Search Results for Internet (Computer network) - Narrowed by: Books - Computer networks -- Security measures - English SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dInternet$002b$002528Computer$002bnetwork$002529$0026qf$003dFORMAT$002509Format$002509BOOK$002509Books$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026ps$003d300?dt=list 2024-04-18T20:52:18Z Computer Security Fundamentals ent://SD_ILS/0/SD_ILS:886135 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Easttom, Chuck, author<br/>Author&#160;Easttom, Chuck, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 E27 2020<br/>Edition&#160;Fourth Edition<br/>Publication Date&#160;2020<br/>ISBN&#160;9780135774779<br/> Security in IoT-Enabled Space ent://SD_ILS/0/SD_ILS:882284 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Al-Turjman, Fadi, author<br/>Author&#160;Al-Turjman, Fadi, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.8857 A48 2019<br/>Publication Date&#160;2019<br/>ISBN&#160;9780367111236<br/> Network Forensics ent://SD_ILS/0/SD_ILS:873173 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Messier, Ric, author<br/>Author&#160;Messier, Ric, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M47 2017<br/>Publication Date&#160;2017<br/>ISBN&#160;9781119328285<br/> Computational network science : an algorithmic approach ent://SD_ILS/0/SD_ILS:838372 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Hexmoor, Henry, author<br/>Author&#160;Hexmoor, Henry, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H49 2015<br/>Publisher&#160;Morgan Kaufmann,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780128008911<br/> Advances in secure computing, internet services, and applications ent://SD_ILS/0/SD_ILS:841203 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Tripathy, B. K. editor<br/>Author&#160;Tripathy, B. K. editor,&#160;Acharjya, D. P. editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A38 2014 f<br/>Publisher&#160;Information Science Reference, an imprint of IGI Global,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466649408<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:838076 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Carvey, Harlan A., author<br/>Author&#160;Carvey, Harlan A., author<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 C374 2014<br/>Edition&#160;Fourth edition<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124171572<br/> Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and data ent://SD_ILS/0/SD_ILS:640462 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Lillard, Terrence V.<br/>Author&#160;Lillard, Terrence V.,&#160;Lillard, Terrence<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 D54 2010<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781597495370<br/> Network intrusion detection and prevention : concepts and techniques ent://SD_ILS/0/SD_ILS:334955 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Ali A. Ghorbani<br/>Author&#160;Ali A. Ghorbani,&#160;Lu, Wei,&#160;Tavallaee, Mahbod<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A43 2010<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780387887708<br/> Disappearing cryptography : information hiding : steganography and watermarking ent://SD_ILS/0/SD_ILS:335029 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Wayner, Peter<br/>Author&#160;Wayner, Peter<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W39 2009<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Morgan Kaufmann,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780123744791<br/> Securing the information infrastructure ent://SD_ILS/0/SD_ILS:631867 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Kizza, Joseph Migga<br/>Author&#160;Kizza, Joseph Migga,&#160;Kizza, Florence Migga<br/>Format:&#160;Books<br/>Call Number&#160;HV6773 K59 2008<br/>Publisher&#160;Cybertech Pub.,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781599043791&#160;9781599043814<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:353804 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Kahate, Atul<br/>Author&#160;Kahate, Atul<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 K33 2008<br/>Edition&#160;2nd ed.,<br/>Publisher&#160;Tata McGraw-Hill,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780070648234<br/> An intrusion detection system (IDS) for internet network ent://SD_ILS/0/SD_ILS:156938 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Mohd. Fauzan Safiee<br/>Author&#160;Mohd. Fauzan Safiee,&#160;Syarifah Hafizah Syed Ariffin<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M43 2007<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2007<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=48865">Preview</a><br/>Thesis (Sarjana Kejuruteraan (Elektrikal-Elektronik dan Telecommunication)) - Universiti Teknologi Malaysia, 2007<br/> Practical internet security ent://SD_ILS/0/SD_ILS:158413 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Vacca, John R.