Search Results for Internet (Computer network) - Narrowed by: Books - Computer networks -- Security measuresSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dInternet$002b$002528Computer$002bnetwork$002529$0026qf$003dFORMAT$002509Format$002509BOOK$002509Books$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$0026ps$003d300?dt=list2024-04-23T16:47:37ZComputer Security Fundamentalsent://SD_ILS/0/SD_ILS:8861352024-04-23T16:47:37Z2024-04-23T16:47:37Zby Easttom, Chuck, author<br/>Author Easttom, Chuck, author<br/>Format: Books<br/>Call Number QA76.9.A25 E27 2020<br/>Edition Fourth Edition<br/>Publication Date 2020<br/>ISBN 9780135774779<br/>Security in IoT-Enabled Spaceent://SD_ILS/0/SD_ILS:8822842024-04-23T16:47:37Z2024-04-23T16:47:37Zby Al-Turjman, Fadi, author<br/>Author Al-Turjman, Fadi, author<br/>Format: Books<br/>Call Number TK5105.8857 A48 2019<br/>Publication Date 2019<br/>ISBN 9780367111236<br/>Network Forensicsent://SD_ILS/0/SD_ILS:8731732024-04-23T16:47:37Z2024-04-23T16:47:37Zby Messier, Ric, author<br/>Author Messier, Ric, author<br/>Format: Books<br/>Call Number TK5105.59 M47 2017<br/>Publication Date 2017<br/>ISBN 9781119328285<br/>Computational network science : an algorithmic approachent://SD_ILS/0/SD_ILS:8383722024-04-23T16:47:37Z2024-04-23T16:47:37Zby Hexmoor, Henry, author<br/>Author Hexmoor, Henry, author<br/>Format: Books<br/>Call Number TK5105.59 H49 2015<br/>Publisher Morgan Kaufmann,<br/>Publication Date 2015<br/>ISBN 9780128008911<br/>Advances in secure computing, internet services, and applicationsent://SD_ILS/0/SD_ILS:8412032024-04-23T16:47:37Z2024-04-23T16:47:37Zby Tripathy, B. K. editor<br/>Author Tripathy, B. K. editor, Acharjya, D. P. editor<br/>Format: Books<br/>Call Number TK5105.59 A38 2014 f<br/>Publisher Information Science Reference, an imprint of IGI Global,<br/>Publication Date 2014<br/>ISBN 9781466649408<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:8380762024-04-23T16:47:37Z2024-04-23T16:47:37Zby Carvey, Harlan A., author<br/>Author Carvey, Harlan A., author<br/>Format: Books<br/>Call Number HV8079.C65 C374 2014<br/>Edition Fourth edition<br/>Publisher Syngress,<br/>Publication Date 2014<br/>ISBN 9780124171572<br/>Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and dataent://SD_ILS/0/SD_ILS:6404622024-04-23T16:47:37Z2024-04-23T16:47:37Zby Lillard, Terrence V.<br/>Author Lillard, Terrence V., Lillard, Terrence<br/>Format: Books<br/>Call Number HV8079.C65 D54 2010<br/>Publisher Syngress,<br/>Publication Date 2010<br/>ISBN 9781597495370<br/>Network intrusion detection and prevention : concepts and techniquesent://SD_ILS/0/SD_ILS:3349552024-04-23T16:47:37Z2024-04-23T16:47:37Zby Ali A. Ghorbani<br/>Author Ali A. Ghorbani, Lu, Wei, Tavallaee, Mahbod<br/>Format: Books<br/>Call Number TK5105.59 A43 2010<br/>Publisher Springer,<br/>Publication Date 2010<br/>ISBN 9780387887708<br/>Disappearing cryptography : information hiding : steganography and watermarkingent://SD_ILS/0/SD_ILS:3350292024-04-23T16:47:37Z2024-04-23T16:47:37Zby Wayner, Peter<br/>Author Wayner, Peter<br/>Format: Books<br/>Call Number TK5105.59 W39 2009<br/>Edition 3rd ed.