Search Results for Internet (Computer network) - Narrowed by: Books - Computer networks -- Security measures - English
SirsiDynix Enterprise
http://portal.utm.my/client/en_AU/main/main/qu$003dInternet$002b$002528Computer$002bnetwork$002529$0026qf$003dFORMAT$002509Format$002509BOOK$002509Books$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026ps$003d300?dt=list
2024-04-18T20:52:18Z
Computer Security Fundamentals
ent://SD_ILS/0/SD_ILS:886135
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Easttom, Chuck, author<br/>Author Easttom, Chuck, author<br/>Format: Books<br/>Call Number QA76.9.A25 E27 2020<br/>Edition Fourth Edition<br/>Publication Date 2020<br/>ISBN 9780135774779<br/>
Security in IoT-Enabled Space
ent://SD_ILS/0/SD_ILS:882284
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Al-Turjman, Fadi, author<br/>Author Al-Turjman, Fadi, author<br/>Format: Books<br/>Call Number TK5105.8857 A48 2019<br/>Publication Date 2019<br/>ISBN 9780367111236<br/>
Network Forensics
ent://SD_ILS/0/SD_ILS:873173
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Messier, Ric, author<br/>Author Messier, Ric, author<br/>Format: Books<br/>Call Number TK5105.59 M47 2017<br/>Publication Date 2017<br/>ISBN 9781119328285<br/>
Computational network science : an algorithmic approach
ent://SD_ILS/0/SD_ILS:838372
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Hexmoor, Henry, author<br/>Author Hexmoor, Henry, author<br/>Format: Books<br/>Call Number TK5105.59 H49 2015<br/>Publisher Morgan Kaufmann,<br/>Publication Date 2015<br/>ISBN 9780128008911<br/>
Advances in secure computing, internet services, and applications
ent://SD_ILS/0/SD_ILS:841203
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Tripathy, B. K. editor<br/>Author Tripathy, B. K. editor, Acharjya, D. P. editor<br/>Format: Books<br/>Call Number TK5105.59 A38 2014 f<br/>Publisher Information Science Reference, an imprint of IGI Global,<br/>Publication Date 2014<br/>ISBN 9781466649408<br/>
Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
ent://SD_ILS/0/SD_ILS:838076
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Carvey, Harlan A., author<br/>Author Carvey, Harlan A., author<br/>Format: Books<br/>Call Number HV8079.C65 C374 2014<br/>Edition Fourth edition<br/>Publisher Syngress,<br/>Publication Date 2014<br/>ISBN 9780124171572<br/>
Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and data
ent://SD_ILS/0/SD_ILS:640462
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Lillard, Terrence V.<br/>Author Lillard, Terrence V., Lillard, Terrence<br/>Format: Books<br/>Call Number HV8079.C65 D54 2010<br/>Publisher Syngress,<br/>Publication Date 2010<br/>ISBN 9781597495370<br/>
Network intrusion detection and prevention : concepts and techniques
ent://SD_ILS/0/SD_ILS:334955
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Ali A. Ghorbani<br/>Author Ali A. Ghorbani, Lu, Wei, Tavallaee, Mahbod<br/>Format: Books<br/>Call Number TK5105.59 A43 2010<br/>Publisher Springer,<br/>Publication Date 2010<br/>ISBN 9780387887708<br/>
Disappearing cryptography : information hiding : steganography and watermarking
ent://SD_ILS/0/SD_ILS:335029
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Wayner, Peter<br/>Author Wayner, Peter<br/>Format: Books<br/>Call Number TK5105.59 W39 2009<br/>Edition 3rd ed.<br/>Publisher Morgan Kaufmann,<br/>Publication Date 2009<br/>ISBN 9780123744791<br/>
Securing the information infrastructure
ent://SD_ILS/0/SD_ILS:631867
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Kizza, Joseph Migga<br/>Author Kizza, Joseph Migga, Kizza, Florence Migga<br/>Format: Books<br/>Call Number HV6773 K59 2008<br/>Publisher Cybertech Pub.,<br/>Publication Date 2008<br/>ISBN 9781599043791 9781599043814<br/>