<br/>Author&#160;Vacca, John R.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 V324 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780387405339<br/><a href="http://dx.doi.org/10.1007/978-0-387-29844-3">FullText</a><br/> Hackers challenge 3 : 20 brand-new forensic scenarios &amp; solutions ent://SD_ILS/0/SD_ILS:100571 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Pollino, David<br/>Author&#160;Pollino, David<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H324 2006<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780072263046<br/> Active firewall mechanism as a comprehensive approach towards minimizing internet threats ent://SD_ILS/0/SD_ILS:468105 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Cahyo Crysdian<br/>Author&#160;Cahyo Crysdian,&#160;Abdul Hanan Abdullah<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 C33 2006<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Thesis (Doktor Falsafah (Fakulti Kejuteraan Elektrik)) - Universiti Teknologi Malaysia, 2007<br/> Extrusion detection : security monitoring for internal intrusions ent://SD_ILS/0/SD_ILS:470452 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Bejtlich, Richard<br/>Author&#160;Bejtlich, Richard<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 B44 2006<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780321349965<br/> Windows forensics : the field guide for corporate computer investigations ent://SD_ILS/0/SD_ILS:277857 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Steel, Chad<br/>Author&#160;Steel, Chad<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 S84 2006<br/>Publisher&#160;Wiley Pub.,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780470038628<br/> Professional pen testing for Web applications ent://SD_ILS/0/SD_ILS:132813 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Andreu, Andres, 1968-<br/>Author&#160;Andreu, Andres, 1968-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A525 2006<br/>Publisher&#160;Wiley Pub.,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780471789666<br/> Scalable and secure internet services and architecture ent://SD_ILS/0/SD_ILS:156614 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Xu, Chengzhong<br/>Author&#160;Xu, Chengzhong<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 X82 2005<br/>Publisher&#160;Chapman &amp; Hall,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781584883777<br/> Network firewall development with multilevel security policy ent://SD_ILS/0/SD_ILS:395124 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Cahyo Crysdian<br/>Author&#160;Cahyo Crysdian,&#160;Abdul Hanan Abdullah,&#160;International Conference on Computer Theory and Applications (14th. : 2004 : Egypt)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C334 2004<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/> Principles and practice of information security : protecting computers from hackers and lawyers ent://SD_ILS/0/SD_ILS:389219 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Volonino, Linda<br/>Author&#160;Volonino, Linda,&#160;Robinson, Stephen R.,&#160;Volonino, Charles P.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 V64 2004<br/>Publisher&#160;Pearson/Prentice Hall,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780131840270<br/> Defense and detection strategies against Internet worms ent://SD_ILS/0/SD_ILS:417839 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Nazario, Jose<br/>Author&#160;Nazario, Jose<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N394 2004<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2004<br/>ISBN&#160;9781580535373<br/> Designing network security ent://SD_ILS/0/SD_ILS:135032 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Kaeo, Merike<br/>Author&#160;Kaeo, Merike<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 K34 2004<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Cisco Press,<br/>Publication Date&#160;2004<br/>ISBN&#160;9781587051173<br/> Security + guide to network security fundamentals ent://SD_ILS/0/SD_ILS:364391 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Cisco Learning Institute<br/>Author&#160;Cisco Learning Institute,&#160;Campbell, Paul,&#160;Calvert, Ben,&#160;Boswell, Steven<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C57 2003<br/>Publisher&#160;Thomson Learning,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780619212940<br/> Network intrusion detection ent://SD_ILS/0/SD_ILS:386349 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Northcutt, Stephen<br/>Author&#160;Northcutt, Stephen,&#160;Novak, Judy<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N673 2003<br/>Edition&#160;3rd ed.