Search Results for Internet (Computer network) - Narrowed by: Open Access Book - English - Internet -- Security measures
SirsiDynix Enterprise
http://portal.utm.my/client/en_AU/main/main/qu$003dInternet$002b$002528Computer$002bnetwork$002529$0026qf$003dITYPE$002509Material$002bType$0025091$00253AOPEN_BK$002509Open$002bAccess$002bBook$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dSUBJECT$002509Subject$002509Internet$002b--$002bSecurity$002bmeasures$002509Internet$002b--$002bSecurity$002bmeasures$0026ps$003d300$0026isd$003dtrue?dt=list
2024-07-01T12:55:13Z
Network Forensics
ent://SD_ILS/0/SD_ILS:873173
2024-07-01T12:55:13Z
2024-07-01T12:55:13Z
by Messier, Ric, author<br/>Author Messier, Ric, author<br/>Format: Books<br/>Call Number TK5105.59 M47 2017<br/>Publication Date 2017<br/>ISBN 9781119328285<br/>
Web security : a WhiteHat perspective
ent://SD_ILS/0/SD_ILS:835869
2024-07-01T12:55:13Z
2024-07-01T12:55:13Z
by Hanqing, Wu, author<br/>Author Hanqing, Wu, author, Zhao, Liz, author<br/>Format: Books<br/>Call Number TK5105.59 H363 2015<br/>Publisher CRC Press is an imprint of Taylor & Francis ; Publishing House of Electronics Industry,<br/>Publication Date 2015<br/>ISBN 9781466592612<br/>
Computational network science : an algorithmic approach
ent://SD_ILS/0/SD_ILS:838372
2024-07-01T12:55:13Z
2024-07-01T12:55:13Z
by Hexmoor, Henry, author<br/>Author Hexmoor, Henry, author<br/>Format: Books<br/>Call Number TK5105.59 H49 2015<br/>Publisher Morgan Kaufmann,<br/>Publication Date 2015<br/>ISBN 9780128008911<br/>
Windows forensic analysis toolkit : advanced analysis techniques for Windows 8
ent://SD_ILS/0/SD_ILS:838076
2024-07-01T12:55:13Z
2024-07-01T12:55:13Z
by Carvey, Harlan A., author<br/>Author Carvey, Harlan A., author<br/>Format: Books<br/>Call Number HV8079.C65 C374 2014<br/>Edition Fourth edition<br/>Publisher Syngress,<br/>Publication Date 2014<br/>ISBN 9780124171572<br/>
Network intrusion detection and prevention : concepts and techniques
ent://SD_ILS/0/SD_ILS:334955
2024-07-01T12:55:13Z
2024-07-01T12:55:13Z
by Ali A. Ghorbani<br/>Author Ali A. Ghorbani, Lu, Wei, Tavallaee, Mahbod<br/>Format: Books<br/>Call Number TK5105.59 A43 2010<br/>Publisher Springer,<br/>Publication Date 2010<br/>ISBN 9780387887708<br/>
Securing the information infrastructure
ent://SD_ILS/0/SD_ILS:631867
2024-07-01T12:55:13Z
2024-07-01T12:55:13Z
by Kizza, Joseph Migga<br/>Author Kizza, Joseph Migga, Kizza, Florence Migga<br/>Format: Books<br/>Call Number HV6773 K59 2008<br/>Publisher Cybertech Pub.,<br/>Publication Date 2008<br/>ISBN 9781599043791 9781599043814<br/>
Synchronizing internet protocol security (SIPSec)
ent://SD_ILS/0/SD_ILS:209758
2024-07-01T12:55:13Z
2024-07-01T12:55:13Z
by Shoniregun, Charles A.<br/>Author Shoniregun, Charles A.<br/>Format: Books<br/>Call Number TK5105.875.I57 S56 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9780387327242<br/><a href="http://dx.doi.org/10.1007/978-0-387-68569-4">Fulltext</a><br/>
Practical internet security
ent://SD_ILS/0/SD_ILS:158413
2024-07-01T12:55:13Z
2024-07-01T12:55:13Z
by Vacca, John R.<br/>Author Vacca, John R.<br/>Format: Books<br/>Call Number TK5105.59 V324 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9780387405339<br/><a href="http://dx.doi.org/10.1007/978-0-387-29844-3">FullText</a><br/>