Cryptography and network security
ent://SD_ILS/0/SD_ILS:353804
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Kahate, Atul<br/>Author Kahate, Atul<br/>Format: Books<br/>Call Number TK5105.59 K33 2008<br/>Edition 2nd ed.,<br/>Publisher Tata McGraw-Hill,<br/>Publication Date 2008<br/>ISBN 9780070648234<br/>
An intrusion detection system (IDS) for internet network
ent://SD_ILS/0/SD_ILS:156938
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Mohd. Fauzan Safiee<br/>Author Mohd. Fauzan Safiee, Syarifah Hafizah Syed Ariffin<br/>Format: Books<br/>Call Number TK5105.59 M43 2007<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=48865">Preview</a><br/>Thesis (Sarjana Kejuruteraan (Elektrikal-Elektronik dan Telecommunication)) - Universiti Teknologi Malaysia, 2007<br/>
Practical internet security
ent://SD_ILS/0/SD_ILS:158413
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Vacca, John R.<br/>Author Vacca, John R.<br/>Format: Books<br/>Call Number TK5105.59 V324 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9780387405339<br/><a href="http://dx.doi.org/10.1007/978-0-387-29844-3">FullText</a><br/>
Hackers challenge 3 : 20 brand-new forensic scenarios & solutions
ent://SD_ILS/0/SD_ILS:100571
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Pollino, David<br/>Author Pollino, David<br/>Format: Books<br/>Call Number QA76.9.A25 H324 2006<br/>Publisher McGraw-Hill,<br/>Publication Date 2006<br/>ISBN 9780072263046<br/>
Active firewall mechanism as a comprehensive approach towards minimizing internet threats
ent://SD_ILS/0/SD_ILS:468105
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah<br/>Format: Books<br/>Call Number TK5105.875.I57 C33 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Thesis (Doktor Falsafah (Fakulti Kejuteraan Elektrik)) - Universiti Teknologi Malaysia, 2007<br/>
Extrusion detection : security monitoring for internal intrusions
ent://SD_ILS/0/SD_ILS:470452
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Bejtlich, Richard<br/>Author Bejtlich, Richard<br/>Format: Books<br/>Call Number TK5105.59 B44 2006<br/>Publisher Addison-Wesley,<br/>Publication Date 2006<br/>ISBN 9780321349965<br/>
Windows forensics : the field guide for corporate computer investigations
ent://SD_ILS/0/SD_ILS:277857
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Steel, Chad<br/>Author Steel, Chad<br/>Format: Books<br/>Call Number HV8079.C65 S84 2006<br/>Publisher Wiley Pub.,<br/>Publication Date 2006<br/>ISBN 9780470038628<br/>
Professional pen testing for Web applications
ent://SD_ILS/0/SD_ILS:132813
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Andreu, Andres, 1968-<br/>Author Andreu, Andres, 1968-<br/>Format: Books<br/>Call Number QA76.9.A25 A525 2006<br/>Publisher Wiley Pub.,<br/>Publication Date 2006<br/>ISBN 9780471789666<br/>
Scalable and secure internet services and architecture
ent://SD_ILS/0/SD_ILS:156614
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Xu, Chengzhong<br/>Author Xu, Chengzhong<br/>Format: Books<br/>Call Number TK5105.875.I57 X82 2005<br/>Publisher Chapman & Hall,<br/>Publication Date 2005<br/>ISBN 9781584883777<br/>
Network firewall development with multilevel security policy
ent://SD_ILS/0/SD_ILS:395124
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, International Conference on Computer Theory and Applications (14th. : 2004 : Egypt)<br/>Format: Books<br/>Call Number TK5105.59 C334 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>
Principles and practice of information security : protecting computers from hackers and lawyers
ent://SD_ILS/0/SD_ILS:389219