<br/>Publisher&#160;New Riders,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780735712652<br/> Enforcing multilevel security policies for network firewall ent://SD_ILS/0/SD_ILS:352173 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Cahyo Crysdian<br/>Author&#160;Cahyo Crysdian,&#160;Abdul Hanan Abdullah,&#160;Mohd. Aizaini Maarof,&#160;International Conference Information Technology in Asia (2003 : Kuching, Sarawak)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C34 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> A Benchmarking methodology for NPU-based stateful firewall ent://SD_ILS/0/SD_ILS:352612 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Lee, Eng Kean<br/>Author&#160;Lee, Eng Kean,&#160;Sulaiman Mohd. Nor,&#160;IEEE Asia Pacific Conference on Communication APCC 2003 (9th : 2003 : Penang)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 L44 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Network security : a beginner's guide ent://SD_ILS/0/SD_ILS:347401 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Maiwald, Eric<br/>Author&#160;Maiwald, Eric<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M35 2003<br/>Edition&#160;2nd ed.<br/>Publisher&#160;McGraw-Hill/Osborne,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780072229578<br/> Access controlling firewall using Bell-LaPadula security model ent://SD_ILS/0/SD_ILS:353549 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Cahyo Crysdian<br/>Author&#160;Cahyo Crysdian,&#160;Abdul Hanan Abdullah,&#160;Quality in Research Seminar (6th : 2003 : Indonesia)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C33 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:354853 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Kahate, Atul<br/>Author&#160;Kahate, Atul<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 K33 2003<br/>Publisher&#160;Tata McGraw-Hill,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780070494831<br/> Practical Unix and internet security ent://SD_ILS/0/SD_ILS:334147 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Garfinkel, Simson<br/>Author&#160;Garfinkel, Simson,&#160;Spafford, Gene,&#160;Schwartz, Alan<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 G37 2003<br/>Edition&#160;3rd ed.<br/>Publisher&#160;O'Reilly &amp; Associates,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780596003234<br/> Internet and wireless security ent://SD_ILS/0/SD_ILS:475589 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Temple, Robert, 1963-<br/>Author&#160;Temple, Robert, 1963-,&#160;Regnault, John<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 I55 2002<br/>Publisher&#160;Institution of Electrical Engineers,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780852961971<br/> Packet filtering personal firewall based on microsoft's internet protocol helper API ent://SD_ILS/0/SD_ILS:326714 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Abdul Hanan Abdullah<br/>Author&#160;Abdul Hanan Abdullah,&#160;Lau, Sei Ping,&#160;International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A32 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Implementation of Brands' digital cash system in TCP/IP networking environment ent://SD_ILS/0/SD_ILS:327744 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Teo, Pock Chueng<br/>Author&#160;Teo, Pock Chueng,&#160;Ahmad Zuri Sha'ameri,&#160;Zulkarnain Mohd. Yusof,&#160;International Symposium on Information and Communications Technologies (2002 : Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;HG1710 T46 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> File access permission change detection using immunological negative selection approach ent://SD_ILS/0/SD_ILS:328443 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Mohd. Yazid Idris<br/>Author&#160;Mohd. Yazid Idris,&#160;Abdul Hanan Abdullah,&#160;Mohd. Aizaini Maarof,&#160;International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M92 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Authentication protocol : methods review ent://SD_ILS/0/SD_ILS:326821 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Cahyo Crysdian<br/>Author&#160;Cahyo Crysdian,&#160;Abdul Hanan Abdullah,&#160;International Technical Conference on Circuits, Systems, Computer and Communications (2002 : Thailand)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C35 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Security planning and disaster recovery ent://SD_ILS/0/SD_ILS:341667 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Maiwald, Eric<br/>Author&#160;Maiwald, Eric,&#160;Sieglein, William<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M36 2002<br/>Publisher&#160;McGraw-Hill Osborne,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780072224634<br/> Network intrusion detection : an analyst's handbook ent://SD_ILS/0/SD_ILS:159454 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Northcutt, Stephen<br/>Author&#160;Northcutt, Stephen,&#160;Novak, Judy,&#160;McLachlan, Donald<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N673 2000<br/>Edition&#160;2nd ed.