<br/>Publisher Morgan Kaufmann,<br/>Publication Date 2009<br/>ISBN 9780123744791<br/>Securing the information infrastructureent://SD_ILS/0/SD_ILS:6318672024-04-23T16:47:37Z2024-04-23T16:47:37Zby Kizza, Joseph Migga<br/>Author Kizza, Joseph Migga, Kizza, Florence Migga<br/>Format: Books<br/>Call Number HV6773 K59 2008<br/>Publisher Cybertech Pub.,<br/>Publication Date 2008<br/>ISBN 9781599043791 9781599043814<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:3538042024-04-23T16:47:37Z2024-04-23T16:47:37Zby Kahate, Atul<br/>Author Kahate, Atul<br/>Format: Books<br/>Call Number TK5105.59 K33 2008<br/>Edition 2nd ed.,<br/>Publisher Tata McGraw-Hill,<br/>Publication Date 2008<br/>ISBN 9780070648234<br/>An intrusion detection system (IDS) for internet networkent://SD_ILS/0/SD_ILS:1569382024-04-23T16:47:37Z2024-04-23T16:47:37Zby Mohd. Fauzan Safiee<br/>Author Mohd. Fauzan Safiee, Syarifah Hafizah Syed Ariffin<br/>Format: Books<br/>Call Number TK5105.59 M43 2007<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=48865">Preview</a><br/>Thesis (Sarjana Kejuruteraan (Elektrikal-Elektronik dan Telecommunication)) - Universiti Teknologi Malaysia, 2007<br/>Practical internet securityent://SD_ILS/0/SD_ILS:1584132024-04-23T16:47:37Z2024-04-23T16:47:37Zby Vacca, John R.<br/>Author Vacca, John R.<br/>Format: Books<br/>Call Number TK5105.59 V324 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9780387405339<br/><a href="http://dx.doi.org/10.1007/978-0-387-29844-3">FullText</a><br/>Hackers challenge 3 : 20 brand-new forensic scenarios & solutionsent://SD_ILS/0/SD_ILS:1005712024-04-23T16:47:37Z2024-04-23T16:47:37Zby Pollino, David<br/>Author Pollino, David<br/>Format: Books<br/>Call Number QA76.9.A25 H324 2006<br/>Publisher McGraw-Hill,<br/>Publication Date 2006<br/>ISBN 9780072263046<br/>Active firewall mechanism as a comprehensive approach towards minimizing internet threatsent://SD_ILS/0/SD_ILS:4681052024-04-23T16:47:37Z2024-04-23T16:47:37Zby Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah<br/>Format: Books<br/>Call Number TK5105.875.I57 C33 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Thesis (Doktor Falsafah (Fakulti Kejuteraan Elektrik)) - Universiti Teknologi Malaysia, 2007<br/>Extrusion detection : security monitoring for internal intrusionsent://SD_ILS/0/SD_ILS:4704522024-04-23T16:47:37Z2024-04-23T16:47:37Zby Bejtlich, Richard<br/>Author Bejtlich, Richard<br/>Format: Books<br/>Call Number TK5105.59 B44 2006<br/>Publisher Addison-Wesley,<br/>Publication Date 2006<br/>ISBN 9780321349965<br/>Windows forensics : the field guide for corporate computer investigationsent://SD_ILS/0/SD_ILS:2778572024-04-23T16:47:37Z2024-04-23T16:47:37Zby Steel, Chad<br/>Author Steel, Chad<br/>Format: Books<br/>Call Number HV8079.C65 S84 2006<br/>Publisher Wiley Pub.,<br/>Publication Date 2006<br/>ISBN 9780470038628<br/>Professional pen testing for Web applicationsent://SD_ILS/0/SD_ILS:1328132024-04-23T16:47:37Z2024-04-23T16:47:37Zby Andreu, Andres, 1968-<br/>Author Andreu, Andres, 1968-<br/>Format: Books<br/>Call Number QA76.9.A25 A525 2006<br/>Publisher Wiley Pub.,<br/>Publication Date 2006<br/>ISBN 9780471789666<br/>Scalable and secure internet services and architectureent://SD_ILS/0/SD_ILS:1566142024-04-23T16:47:37Z2024-04-23T16:47:37Zby Xu, Chengzhong<br/>Author