Search Results for Insurance - Narrowed by: Computer security SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dInsurance$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ic$003dtrue$0026ps$003d300?dt=list 2024-05-19T04:49:48Z Cyber risk insurance policy a proposed frameworkfor e-business in Malaysia ent://SD_ILS/0/SD_ILS:590571 2024-05-19T04:49:48Z 2024-05-19T04:49:48Z by&#160;Lee, Siok Hwee, 1979-<br/>Author&#160;Lee, Siok Hwee, 1979-,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 019845 ra<br/>Publication Date&#160;2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/> Cyber risk insurance policy a proposed frameworkfor e-business in Malaysia ent://SD_ILS/0/SD_ILS:322219 2024-05-19T04:49:48Z 2024-05-19T04:49:48Z by&#160;Lee, Siok Hwee, 1979-<br/>Author&#160;Lee, Siok Hwee, 1979-,&#160;Rabiah Ahmad, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;HQ784.I58 L43 2009 raf<br/>Publication Date&#160;2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/> Managing risk in information systems ent://SD_ILS/0/SD_ILS:839128 2024-05-19T04:49:48Z 2024-05-19T04:49:48Z by&#160;Gibson, Darril, author<br/>Author&#160;Gibson, Darril, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G53 2015<br/>Edition&#160;Second edition<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781284055955<br/> Security policies and implementation issues ent://SD_ILS/0/SD_ILS:839131 2024-05-19T04:49:48Z 2024-05-19T04:49:48Z by&#160;Johnson, Robert, 1946- author<br/>Author&#160;Johnson, Robert, 1946- author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 J64 2015<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781284055993<br/> Security strategies in Linux platforms and applications ent://SD_ILS/0/SD_ILS:764154 2024-05-19T04:49:48Z 2024-05-19T04:49:48Z by&#160;Jang, Michael H.<br/>Author&#160;Jang, Michael H.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.76.O63 J366 2011<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780763791896<br/> Information assurance and security ethics in complex systems : interdisciplinary perspectives ent://SD_ILS/0/SD_ILS:630427 2024-05-19T04:49:48Z 2024-05-19T04:49:48Z by&#160;Dark, Melissa Jane, 1961-<br/>Author&#160;Dark, Melissa Jane, 1961-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 I545 2011 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781616922450&#160;9781616922467<br/> Information assurance architecture ent://SD_ILS/0/SD_ILS:282892 2024-05-19T04:49:48Z 2024-05-19T04:49:48Z by&#160;WIllett, Keith D.<br/>Author&#160;WIllett, Keith D.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W54 2008<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780849380679<br/> Information assurance : dependability and security in networked systems ent://SD_ILS/0/SD_ILS:248086 2024-05-19T04:49:48Z 2024-05-19T04:49:48Z by&#160;Qian, Yi, 1962-<br/>Author&#160;Qian, Yi, 1962-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 I58 2008<br/>Publisher&#160;Elsevier/Morgan Kaufmann,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780123735669<br/> Fuzzing for software security testing and quality assurance ent://SD_ILS/0/SD_ILS:263804 2024-05-19T04:49:48Z 2024-05-19T04:49:48Z by&#160;Takanen, Ari<br/>Author&#160;Takanen, Ari,&#160;Demott, Jared D.,&#160;Miller, Charles, 1951-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T344 2008<br/>Publisher&#160;Artech House Publishers,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781596932142<br/> Computational intelligence in information assurance and security ent://SD_ILS/0/SD_ILS:196712 2024-05-19T04:49:48Z 2024-05-19T04:49:48Z by&#160;Nedjah, Nadia<br/>Author&#160;Nedjah, Nadia,&#160;Abraham, Ajith, 1968-,&#160;Mourelle, Luiza de Macedo<br/>Format:&#160;Books<br/>Call Number&#160;Q342 C657 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9783540710776<br/><a href="http://dx.doi.org/10.1007/978-3-540-71078-3">Full Text</a><br/> Information assurance for the enterprise : a roadmap to information security ent://SD_ILS/0/SD_ILS:103417 2024-05-19T04:49:48Z 2024-05-19T04:49:48Z by&#160;Schou, Corey<br/>Author&#160;Schou, Corey,&#160;Shoemaker, Dan<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S365 2007<br/>Publisher&#160;McGraw-Hill/Irwin,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780072255249<br/> Enterprise information systems assurance and system security : managerial and technical issues ent://SD_ILS/0/SD_ILS:104558 2024-05-19T04:49:48Z 2024-05-19T04:49:48Z by&#160;Warkentin, Merrill<br/>Author&#160;Warkentin, Merrill,&#160;Vaughn, Rayford, 1947-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 E574 2006<br/>Publisher&#160;Idea Group Publishing,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781591409113<br/> Information assurance : security in the information environment ent://SD_ILS/0/SD_ILS:94547 2024-05-19T04:49:48Z 2024-05-19T04:49:48Z by&#160;Blyth, Andrew, 1966-<br/>Author&#160;Blyth, Andrew, 1966-,&#160;Kovacich, Gerald L.