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Volonino, Linda<br/>Author Volonino, Linda, Robinson, Stephen R., Volonino, Charles P.<br/>Format: Books<br/>Call Number TK5105.59 V64 2004<br/>Publisher Pearson/Prentice Hall,<br/>Publication Date 2004<br/>ISBN 9780131840270<br/>
Defense and detection strategies against Internet worms
ent://SD_ILS/0/SD_ILS:417839
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Nazario, Jose<br/>Author Nazario, Jose<br/>Format: Books<br/>Call Number QA76.9.A25 N394 2004<br/>Publisher Artech House,<br/>Publication Date 2004<br/>ISBN 9781580535373<br/>
Designing network security
ent://SD_ILS/0/SD_ILS:135032
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Kaeo, Merike<br/>Author Kaeo, Merike<br/>Format: Books<br/>Call Number TK5105.59 K34 2004<br/>Edition 2nd ed.<br/>Publisher Cisco Press,<br/>Publication Date 2004<br/>ISBN 9781587051173<br/>
Security + guide to network security fundamentals
ent://SD_ILS/0/SD_ILS:364391
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Cisco Learning Institute<br/>Author Cisco Learning Institute, Campbell, Paul, Calvert, Ben, Boswell, Steven<br/>Format: Books<br/>Call Number TK5105.59 C57 2003<br/>Publisher Thomson Learning,<br/>Publication Date 2003<br/>ISBN 9780619212940<br/>
Network intrusion detection
ent://SD_ILS/0/SD_ILS:386349
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Northcutt, Stephen<br/>Author Northcutt, Stephen, Novak, Judy<br/>Format: Books<br/>Call Number TK5105.59 N673 2003<br/>Edition 3rd ed.<br/>Publisher New Riders,<br/>Publication Date 2003<br/>ISBN 9780735712652<br/>
Enforcing multilevel security policies for network firewall
ent://SD_ILS/0/SD_ILS:352173
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, Mohd. Aizaini Maarof, International Conference Information Technology in Asia (2003 : Kuching, Sarawak)<br/>Format: Books<br/>Call Number TK5105.59 C34 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>
A Benchmarking methodology for NPU-based stateful firewall
ent://SD_ILS/0/SD_ILS:352612
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Lee, Eng Kean<br/>Author Lee, Eng Kean, Sulaiman Mohd. Nor, IEEE Asia Pacific Conference on Communication APCC 2003 (9th : 2003 : Penang)<br/>Format: Books<br/>Call Number TK5105.59 L44 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>
Network security : a beginner's guide
ent://SD_ILS/0/SD_ILS:347401
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Maiwald, Eric<br/>Author Maiwald, Eric<br/>Format: Books<br/>Call Number TK5105.59 M35 2003<br/>Edition 2nd ed.<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2003<br/>ISBN 9780072229578<br/>
Access controlling firewall using Bell-LaPadula security model
ent://SD_ILS/0/SD_ILS:353549
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, Quality in Research Seminar (6th : 2003 : Indonesia)<br/>Format: Books<br/>Call Number TK5105.59 C33 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>
Cryptography and network security
ent://SD_ILS/0/SD_ILS:354853
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Kahate, Atul<br/>Author Kahate, Atul<br/>Format: Books<br/>Call Number TK5105.59 K33 2003<br/>Publisher Tata McGraw-Hill,<br/>Publication Date 2003<br/>ISBN 9780070494831<br/>
Practical Unix and internet security
ent://SD_ILS/0/SD_ILS:334147
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Garfinkel, Simson<br/>Author Garfinkel, Simson, Spafford, Gene, Schwartz, Alan<br/>Format: Books<br/>Call Number TK5105.59 G37 2003<br/>Edition 3rd ed.<br/>Publisher O'Reilly & Associates,<br/>Publication Date 2003<br/>ISBN 9780596003234<br/>
Internet and wireless security
ent://SD_ILS/0/SD_ILS:475589