Xu, Chengzhong<br/>Format: Books<br/>Call Number TK5105.875.I57 X82 2005<br/>Publisher Chapman & Hall,<br/>Publication Date 2005<br/>ISBN 9781584883777<br/>Protokol pengurusan kekunci keselamatan internet bagi algoritma penyulitan advance encryption standard (AES) dalam Internet Protocol Security (IPSEC)ent://SD_ILS/0/SD_ILS:4424702024-04-23T16:47:37Z2024-04-23T16:47:37Zby Nik Shahidah Afifi Md. Taujuddin<br/>Author Nik Shahidah Afifi Md. Taujuddin<br/>Format: Books<br/>Call Number TK5105.59 N544 2005 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2005<br/>Network firewall development with multilevel security policyent://SD_ILS/0/SD_ILS:3951242024-04-23T16:47:37Z2024-04-23T16:47:37Zby Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, International Conference on Computer Theory and Applications (14th. : 2004 : Egypt)<br/>Format: Books<br/>Call Number TK5105.59 C334 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Principles and practice of information security : protecting computers from hackers and lawyersent://SD_ILS/0/SD_ILS:3892192024-04-23T16:47:37Z2024-04-23T16:47:37Zby Volonino, Linda<br/>Author Volonino, Linda, Robinson, Stephen R., Volonino, Charles P.<br/>Format: Books<br/>Call Number TK5105.59 V64 2004<br/>Publisher Pearson/Prentice Hall,<br/>Publication Date 2004<br/>ISBN 9780131840270<br/>Defense and detection strategies against Internet wormsent://SD_ILS/0/SD_ILS:4178392024-04-23T16:47:37Z2024-04-23T16:47:37Zby Nazario, Jose<br/>Author Nazario, Jose<br/>Format: Books<br/>Call Number QA76.9.A25 N394 2004<br/>Publisher Artech House,<br/>Publication Date 2004<br/>ISBN 9781580535373<br/>Designing network securityent://SD_ILS/0/SD_ILS:1350322024-04-23T16:47:37Z2024-04-23T16:47:37Zby Kaeo, Merike<br/>Author Kaeo, Merike<br/>Format: Books<br/>Call Number TK5105.59 K34 2004<br/>Edition 2nd ed.<br/>Publisher Cisco Press,<br/>Publication Date 2004<br/>ISBN 9781587051173<br/>Security + guide to network security fundamentalsent://SD_ILS/0/SD_ILS:3643912024-04-23T16:47:37Z2024-04-23T16:47:37Zby Cisco Learning Institute<br/>Author Cisco Learning Institute, Campbell, Paul, Calvert, Ben, Boswell, Steven<br/>Format: Books<br/>Call Number TK5105.59 C57 2003<br/>Publisher Thomson Learning,<br/>Publication Date 2003<br/>ISBN 9780619212940<br/>Hacker V : pakar keselamatan rangkaian Norton Internet securityent://SD_ILS/0/SD_ILS:4114412024-04-23T16:47:37Z2024-04-23T16:47:37Zby Man, P. C.<br/>Author Man, P. C.<br/>Format: Books<br/>Call Number TK5105.59 H32 2003<br/>Publisher King Information,<br/>Publication Date 2003<br/>ISBN 9789861250694<br/>Network intrusion detectionent://SD_ILS/0/SD_ILS:3863492024-04-23T16:47:37Z2024-04-23T16:47:37Zby Northcutt, Stephen<br/>Author Northcutt, Stephen, Novak, Judy<br/>Format: Books<br/>Call Number TK5105.59 N673 2003<br/>Edition 3rd ed.