<br/>Publisher&#160;New Riders,<br/>Publication Date&#160;2001<br/>ISBN&#160;9780735710085<br/> Network security : a beginner's guide ent://SD_ILS/0/SD_ILS:340640 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Maiwald, Eric<br/>Author&#160;Maiwald, Eric<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M35 2001<br/>Publisher&#160;McGraw-Hill/Osborne,<br/>Publication Date&#160;2001<br/>ISBN&#160;9780072133240<br/> Agent technology approach for proxy server ent://SD_ILS/0/SD_ILS:331108 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Fazidah Othman<br/>Author&#160;Fazidah Othman,&#160;Abdul Hanan Abdullah,&#160;Malaysian Science and Technology Congress (2000 : Genting Highlands, Pahang)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 F39 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001&#160;2000<br/> iPRO agent ent://SD_ILS/0/SD_ILS:146591 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Fazidah Othman<br/>Author&#160;Fazidah Othman,&#160;Abdul Hanan Abdullah,&#160;Malaysian Science and Technology Congress (2000 : Genting Highlands, Pahang)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 F38 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/> Penganalisa leksikal dan sintaktik di dalam antaramuka dinding api ent://SD_ILS/0/SD_ILS:102708 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Md. Asri Ngadi<br/>Author&#160;Md. Asri Ngadi<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M37 1999<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1999<br/>Tesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 1999<br/> Investigation FKE's network security using firewall ent://SD_ILS/0/SD_ILS:116695 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Low, Ho Chit<br/>Author&#160;Low, Ho Chit<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 L68 1999 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1999<br/> Network intrusion detection : an analyst's handbook ent://SD_ILS/0/SD_ILS:155582 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Northcutt, Stephen<br/>Author&#160;Northcutt, Stephen<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N673 1999<br/>Publisher&#160;New Riders,<br/>Publication Date&#160;1999<br/>ISBN&#160;9780735708686<br/> Designing network security ent://SD_ILS/0/SD_ILS:129261 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Kaeo, Merike<br/>Author&#160;Kaeo, Merike<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 K34 1999<br/>Publisher&#160;Cisci Press,<br/>Publication Date&#160;1999<br/>ISBN&#160;9781578700431<br/> Proxy system : analysis in concept, design and implementation ent://SD_ILS/0/SD_ILS:490082 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Rabiah Ahmad, Dr.<br/>Author&#160;Rabiah Ahmad, Dr.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 R33 1998 raf<br/>Publisher&#160;University of London,<br/>Publication Date&#160;1998<br/>Thesis (MSc in Information Security) - University of London, 1998<br/> Firewall : is it important ent://SD_ILS/0/SD_ILS:472198 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Tan, Wei Hong<br/>Author&#160;Tan, Wei Hong<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 T83 1998 raf<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1998<br/>Project paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1998<br/> Intranet security : stories from the trenches ent://SD_ILS/0/SD_ILS:481417 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;McCarthy, Linda<br/>Author&#160;McCarthy, Linda<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I6 M33 1998<br/>Publisher&#160;Sun Microsystems Press,<br/>Publication Date&#160;1998<br/>ISBN&#160;9780138947590<br/> Intranet firewalls : planning &amp; implementing your network security system ent://SD_ILS/0/SD_ILS:456836 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Fuller, Scott<br/>Author&#160;Fuller, Scott,&#160;Pagan, Kevin<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 F84 1996<br/>Publisher&#160;Ventana Communications Group, Inc.,<br/>Publication Date&#160;1997<br/>ISBN&#160;9781566045063<br/> Digital cash : commerce on the net ent://SD_ILS/0/SD_ILS:468154 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Wayner, Peter<br/>Author&#160;Wayner, Peter<br/>Format:&#160;Books<br/>Call Number&#160;HG1710 W39 1997<br/>Edition&#160;2nd ed<br/>Publisher&#160;AP Professional,<br/>Publication Date&#160;1997<br/>ISBN&#160;9780127887722<br/> Internet security : risk analysis, strategies and firewalls