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Temple, Robert, 1963-<br/>Author Temple, Robert, 1963-, Regnault, John<br/>Format: Books<br/>Call Number TK5105.59 I55 2002<br/>Publisher Institution of Electrical Engineers,<br/>Publication Date 2002<br/>ISBN 9780852961971<br/>
Packet filtering personal firewall based on microsoft's internet protocol helper API
ent://SD_ILS/0/SD_ILS:326714
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Abdul Hanan Abdullah<br/>Author Abdul Hanan Abdullah, Lau, Sei Ping, International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format: Books<br/>Call Number TK5105.59 A32 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>
Implementation of Brands' digital cash system in TCP/IP networking environment
ent://SD_ILS/0/SD_ILS:327744
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Teo, Pock Chueng<br/>Author Teo, Pock Chueng, Ahmad Zuri Sha'ameri, Zulkarnain Mohd. Yusof, International Symposium on Information and Communications Technologies (2002 : Selangor)<br/>Format: Books<br/>Call Number HG1710 T46 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>
File access permission change detection using immunological negative selection approach
ent://SD_ILS/0/SD_ILS:328443
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Mohd. Yazid Idris<br/>Author Mohd. Yazid Idris, Abdul Hanan Abdullah, Mohd. Aizaini Maarof, International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format: Books<br/>Call Number TK5105.59 M92 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>
Authentication protocol : methods review
ent://SD_ILS/0/SD_ILS:326821
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, International Technical Conference on Circuits, Systems, Computer and Communications (2002 : Thailand)<br/>Format: Books<br/>Call Number QA76.9.A25 C35 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>
Security planning and disaster recovery
ent://SD_ILS/0/SD_ILS:341667
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Maiwald, Eric<br/>Author Maiwald, Eric, Sieglein, William<br/>Format: Books<br/>Call Number TK5105.59 M36 2002<br/>Publisher McGraw-Hill Osborne,<br/>Publication Date 2002<br/>ISBN 9780072224634<br/>
Network intrusion detection : an analyst's handbook
ent://SD_ILS/0/SD_ILS:159454
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Northcutt, Stephen<br/>Author Northcutt, Stephen, Novak, Judy, McLachlan, Donald<br/>Format: Books<br/>Call Number TK5105.59 N673 2000<br/>Edition 2nd ed.<br/>Publisher New Riders,<br/>Publication Date 2001<br/>ISBN 9780735710085<br/>
Network security : a beginner's guide
ent://SD_ILS/0/SD_ILS:340640
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Maiwald, Eric<br/>Author Maiwald, Eric<br/>Format: Books<br/>Call Number TK5105.59 M35 2001<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2001<br/>ISBN 9780072133240<br/>
Agent technology approach for proxy server
ent://SD_ILS/0/SD_ILS:331108
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Fazidah Othman<br/>Author Fazidah Othman, Abdul Hanan Abdullah, Malaysian Science and Technology Congress (2000 : Genting Highlands, Pahang)<br/>Format: Books<br/>Call Number TK5105.59 F39 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001 2000<br/>
iPRO agent
ent://SD_ILS/0/SD_ILS:146591
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Fazidah Othman<br/>Author Fazidah Othman, Abdul Hanan Abdullah, Malaysian Science and Technology Congress (2000 : Genting Highlands, Pahang)<br/>Format: Books<br/>Call Number TK5105.59 F38 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>
Penganalisa leksikal dan sintaktik di dalam antaramuka dinding api
ent://SD_ILS/0/SD_ILS:102708