<br/>Publisher New Riders,<br/>Publication Date 2003<br/>ISBN 9780735712652<br/>Enforcing multilevel security policies for network firewallent://SD_ILS/0/SD_ILS:3521732024-04-23T16:47:37Z2024-04-23T16:47:37Zby Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, Mohd. Aizaini Maarof, International Conference Information Technology in Asia (2003 : Kuching, Sarawak)<br/>Format: Books<br/>Call Number TK5105.59 C34 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>A Benchmarking methodology for NPU-based stateful firewallent://SD_ILS/0/SD_ILS:3526122024-04-23T16:47:37Z2024-04-23T16:47:37Zby Lee, Eng Kean<br/>Author Lee, Eng Kean, Sulaiman Mohd. Nor, IEEE Asia Pacific Conference on Communication APCC 2003 (9th : 2003 : Penang)<br/>Format: Books<br/>Call Number TK5105.59 L44 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Network security : a beginner's guideent://SD_ILS/0/SD_ILS:3474012024-04-23T16:47:37Z2024-04-23T16:47:37Zby Maiwald, Eric<br/>Author Maiwald, Eric<br/>Format: Books<br/>Call Number TK5105.59 M35 2003<br/>Edition 2nd ed.<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2003<br/>ISBN 9780072229578<br/>Access controlling firewall using Bell-LaPadula security modelent://SD_ILS/0/SD_ILS:3535492024-04-23T16:47:37Z2024-04-23T16:47:37Zby Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, Quality in Research Seminar (6th : 2003 : Indonesia)<br/>Format: Books<br/>Call Number TK5105.59 C33 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:3548532024-04-23T16:47:37Z2024-04-23T16:47:37Zby Kahate, Atul<br/>Author Kahate, Atul<br/>Format: Books<br/>Call Number TK5105.59 K33 2003<br/>Publisher Tata McGraw-Hill,<br/>Publication Date 2003<br/>ISBN 9780070494831<br/>Practical Unix and internet securityent://SD_ILS/0/SD_ILS:3341472024-04-23T16:47:37Z2024-04-23T16:47:37Zby Garfinkel, Simson<br/>Author Garfinkel, Simson, Spafford, Gene, Schwartz, Alan<br/>Format: Books<br/>Call Number TK5105.59 G37 2003<br/>Edition 3rd ed.<br/>Publisher O'Reilly & Associates,<br/>Publication Date 2003<br/>ISBN 9780596003234<br/>Internet and wireless securityent://SD_ILS/0/SD_ILS:4755892024-04-23T16:47:37Z2024-04-23T16:47:37Zby Temple, Robert, 1963-<br/>Author Temple, Robert, 1963-, Regnault, John<br/>Format: Books<br/>Call Number TK5105.59 I55 2002<br/>Publisher Institution of Electrical Engineers,<br/>Publication Date 2002<br/>ISBN 9780852961971<br/>Sistem pengurusan web untuk keluarga menggunakan kaedah penapisanent://SD_ILS/0/SD_ILS:3086072024-04-23T16:47:37Z2024-04-23T16:47:37Zby Nor Hisham Khamis, 1965-<br/>Author Nor Hisham Khamis, 1965-<br/>Format: Books<br/>Call Number TK5105.59 N54 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/>Penggunaan protokol SSL dalam pembangunan halaman web bagi agensi pengiklananent://SD_ILS/0/SD_ILS:3099062024-04-23T16:47:37Z2024-04-23T16:47:37Zby Tan, Chin Wee<br/>Author Tan, Chin Wee<br/>Format: Books<br/>Call Number HF6146.I58 T36 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002 2001<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/>Packet filtering personal firewall based on microsoft's internet protocol helper APIent://SD_ILS/0/SD_ILS:3267142024-04-23T16:47:37Z2024-04-23T16:47:37Zby Abdul Hanan Abdullah<br/>Author Abdul Hanan Abdullah, Lau, Sei Ping, International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format: Books<br/>Call Number TK5105.59 A32 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Implementation of Brands' digital cash system in TCP/IP networking environmentent://SD_ILS/0/SD_ILS:3277442024-04-23T16:47:37Z2024-04-23T16:47:37Zby Teo, Pock Chueng<br/>Author Teo, Pock