ent://SD_ILS/0/SD_ILS:462849 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Kyas, Othmar<br/>Author&#160;Kyas, Othmar<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 K92 1997<br/>Publisher&#160;International Thomson Computer Press,<br/>Publication Date&#160;1997<br/>ISBN&#160;9781850323020<br/> Network and Internet security ent://SD_ILS/0/SD_ILS:424640 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Ahuja, Vijay<br/>Author&#160;Ahuja, Vijay<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A38 1996<br/>Publisher&#160;AP Professional,<br/>Publication Date&#160;1996<br/>ISBN&#160;9780120455959<br/> What you need to know : bandits on the information superhighway ent://SD_ILS/0/SD_ILS:477227 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Barrett, Daniel J.<br/>Author&#160;Barrett, Daniel J.<br/>Format:&#160;Books<br/>Call Number&#160;HV6773 B37 1992<br/>Publisher&#160;O'Reilly &amp; Associates,<br/>Publication Date&#160;1996<br/>ISBN&#160;9781565921566<br/> Internet firewalls and network security ent://SD_ILS/0/SD_ILS:368519 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Hare, R. Christopher E.<br/>Author&#160;Hare, R. Christopher E.,&#160;Siyan, Karanjit S.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 H27 1995<br/>Publisher&#160;New Riders Pub.,<br/>Publication Date&#160;1995<br/>ISBN&#160;9781562054373<br/> The computer privacy handbook ent://SD_ILS/0/SD_ILS:410431 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Bacard, Andre<br/>Author&#160;Bacard, Andre<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B32 1995<br/>Publisher&#160;Peachpit Press,<br/>Publication Date&#160;1995<br/>ISBN&#160;9781566091718<br/> Implementing internet security ent://SD_ILS/0/SD_ILS:458580 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Cooper, Frederic J.<br/>Author&#160;Cooper, Frederic J.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 I46 1995<br/>Publisher&#160;New Riders,<br/>Publication Date&#160;1995<br/>ISBN&#160;9781562054717<br/> Firewalls and Internet security : repelling the wily hacker ent://SD_ILS/0/SD_ILS:410439 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Cheswick, William R.<br/>Author&#160;Cheswick, William R.,&#160;Bellovin, Steven M.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 C43 1994<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;1994<br/>ISBN&#160;9780201633573<br/> SECURITY IN VOICE OVER INTERNET PROTOCOL (VOIP) : IMPLEMENTATION AND ANALYSIS ent://SD_ILS/0/SD_ILS:839589 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Maimun Rizal, 1980-, author<br/>Author&#160;Maimun Rizal, 1980-, author,&#160;Abdul Hanan Abdullah, Prof.Dr., supervisor,&#160;Saiful Adli Ismail,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.8865 M35 2007<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> DNS PACKET CAPTURING AND ANALYZING SYSTEM ent://SD_ILS/0/SD_ILS:840483 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Babak Abdollahi Khameneh, 1983-, author<br/>Author&#160;Babak Abdollahi Khameneh, 1983-, author,&#160;Nurulhuda Firdaus Mohd. Azmi, Dr., supervisor,&#160;Sekolah Informatik Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 B33 2013 raf<br/>Thesis&#160;Sarjana Kejuruteraan Perisian<br/> DNS PACKET CAPTURING AND ANALYZING SYSTEM ent://SD_ILS/0/SD_ILS:840485 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Babak Abdollahi Khameneh, 1983-, author<br/>Author&#160;Babak Abdollahi Khameneh, 1983-, author,&#160;Nurulhuda Firdaus Mohd. Azmi, Dr., supervisor,&#160;Sekolah Informatik Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034038 ra<br/>Thesis&#160;Sarjana Kejuruteraan Perisian<br/> DESIGNING LIGHTWEIGHT CRYPTOGRAPHY ALGORITHM FOR INTERNET OF THINGS ent://SD_ILS/0/SD_ILS:864751 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Mohd. Fairus Mustapha, 1980-, author<br/>Author&#160;Mohd. Fairus Mustapha, 1980-, author,&#160;Majid Bakhtiari, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 035068 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/> SECURITY IN VOICE OVER INTERNET PROTOCOL (VOIP) : IMPLEMENTATION AND ANALYSIS ent://SD_ILS/0/SD_ILS:839590 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Maimun Rizal, 1980-, author<br/>Author&#160;Maimun Rizal, 1980-, author,&#160;Abdul Hanan Abdullah, Prof.Dr., supervisor,&#160;Saiful Adli Ismail, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 034567 ra<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> DESIGNING LIGHTWEIGHT CRYPTOGRAPHY ALGORITHM FOR INTERNET OF THINGS ent://SD_ILS/0/SD_ILS:864679 2024-04-18T20:52:18Z 2024-04-18T20:52:18Z by&#160;Mohd. Fairus Mustapha, 1980-, author<br/>Author&#160;Mohd. Fairus Mustapha, 1980-, author,&#160;Majid Bakhtiari, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M6434 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>