Search Results for Electronic data processing - Narrowed by: Data protectionSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dElectronic$002bdata$002bprocessing$0026qf$003dSUBJECT$002509Subject$002509Data$002bprotection$002509Data$002bprotection$0026ps$003d300?dt=list2024-04-24T00:10:42ZResponsive security : be ready to be secureent://SD_ILS/0/SD_ILS:8372952024-04-24T00:10:42Z2024-04-24T00:10:42Zby Meng-Chow Kang author<br/>Author Meng-Chow Kang author<br/>Format: Books<br/>Call Number HF5548.37 K36 2014<br/>Publisher CRC Press/Taylor & Francis,<br/>Publication Date 2014<br/>ISBN 9781466584303<br/>Cyber security standards, practices and industrial applications : systems and methodologiesent://SD_ILS/0/SD_ILS:7729752024-04-24T00:10:42Z2024-04-24T00:10:42Zby Zubairi, Junaid Ahmed, 1961-<br/>Author Zubairi, Junaid Ahmed, 1961-, Mahboob, Athar, 1971-<br/>Format: Books<br/>Call Number TK5105.59 C93 2012 f<br/>Publisher Information Science Reference,<br/>Publication Date 2012<br/>ISBN 9781609608514 9781609608521 9781609608538<br/>Digital data integrity : the evolution from passive protection to active managementent://SD_ILS/0/SD_ILS:1640052024-04-24T00:10:42Z2024-04-24T00:10:42Zby Little, David B.<br/>Author Little, David B., Farmer, Skip, El-Hilali, Oussama<br/>Format: Books<br/>Call Number QA76.9.A25 L57 2007<br/>Publisher John Wiley & Sons,<br/>Publication Date 2007<br/>ISBN 9780470018279<br/>The Ciso handbook : a practical guide to securing your companyent://SD_ILS/0/SD_ILS:1566492024-04-24T00:10:42Z2024-04-24T00:10:42Zby Gentile, Mike<br/>Author Gentile, Mike, Collette, Ronald D., August, Thomas D.<br/>Format: Books<br/>Call Number HF5548.37 G46 2006<br/>Publisher Auerbach Publications,<br/>Publication Date 2006<br/>ISBN 9780849319525<br/>A practical guide to security assessmentsent://SD_ILS/0/SD_ILS:1566642024-04-24T00:10:42Z2024-04-24T00:10:42Zby Kairab, Sudhanshu<br/>Author Kairab, Sudhanshu<br/>Format: Books<br/>Call Number HF5548.32 K344 2005<br/>Publisher Auerbach Publications,<br/>Publication Date 2005<br/>ISBN 9780849317064<br/>Security guidelines of electronic academic assetsent://SD_ILS/0/SD_ILS:3220882024-04-24T00:10:42Z2024-04-24T00:10:42Zby Subariah Ibrahim<br/>Author Subariah Ibrahim, Mazleena Salleh, Shah Rizan Abdul Aziz, Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format: Books<br/>Call Number QA76.9.A25 S92 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Sistem maklumat pengurusan dan penerapan konsep pembelajaran secara elektronik bagi Akademi Pendidikan Pemandu (M) Sdn. Bhd.ent://SD_ILS/0/SD_ILS:212882024-04-24T00:10:42Z2024-04-24T00:10:42Zby Asmahani Kadir<br/>Author Asmahani Kadir<br/>Format: Visual Materials<br/>Call Number MFL 11961<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Penganalisisan corak Bahasa Melayu untuk kajian kriptografi ... [et al.]ent://SD_ILS/0/SD_ILS:138512024-04-24T00:10:42Z2024-04-24T00:10:42Zby Chua, Soo Yaw<br/>Author Chua, Soo Yaw, Mohd. Suhaizal Md. Kamari, Mona Effarina Zakaria, Nik Raihan Nik Omar, Wan Nur Ilyana Wan Zahari<br/>Format: Visual Materials<br/>Call Number MFL 10606<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/>Protecting business information : a manager's guideent://SD_ILS/0/SD_ILS:4674702024-04-24T00:10:42Z2024-04-24T00:10:42Zby Schweitzer, James A.<br/>Author Schweitzer, James A.<br/>Format: Books<br/>Call Number HD38.7 S34 1996<br/>Publisher Butterworth-Heinemann,<br/>Publication Date 1996<br/>ISBN 9780750696586<br/>EDP-securityent://SD_ILS/0/SD_ILS:1715102024-04-24T00:10:42Z2024-04-24T00:10:42Zby Frank, Lars<br/>Author Frank, Lars<br/>Format: Books<br/>Call Number QA76 F73 1992<br/>Publisher Elsevier Science,<br/>Publication Date 1992<br/>ISBN 9780444886088<br/>The support features for the intelligent terminal emulator; Building a network adapter card for IBM working in a ring topology local area network Part II; Building a standard central controller for local area network using star topology; Pengkod dan penyahkod DTMF Bahagian I (Perisian); Screen transferring and massege switching across a network; A point to point computer communication link using communication controller chip; Bit error rate measurement for high data transmission; Pemproses enkripsi piawai (Bahagian 3) : implementasi DES dengan perisianent://SD_ILS/0/SD_ILS:2712022024-04-24T00:10:42Z2024-04-24T00:10:42Zby Fauziah Hanim Omar<br/>Author Fauziah Hanim Omar, Jasmi Mohd Daron, Jayaseelan Manickam, Mohd. Zaki Yahaya, Ooi, Foong Yen<br/>Format: Books<br/>Call Number MFL 7750 ra<br/>Publisher UTM,<br/>Publication Date 1992<br/>Project paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1992<br/>Penyemak ejaan Bahasa Malaysia; Sistem sokongan kataputus untuk penjadualan waktu pemeriksaan : pelaksanaan pada komputer mikro; Penjanaan berkomputer ayat-ayat Bahasa Malaysia mudah; Pembentukan penghurai dalam pengkompil; Kajian keselamatan maklumat dalam Bahasa Malaysia yang telah dienkrip; Perisian pemampatan/nyahmampatan teksent://SD_ILS/0/SD_ILS:1667702024-04-24T00:10:42Z2024-04-24T00:10:42Zby Siti Nurliza Mokhtar<br/>Author Siti Nurliza Mokhtar, Hendri Dwisatrya Sabir Husin Athar, Mohd. Nasir A. Rahman, Zaleha @ Siti Zaleha Yusof, Zalila Sumari<br/>Format: Books<br/>Call Number MFL 3864-3869 ra<br/>Publication Date 1988<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1988<br/>A Handbook of computer securityent://SD_ILS/0/SD_ILS:1715982024-04-24T00:10:42Z2024-04-24T00:10:42Zby Hearnden, Keith<br/>Author Hearnden, Keith<br/>Format: Books<br/>Call Number HF5548.2.H363 1987<br/>Publisher Kogan page,<br/>Publication Date 1987<br/>ISBN 9781850913481<br/>