Chueng, Ahmad Zuri Sha'ameri, Zulkarnain Mohd. Yusof, International Symposium on Information and Communications Technologies (2002 : Selangor)<br/>Format: Books<br/>Call Number HG1710 T46 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>File access permission change detection using immunological negative selection approachent://SD_ILS/0/SD_ILS:3284432024-04-23T16:47:37Z2024-04-23T16:47:37Zby Mohd. Yazid Idris<br/>Author Mohd. Yazid Idris, Abdul Hanan Abdullah, Mohd. Aizaini Maarof, International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format: Books<br/>Call Number TK5105.59 M92 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Authentication protocol : methods reviewent://SD_ILS/0/SD_ILS:3268212024-04-23T16:47:37Z2024-04-23T16:47:37Zby Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, International Technical Conference on Circuits, Systems, Computer and Communications (2002 : Thailand)<br/>Format: Books<br/>Call Number QA76.9.A25 C35 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Security planning and disaster recoveryent://SD_ILS/0/SD_ILS:3416672024-04-23T16:47:37Z2024-04-23T16:47:37Zby Maiwald, Eric<br/>Author Maiwald, Eric, Sieglein, William<br/>Format: Books<br/>Call Number TK5105.59 M36 2002<br/>Publisher McGraw-Hill Osborne,<br/>Publication Date 2002<br/>ISBN 9780072224634<br/>Network intrusion detection : an analyst's handbookent://SD_ILS/0/SD_ILS:1594542024-04-23T16:47:37Z2024-04-23T16:47:37Zby Northcutt, Stephen<br/>Author Northcutt, Stephen, Novak, Judy, McLachlan, Donald<br/>Format: Books<br/>Call Number TK5105.59 N673 2000<br/>Edition 2nd ed.<br/>Publisher New Riders,<br/>Publication Date 2001<br/>ISBN 9780735710085<br/>Capaian alatan yang selamat dalam pembelajaran kolaboratif = Secure tools access in collaborative learningent://SD_ILS/0/SD_ILS:3019972024-04-23T16:47:37Z2024-04-23T16:47:37Zby Faaz Anwar Asan<br/>Author Faaz Anwar Asan<br/>Format: Books<br/>Call Number QA76.9.A25 F33 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Network security : a beginner's guideent://SD_ILS/0/SD_ILS:3406402024-04-23T16:47:37Z2024-04-23T16:47:37Zby Maiwald, Eric<br/>Author Maiwald, Eric<br/>Format: Books<br/>Call Number TK5105.59 M35 2001<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2001<br/>ISBN 9780072133240<br/>Agent technology approach for proxy serverent://SD_ILS/0/SD_ILS:3311082024-04-23T16:47:37Z2024-04-23T16:47:37Zby Fazidah Othman<br/>Author Fazidah Othman, Abdul Hanan Abdullah, Malaysian Science and Technology Congress (2000 : Genting Highlands, Pahang)<br/>Format: Books<br/>Call Number TK5105.59 F39 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001 2000<br/>Sistem pengurusan keselamatan melalui internet (untuk sistem pengoperasian unix)ent://SD_ILS/0/SD_ILS:1490842024-04-23T16:47:37Z2024-04-23T16:47:37Zby Noor Azizah Mat Isa<br/>Author Noor Azizah Mat Isa, Yusnita Khalid<br/>Format: Books<br/>Call Number TK5105.59 N667 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/>iPRO agentent://SD_ILS/0/SD_ILS:1465912024-04-23T16:47:37Z2024-04-23T16:47:37Zby Fazidah Othman<br/>Author Fazidah Othman, Abdul Hanan Abdullah, Malaysian Science and Technology Congress (2000 : Genting Highlands, Pahang)<br/>Format: Books<br/>Call