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Md. Asri Ngadi<br/>Author Md. Asri Ngadi<br/>Format: Books<br/>Call Number TK5105.59 M37 1999<br/>Publisher UTM,<br/>Publication Date 1999<br/>Tesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 1999<br/>
Investigation FKE's network security using firewall
ent://SD_ILS/0/SD_ILS:116695
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Low, Ho Chit<br/>Author Low, Ho Chit<br/>Format: Books<br/>Call Number TK5105.59 L68 1999 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1999<br/>
Network intrusion detection : an analyst's handbook
ent://SD_ILS/0/SD_ILS:155582
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Northcutt, Stephen<br/>Author Northcutt, Stephen<br/>Format: Books<br/>Call Number TK5105.59 N673 1999<br/>Publisher New Riders,<br/>Publication Date 1999<br/>ISBN 9780735708686<br/>
Designing network security
ent://SD_ILS/0/SD_ILS:129261
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Kaeo, Merike<br/>Author Kaeo, Merike<br/>Format: Books<br/>Call Number TK5105.59 K34 1999<br/>Publisher Cisci Press,<br/>Publication Date 1999<br/>ISBN 9781578700431<br/>
Proxy system : analysis in concept, design and implementation
ent://SD_ILS/0/SD_ILS:490082
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Rabiah Ahmad, Dr.<br/>Author Rabiah Ahmad, Dr.<br/>Format: Books<br/>Call Number TK5105.59 R33 1998 raf<br/>Publisher University of London,<br/>Publication Date 1998<br/>Thesis (MSc in Information Security) - University of London, 1998<br/>
Firewall : is it important
ent://SD_ILS/0/SD_ILS:472198
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Tan, Wei Hong<br/>Author Tan, Wei Hong<br/>Format: Books<br/>Call Number TK5105.59 T83 1998 raf<br/>Publisher UTM,<br/>Publication Date 1998<br/>Project paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1998<br/>
Intranet security : stories from the trenches
ent://SD_ILS/0/SD_ILS:481417
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by McCarthy, Linda<br/>Author McCarthy, Linda<br/>Format: Books<br/>Call Number TK5105.875.I6 M33 1998<br/>Publisher Sun Microsystems Press,<br/>Publication Date 1998<br/>ISBN 9780138947590<br/>
Intranet firewalls : planning & implementing your network security system
ent://SD_ILS/0/SD_ILS:456836
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Fuller, Scott<br/>Author Fuller, Scott, Pagan, Kevin<br/>Format: Books<br/>Call Number TK5105.59 F84 1996<br/>Publisher Ventana Communications Group, Inc.,<br/>Publication Date 1997<br/>ISBN 9781566045063<br/>
Digital cash : commerce on the net
ent://SD_ILS/0/SD_ILS:468154
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Wayner, Peter<br/>Author Wayner, Peter<br/>Format: Books<br/>Call Number HG1710 W39 1997<br/>Edition 2nd ed<br/>Publisher AP Professional,<br/>Publication Date 1997<br/>ISBN 9780127887722<br/>
Internet security : risk analysis, strategies and firewalls
ent://SD_ILS/0/SD_ILS:462849
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Kyas, Othmar<br/>Author Kyas, Othmar<br/>Format: Books<br/>Call Number TK5105.875.I57 K92 1997<br/>Publisher International Thomson Computer Press,<br/>Publication Date 1997<br/>ISBN 9781850323020<br/>
Network and Internet security
ent://SD_ILS/0/SD_ILS:424640
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Ahuja, Vijay<br/>Author Ahuja, Vijay<br/>Format: Books<br/>Call Number TK5105.59 A38 1996<br/>Publisher AP Professional,<br/>Publication Date 1996<br/>ISBN 9780120455959<br/>
What you need to know : bandits on the information superhighway
ent://SD_ILS/0/SD_ILS:477227
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Barrett, Daniel J.<br/>Author Barrett, Daniel J.<br/>Format: Books<br/>Call Number HV6773 B37 1992<br/>Publisher O'Reilly & Associates,<br/>Publication Date 1996<br/>ISBN 9781565921566<br/>