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B59 2006<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781846282669<br/> Computer security assurance using the common criteria ent://SD_ILS/0/SD_ILS:451172 2024-05-19T04:49:48Z 2024-05-19T04:49:48Z by&#160;Merkow, Mark S.<br/>Author&#160;Merkow, Mark S.,&#160;Breithaupt, Jim<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M47 2004<br/>Publisher&#160;Thomson Delmar Learning,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781401862657<br/> Principles of computer security security and beyond ent://SD_ILS/0/SD_ILS:611599 2024-05-19T04:49:48Z 2024-05-19T04:49:48Z by&#160;Conklin, Wm. Arthur<br/>Author&#160;Conklin, Wm. Arthur<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 6460<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780072256444<br/> Principles of computer security : security and beyond ent://SD_ILS/0/SD_ILS:424119 2024-05-19T04:49:48Z 2024-05-19T04:49:48Z by&#160;Conklin, Wm. Arthur<br/>Author&#160;Conklin, Wm. Arthur<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P74 2004<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780072255096<br/> Information assurance : managing organizational IT security risks ent://SD_ILS/0/SD_ILS:756834 2024-05-19T04:49:48Z 2024-05-19T04:49:48Z by&#160;Boyce, Joseph George, 1951-<br/>Author&#160;Boyce, Joseph George, 1951-,&#160;Jennings, Dan Wesley, 1954-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B69 2002<br/>Publisher&#160;Butterworth-Heinemann,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780750673273<br/> A practical guide to security engineering and information assurance ent://SD_ILS/0/SD_ILS:424029 2024-05-19T04:49:48Z 2024-05-19T04:49:48Z by&#160;Herrmann, Debra S.<br/>Author&#160;Herrmann, Debra S.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H474 2002<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2002&#160;2001<br/>ISBN&#160;9780849311635<br/> Kiosk maklumat sistem semester FSKSM, UTM ent://SD_ILS/0/SD_ILS:7314 2024-05-19T04:49:48Z 2024-05-19T04:49:48Z by&#160;Ahmad Safuan Abu Bakar<br/>Author&#160;Ahmad Safuan Abu Bakar<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12823<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/> AN EFFECTIVE MODEL TO MEASURE STUDENTS&rsquo; AWARENESS FOR NON-TECHNICAL ASPECTS OF INFORMATION ASSURANCE ent://SD_ILS/0/SD_ILS:859336 2024-05-19T04:49:48Z 2024-05-19T04:49:48Z by&#160;al-Idriss, Sultan Faydullah M., 1987-, author<br/>Author&#160;al-Idriss, Sultan Faydullah M., 1987-, author,&#160;Mohd. Shahidan Abdullah, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S858 2014 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2014<br/> AN EFFECTIVE MODEL TO MEASURE STUDENTS&rsquo; AWARENESS FOR NON-TECHNICAL ASPECTS OF INFORMATION ASSURANCE ent://SD_ILS/0/SD_ILS:859605 2024-05-19T04:49:48Z 2024-05-19T04:49:48Z by&#160;al-Idriss, Sultan Faydullah M., 1987-, author<br/>Author&#160;al-Idriss, Sultan Faydullah M., 1987-, author,&#160;Mohd. Shahidan Abdullah, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034735 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2014<br/> Proposing Guidelines for Improving Information Assurance Awareness based on Information Security Awareness Measurement Framework ent://SD_ILS/0/SD_ILS:862737 2024-05-19T04:49:48Z 2024-05-19T04:49:48Z by&#160;Heng, Shun Ling, author<br/>Author&#160;Heng, Shun Ling, author,&#160;Ganthan Narayana Samy, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H46 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> Proposing Guidelines for Improving Information Assurance Awareness based on Information Security Awareness Measurement Framework ent://SD_ILS/0/SD_ILS:862939 2024-05-19T04:49:48Z 2024-05-19T04:49:48Z by&#160;Heng, Shun Ling, author<br/>Author&#160;Heng, Shun Ling, author,&#160;Ganthan Narayana Samy, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 035044 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>