Number TK5105.59 F38 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Penjanaan laporan bergrafik untuk pentadbir firewallent://SD_ILS/0/SD_ILS:1485972024-04-23T16:47:37Z2024-04-23T16:47:37Zby Mohd. Izham Mohammad<br/>Author Mohd. Izham Mohammad<br/>Format: Books<br/>Call Number TK5105.59 M63 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/>Keselamatan sistem pembayaran melalui rangkaian/internetent://SD_ILS/0/SD_ILS:1000312024-04-23T16:47:37Z2024-04-23T16:47:37Zby Noorliana Ismail<br/>Author Noorliana Ismail<br/>Format: Books<br/>Call Number TK5105.59 N66 1999 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1999<br/>Penganalisa leksikal dan sintaktik di dalam antaramuka dinding apient://SD_ILS/0/SD_ILS:1027082024-04-23T16:47:37Z2024-04-23T16:47:37Zby Md. Asri Ngadi<br/>Author Md. Asri Ngadi<br/>Format: Books<br/>Call Number TK5105.59 M37 1999<br/>Publisher UTM,<br/>Publication Date 1999<br/>Tesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 1999<br/>Investigation FKE's network security using firewallent://SD_ILS/0/SD_ILS:1166952024-04-23T16:47:37Z2024-04-23T16:47:37Zby Low, Ho Chit<br/>Author Low, Ho Chit<br/>Format: Books<br/>Call Number TK5105.59 L68 1999 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1999<br/>Network intrusion detection : an analyst's handbookent://SD_ILS/0/SD_ILS:1555822024-04-23T16:47:37Z2024-04-23T16:47:37Zby Northcutt, Stephen<br/>Author Northcutt, Stephen<br/>Format: Books<br/>Call Number TK5105.59 N673 1999<br/>Publisher New Riders,<br/>Publication Date 1999<br/>ISBN 9780735708686<br/>Designing network securityent://SD_ILS/0/SD_ILS:1292612024-04-23T16:47:37Z2024-04-23T16:47:37Zby Kaeo, Merike<br/>Author Kaeo, Merike<br/>Format: Books<br/>Call Number TK5105.59 K34 1999<br/>Publisher Cisci Press,<br/>Publication Date 1999<br/>ISBN 9781578700431<br/>Konfigurasi dan pembangunan perkhidmatan FWTK serta analisa keberkesanannyaent://SD_ILS/0/SD_ILS:1027022024-04-23T16:47:37Z2024-04-23T16:47:37Zby Mazura Mat Din<br/>Author Mazura Mat Din<br/>Format: Books<br/>Call Number TK5105.59 M32 1999<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=42723">Preview</a><br/>Tesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 1999<br/>Proxy system : analysis in concept, design and implementationent://SD_ILS/0/SD_ILS:4900822024-04-23T16:47:37Z2024-04-23T16:47:37Zby Rabiah Ahmad, Dr.<br/>Author Rabiah Ahmad, Dr.<br/>Format: Books<br/>Call Number TK5105.59 R33 1998 raf<br/>Publisher University of London,<br/>Publication Date 1998<br/>Thesis (MSc in Information Security) - University of London, 1998<br/>Understanding security on the netent://SD_ILS/0/SD_ILS:4707062024-04-23T16:47:37Z2024-04-23T16:47:37Zby Gan, Beng Ser<br/>Author Gan, Beng Ser<br/>Format: Books<br/>Call Number TK5105.59 G36 1998 raf<br/>Publisher UTM,<br/>Publication Date 1998<br/>Project paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1998<br/>Firewall : is it importantent://SD_ILS/0/SD_ILS:4721982024-04-23T16:47:37Z2024-04-23T16:47:37Zby Tan, Wei Hong<br/>Author Tan, Wei Hong<br/>Format: Books<br/>Call Number TK5105.59 T83 1998 raf<br/>Publisher UTM,<br/>Publication Date 1998<br/>Project paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1998<br/>Penghantaran