Internet firewalls and network security
ent://SD_ILS/0/SD_ILS:368519
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Hare, R. Christopher E.<br/>Author Hare, R. Christopher E., Siyan, Karanjit S.<br/>Format: Books<br/>Call Number TK5105.875.I57 H27 1995<br/>Publisher New Riders Pub.,<br/>Publication Date 1995<br/>ISBN 9781562054373<br/>
The computer privacy handbook
ent://SD_ILS/0/SD_ILS:410431
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Bacard, Andre<br/>Author Bacard, Andre<br/>Format: Books<br/>Call Number QA76.9.A25 B32 1995<br/>Publisher Peachpit Press,<br/>Publication Date 1995<br/>ISBN 9781566091718<br/>
Implementing internet security
ent://SD_ILS/0/SD_ILS:458580
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Cooper, Frederic J.<br/>Author Cooper, Frederic J.<br/>Format: Books<br/>Call Number TK5105.59 I46 1995<br/>Publisher New Riders,<br/>Publication Date 1995<br/>ISBN 9781562054717<br/>
Firewalls and Internet security : repelling the wily hacker
ent://SD_ILS/0/SD_ILS:410439
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Cheswick, William R.<br/>Author Cheswick, William R., Bellovin, Steven M.<br/>Format: Books<br/>Call Number TK5105.875.I57 C43 1994<br/>Publisher Addison-Wesley,<br/>Publication Date 1994<br/>ISBN 9780201633573<br/>
SECURITY IN VOICE OVER INTERNET PROTOCOL (VOIP) : IMPLEMENTATION AND ANALYSIS
ent://SD_ILS/0/SD_ILS:839589
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Maimun Rizal, 1980-, author<br/>Author Maimun Rizal, 1980-, author, Abdul Hanan Abdullah, Prof.Dr., supervisor, Saiful Adli Ismail, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.8865 M35 2007<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>
DNS PACKET CAPTURING AND ANALYZING SYSTEM
ent://SD_ILS/0/SD_ILS:840483
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Babak Abdollahi Khameneh, 1983-, author<br/>Author Babak Abdollahi Khameneh, 1983-, author, Nurulhuda Firdaus Mohd. Azmi, Dr., supervisor, Sekolah Informatik Termaju<br/>Format: Books<br/>Call Number TK5105.59 B33 2013 raf<br/>Thesis Sarjana Kejuruteraan Perisian<br/>
DNS PACKET CAPTURING AND ANALYZING SYSTEM
ent://SD_ILS/0/SD_ILS:840485
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Babak Abdollahi Khameneh, 1983-, author<br/>Author Babak Abdollahi Khameneh, 1983-, author, Nurulhuda Firdaus Mohd. Azmi, Dr., supervisor, Sekolah Informatik Termaju<br/>Format: Books<br/>Call Number CP 034038 ra<br/>Thesis Sarjana Kejuruteraan Perisian<br/>
DESIGNING LIGHTWEIGHT CRYPTOGRAPHY ALGORITHM FOR INTERNET OF THINGS
ent://SD_ILS/0/SD_ILS:864751
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Mohd. Fairus Mustapha, 1980-, author<br/>Author Mohd. Fairus Mustapha, 1980-, author, Majid Bakhtiari, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035068 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>
SECURITY IN VOICE OVER INTERNET PROTOCOL (VOIP) : IMPLEMENTATION AND ANALYSIS
ent://SD_ILS/0/SD_ILS:839590
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Maimun Rizal, 1980-, author<br/>Author Maimun Rizal, 1980-, author, Abdul Hanan Abdullah, Prof.Dr., supervisor, Saiful Adli Ismail, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034567 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>
DESIGNING LIGHTWEIGHT CRYPTOGRAPHY ALGORITHM FOR INTERNET OF THINGS
ent://SD_ILS/0/SD_ILS:864679
2024-04-18T20:52:18Z
2024-04-18T20:52:18Z
by Mohd. Fairus Mustapha, 1980-, author<br/>Author Mohd. Fairus Mustapha, 1980-, author, Majid Bakhtiari, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 M6434 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>