James A.<br/>Author&#160;Schweitzer, James A.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S23 1987<br/>Publisher&#160;Butterworths,<br/>Publication Date&#160;1987<br/>ISBN&#160;9780409900651<br/> Computer auditing, security and internal control manual ent://SD_ILS/0/SD_ILS:450650 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z by&#160;Kuong, Javier F.<br/>Author&#160;Kuong, Javier F.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K86 1987<br/>Publisher&#160;Prentice-Hall,<br/>Publication Date&#160;1987<br/>ISBN&#160;9780131629677<br/> Spies in the wires ent://SD_ILS/0/SD_ILS:9666 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z Format:&#160;Visual Materials<br/>Call Number&#160;KVD 446<br/>Publisher&#160;BBC,<br/>Publication Date&#160;1985<br/> Computer-security technology ent://SD_ILS/0/SD_ILS:466561 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z by&#160;Cooper, James Arlin<br/>Author&#160;Cooper, James Arlin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C66 1984<br/>Publisher&#160;Lexington Books,<br/>Publication Date&#160;1984<br/>ISBN&#160;9780669064360<br/> Information systems security ent://SD_ILS/0/SD_ILS:236737 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z by&#160;Fisher, Royal P., 1932-<br/>Author&#160;Fisher, Royal P., 1932-<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2.F57 1984<br/>Publisher&#160;Prentice-Hall,<br/>Publication Date&#160;1984<br/>ISBN&#160;9780134647272<br/> How to prevent computer crime : a guide for managers ent://SD_ILS/0/SD_ILS:170531 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z by&#160;Bequai, August<br/>Author&#160;Bequai, August<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2B44 1983<br/>Publisher&#160;Wiley<br/>Publication Date&#160;1983<br/>ISBN&#160;9780471093671<br/> Information intergrity : a structures for its defination and management ent://SD_ILS/0/SD_ILS:457099 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z by&#160;Becker, Hal B.<br/>Author&#160;Becker, Hal B.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.M3 B42 1983<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;1983<br/>ISBN&#160;9780070041912<br/> Geodetic computation crime : a guide for managers ent://SD_ILS/0/SD_ILS:291873 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z by&#160;Bequai, August<br/>Author&#160;Bequai, August<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.2 B44 1983<br/>Publisher&#160;John Wiley,<br/>Publication Date&#160;1983<br/>ISBN&#160;9780471093671<br/> Computer fraud and counter measures ent://SD_ILS/0/SD_ILS:462850 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z by&#160;Krauss, Leonard I.<br/>Author&#160;Krauss, Leonard I.,&#160;Macgahan, Aileen<br/>Format:&#160;Books<br/>Call Number&#160;HV6773.K73 1979<br/>Publisher&#160;Prentice-Hall,<br/>Publication Date&#160;1979<br/>ISBN&#160;9780131647725<br/> Computer security ent://SD_ILS/0/SD_ILS:296008 2024-04-26T05:56:21Z 2024-04-26T05:56:21Z by&#160;Hsiao, David K.<br/>Author&#160;Hsiao, David K.,&#160;Kerr, Douglas S.,&#160;Madnick, Stuart E.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H74 1979<br/>Publisher&#160;Academic,<br/>Publication Date&#160;1979<br/>ISBN&#160;9780123576507<br/>