mel dan web melalui firewall dual homed hostent://SD_ILS/0/SD_ILS:4700742024-04-23T16:47:37Z2024-04-23T16:47:37Zby Suraya Ibrahim<br/>Author Suraya Ibrahim, Azlina Adnan<br/>Format: Books<br/>Call Number TK5105.59 S97 1998 raf<br/>Publisher UTM,<br/>Publication Date 1998<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1998<br/>Intranet security : stories from the trenchesent://SD_ILS/0/SD_ILS:4814172024-04-23T16:47:37Z2024-04-23T16:47:37Zby McCarthy, Linda<br/>Author McCarthy, Linda<br/>Format: Books<br/>Call Number TK5105.875.I6 M33 1998<br/>Publisher Sun Microsystems Press,<br/>Publication Date 1998<br/>ISBN 9780138947590<br/>Intranet firewalls : planning & implementing your network security systement://SD_ILS/0/SD_ILS:4568362024-04-23T16:47:37Z2024-04-23T16:47:37Zby Fuller, Scott<br/>Author Fuller, Scott, Pagan, Kevin<br/>Format: Books<br/>Call Number TK5105.59 F84 1996<br/>Publisher Ventana Communications Group, Inc.,<br/>Publication Date 1997<br/>ISBN 9781566045063<br/>Digital cash : commerce on the netent://SD_ILS/0/SD_ILS:4681542024-04-23T16:47:37Z2024-04-23T16:47:37Zby Wayner, Peter<br/>Author Wayner, Peter<br/>Format: Books<br/>Call Number HG1710 W39 1997<br/>Edition 2nd ed<br/>Publisher AP Professional,<br/>Publication Date 1997<br/>ISBN 9780127887722<br/>Keselamatan rangkaian internet dalam persekitaran LINUXent://SD_ILS/0/SD_ILS:4688412024-04-23T16:47:37Z2024-04-23T16:47:37Zby Md. Nazri Ahmad<br/>Author Md. Nazri Ahmad<br/>Format: Books<br/>Call Number TK5105.59 M62 1997 raf<br/>Publisher UTM,<br/>Publication Date 1997<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1997<br/>Internet security : risk analysis, strategies and firewallsent://SD_ILS/0/SD_ILS:4628492024-04-23T16:47:37Z2024-04-23T16:47:37Zby Kyas, Othmar<br/>Author Kyas, Othmar<br/>Format: Books<br/>Call Number TK5105.875.I57 K92 1997<br/>Publisher International Thomson Computer Press,<br/>Publication Date 1997<br/>ISBN 9781850323020<br/>Implementasi firewall keatas sistem rangkaian Fakulti Sains Komputer dan Sistem Maklumatent://SD_ILS/0/SD_ILS:4690912024-04-23T16:47:37Z2024-04-23T16:47:37Zby Ruhi Hayati Abd. Rahman<br/>Author Ruhi Hayati Abd. Rahman, Rabiah Ahmad, Dr.<br/>Format: Books<br/>Call Number TK5105.59 R83 1997 raf<br/>Publisher UTM,<br/>Publication Date 1997<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1997<br/>Network and Internet securityent://SD_ILS/0/SD_ILS:4246402024-04-23T16:47:37Z2024-04-23T16:47:37Zby Ahuja, Vijay<br/>Author Ahuja, Vijay<br/>Format: Books<br/>Call Number TK5105.59 A38 1996<br/>Publisher AP Professional,<br/>Publication Date 1996<br/>ISBN 9780120455959<br/>What you need to know : bandits on the information superhighwayent://SD_ILS/0/SD_ILS:4772272024-04-23T16:47:37Z2024-04-23T16:47:37Zby Barrett, Daniel J.<br/>Author Barrett, Daniel J.<br/>Format: Books<br/>Call Number HV6773 B37 1992<br/>Publisher O'Reilly & Associates,<br/>Publication Date 1996<br/>ISBN 9781565921566<br/>Internet firewalls and network securityent://SD_ILS/0/SD_ILS:3685192024-04-23T16:47:37Z2024-04-23T16:47:37Zby Hare, R. Christopher E.<br/>Author Hare, R. Christopher E., Siyan, Karanjit S.