Hackers challenge 3 : 20 brand-new forensic scenarios & solutions
ent://SD_ILS/0/SD_ILS:100571
2024-07-01T12:55:13Z
2024-07-01T12:55:13Z
by Pollino, David<br/>Author Pollino, David<br/>Format: Books<br/>Call Number QA76.9.A25 H324 2006<br/>Publisher McGraw-Hill,<br/>Publication Date 2006<br/>ISBN 9780072263046<br/>
Windows forensics : the field guide for corporate computer investigations
ent://SD_ILS/0/SD_ILS:277857
2024-07-01T12:55:13Z
2024-07-01T12:55:13Z
by Steel, Chad<br/>Author Steel, Chad<br/>Format: Books<br/>Call Number HV8079.C65 S84 2006<br/>Publisher Wiley Pub.,<br/>Publication Date 2006<br/>ISBN 9780470038628<br/>
Professional pen testing for Web applications
ent://SD_ILS/0/SD_ILS:132813
2024-07-01T12:55:13Z
2024-07-01T12:55:13Z
by Andreu, Andres, 1968-<br/>Author Andreu, Andres, 1968-<br/>Format: Books<br/>Call Number QA76.9.A25 A525 2006<br/>Publisher Wiley Pub.,<br/>Publication Date 2006<br/>ISBN 9780471789666<br/>
The executive guide to information security : threats, challenges, and solutions
ent://SD_ILS/0/SD_ILS:430485
2024-07-01T12:55:13Z
2024-07-01T12:55:13Z
by Egan, Mark<br/>Author Egan, Mark<br/>Format: Books<br/>Call Number HF5548.32 E32 2005<br/>Publisher Addison-Wesley,<br/>Publication Date 2005<br/>ISBN 9780321304513<br/>
Network firewall development with multilevel security policy
ent://SD_ILS/0/SD_ILS:395124
2024-07-01T12:55:13Z
2024-07-01T12:55:13Z
by Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, International Conference on Computer Theory and Applications (14th. : 2004 : Egypt)<br/>Format: Books<br/>Call Number TK5105.59 C334 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>
Principles and practice of information security : protecting computers from hackers and lawyers
ent://SD_ILS/0/SD_ILS:389219
2024-07-01T12:55:13Z
2024-07-01T12:55:13Z
by Volonino, Linda<br/>Author Volonino, Linda, Robinson, Stephen R., Volonino, Charles P.<br/>Format: Books<br/>Call Number TK5105.59 V64 2004<br/>Publisher Pearson/Prentice Hall,<br/>Publication Date 2004<br/>ISBN 9780131840270<br/>
Designing network security
ent://SD_ILS/0/SD_ILS:135032
2024-07-01T12:55:13Z
2024-07-01T12:55:13Z
by Kaeo, Merike<br/>Author Kaeo, Merike<br/>Format: Books<br/>Call Number TK5105.59 K34 2004<br/>Edition 2nd ed.<br/>Publisher Cisco Press,<br/>Publication Date 2004<br/>ISBN 9781587051173<br/>
Network intrusion detection
ent://SD_ILS/0/SD_ILS:386349
2024-07-01T12:55:13Z
2024-07-01T12:55:13Z
by Northcutt, Stephen<br/>Author Northcutt, Stephen, Novak, Judy<br/>Format: Books<br/>Call Number TK5105.59 N673 2003<br/>Edition 3rd ed.<br/>Publisher New Riders,<br/>Publication Date 2003<br/>ISBN 9780735712652<br/>
Enforcing multilevel security policies for network firewall
ent://SD_ILS/0/SD_ILS:352173
2024-07-01T12:55:13Z
2024-07-01T12:55:13Z
by Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, Mohd. Aizaini Maarof, International Conference Information Technology in Asia (2003 : Kuching, Sarawak)<br/>Format: Books<br/>Call Number TK5105.59 C34 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>
Access controlling firewall using Bell-LaPadula security model
ent://SD_ILS/0/SD_ILS:353549