<br/>Format: Books<br/>Call Number TK5105.875.I57 H27 1995<br/>Publisher New Riders Pub.,<br/>Publication Date 1995<br/>ISBN 9781562054373<br/>The computer privacy handbookent://SD_ILS/0/SD_ILS:4104312024-04-23T16:47:37Z2024-04-23T16:47:37Zby Bacard, Andre<br/>Author Bacard, Andre<br/>Format: Books<br/>Call Number QA76.9.A25 B32 1995<br/>Publisher Peachpit Press,<br/>Publication Date 1995<br/>ISBN 9781566091718<br/>Implementing internet securityent://SD_ILS/0/SD_ILS:4585802024-04-23T16:47:37Z2024-04-23T16:47:37Zby Cooper, Frederic J.<br/>Author Cooper, Frederic J.<br/>Format: Books<br/>Call Number TK5105.59 I46 1995<br/>Publisher New Riders,<br/>Publication Date 1995<br/>ISBN 9781562054717<br/>Firewalls and Internet security : repelling the wily hackerent://SD_ILS/0/SD_ILS:4104392024-04-23T16:47:37Z2024-04-23T16:47:37Zby Cheswick, William R.<br/>Author Cheswick, William R., Bellovin, Steven M.<br/>Format: Books<br/>Call Number TK5105.875.I57 C43 1994<br/>Publisher Addison-Wesley,<br/>Publication Date 1994<br/>ISBN 9780201633573<br/>SECURITY IN VOICE OVER INTERNET PROTOCOL (VOIP) : IMPLEMENTATION AND ANALYSISent://SD_ILS/0/SD_ILS:8395892024-04-23T16:47:37Z2024-04-23T16:47:37Zby Maimun Rizal, 1980-, author<br/>Author Maimun Rizal, 1980-, author, Abdul Hanan Abdullah, Prof.Dr., supervisor, Saiful Adli Ismail, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.8865 M35 2007<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>DNS PACKET CAPTURING AND ANALYZING SYSTEMent://SD_ILS/0/SD_ILS:8404832024-04-23T16:47:37Z2024-04-23T16:47:37Zby Babak Abdollahi Khameneh, 1983-, author<br/>Author Babak Abdollahi Khameneh, 1983-, author, Nurulhuda Firdaus Mohd. Azmi, Dr., supervisor, Sekolah Informatik Termaju<br/>Format: Books<br/>Call Number TK5105.59 B33 2013 raf<br/>Thesis Sarjana Kejuruteraan Perisian<br/>DNS PACKET CAPTURING AND ANALYZING SYSTEMent://SD_ILS/0/SD_ILS:8404852024-04-23T16:47:37Z2024-04-23T16:47:37Zby Babak Abdollahi Khameneh, 1983-, author<br/>Author Babak Abdollahi Khameneh, 1983-, author, Nurulhuda Firdaus Mohd. Azmi, Dr., supervisor, Sekolah Informatik Termaju<br/>Format: Books<br/>Call Number CP 034038 ra<br/>Thesis Sarjana Kejuruteraan Perisian<br/>DESIGNING LIGHTWEIGHT CRYPTOGRAPHY ALGORITHM FOR INTERNET OF THINGSent://SD_ILS/0/SD_ILS:8647512024-04-23T16:47:37Z2024-04-23T16:47:37Zby Mohd. Fairus Mustapha, 1980-, author<br/>Author Mohd. Fairus Mustapha, 1980-, author, Majid Bakhtiari, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035068 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>SECURITY IN VOICE OVER INTERNET PROTOCOL (VOIP) : IMPLEMENTATION AND ANALYSISent://SD_ILS/0/SD_ILS:8395902024-04-23T16:47:37Z2024-04-23T16:47:37Zby Maimun Rizal, 1980-, author<br/>Author Maimun Rizal, 1980-, author, Abdul Hanan Abdullah, Prof.Dr., supervisor, Saiful Adli Ismail, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034567 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>DESIGNING LIGHTWEIGHT CRYPTOGRAPHY ALGORITHM FOR INTERNET OF THINGSent://SD_ILS/0/SD_ILS:8646792024-04-23T16:47:37Z2024-04-23T16:47:37Zby Mohd. Fairus Mustapha, 1980-, author<br/>Author Mohd. Fairus Mustapha, 1980-, author, Majid Bakhtiari, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 M6434 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>