2024-07-01T12:55:13Z
2024-07-01T12:55:13Z
by Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, Quality in Research Seminar (6th : 2003 : Indonesia)<br/>Format: Books<br/>Call Number TK5105.59 C33 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>
Securing E-business systems : a guide for managers and executives
ent://SD_ILS/0/SD_ILS:370726
2024-07-01T12:55:13Z
2024-07-01T12:55:13Z
by Braithwaite, Timothy, 1942-<br/>Author Braithwaite, Timothy, 1942-<br/>Format: Books<br/>Call Number HF5548.32 B72 2002<br/>Publisher John Wiley,<br/>Publication Date 2002<br/>ISBN 9780471072980<br/>
Packet filtering personal firewall based on microsoft's internet protocol helper API
ent://SD_ILS/0/SD_ILS:326714
2024-07-01T12:55:13Z
2024-07-01T12:55:13Z
by Abdul Hanan Abdullah<br/>Author Abdul Hanan Abdullah, Lau, Sei Ping, International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format: Books<br/>Call Number TK5105.59 A32 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>
Authentication protocol : methods review
ent://SD_ILS/0/SD_ILS:326821
2024-07-01T12:55:13Z
2024-07-01T12:55:13Z
by Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, International Technical Conference on Circuits, Systems, Computer and Communications (2002 : Thailand)<br/>Format: Books<br/>Call Number QA76.9.A25 C35 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>
Internet and intranet security
ent://SD_ILS/0/SD_ILS:303203
2024-07-01T12:55:13Z
2024-07-01T12:55:13Z
by Oppliger, Rolf<br/>Author Oppliger, Rolf<br/>Format: Books<br/>Call Number TK5105.875.I57 O67 2002<br/>Edition 2nd ed.<br/>Publisher Artech House,<br/>Publication Date 2002<br/>ISBN 9781580531665<br/>
Non-repudiation in electronic commerce
ent://SD_ILS/0/SD_ILS:317073
2024-07-01T12:55:13Z
2024-07-01T12:55:13Z
by Zhou, Jianying<br/>Author Zhou, Jianying<br/>Format: Books<br/>Call Number HF5548.32 Z49 2001<br/>Publisher Artech House,<br/>Publication Date 2001<br/>ISBN 9781580532471<br/>
Agent technology approach for proxy server
ent://SD_ILS/0/SD_ILS:331108
2024-07-01T12:55:13Z
2024-07-01T12:55:13Z
by Fazidah Othman<br/>Author Fazidah Othman, Abdul Hanan Abdullah, Malaysian Science and Technology Congress (2000 : Genting Highlands, Pahang)<br/>Format: Books<br/>Call Number TK5105.59 F39 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001 2000<br/>
iPRO agent
ent://SD_ILS/0/SD_ILS:146591
2024-07-01T12:55:13Z
2024-07-01T12:55:13Z
by Fazidah Othman<br/>Author Fazidah Othman, Abdul Hanan Abdullah, Malaysian Science and Technology Congress (2000 : Genting Highlands, Pahang)<br/>Format: Books<br/>Call Number TK5105.59 F38 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>
Designing network security
ent://SD_ILS/0/SD_ILS:129261
2024-07-01T12:55:13Z
2024-07-01T12:55:13Z
by Kaeo, Merike<br/>Author Kaeo, Merike<br/>Format: Books<br/>Call Number TK5105.59 K34 1999<br/>Publisher Cisci Press,<br/>Publication Date 1999<br/>ISBN 9781578700431<br/>
Internet security for business
ent://SD_ILS/0/SD_ILS:112376
2024-07-01T12:55:13Z
2024-07-01T12:55:13Z
by Bernstein, Terry<br/>Author Bernstein, Terry<br/>Format: Books<br/>Call Number HD30.38 I57 1996<br/>Publisher John Wiley,<br/>Publication Date 1996<br/>ISBN 9780471137528<br/>