Search Results for Internet (Computer network) - Narrowed by: Open Access Book - English - Internet -- Security measures SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dInternet$002b$002528Computer$002bnetwork$002529$0026qf$003dITYPE$002509Material$002bType$0025091$00253AOPEN_BK$002509Open$002bAccess$002bBook$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026qf$003dSUBJECT$002509Subject$002509Internet$002b--$002bSecurity$002bmeasures$002509Internet$002b--$002bSecurity$002bmeasures$0026ps$003d300$0026isd$003dtrue?dt=list 2024-07-01T12:55:13Z Network Forensics ent://SD_ILS/0/SD_ILS:873173 2024-07-01T12:55:13Z 2024-07-01T12:55:13Z by&#160;Messier, Ric, author<br/>Author&#160;Messier, Ric, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M47 2017<br/>Publication Date&#160;2017<br/>ISBN&#160;9781119328285<br/> Web security : a WhiteHat perspective ent://SD_ILS/0/SD_ILS:835869 2024-07-01T12:55:13Z 2024-07-01T12:55:13Z by&#160;Hanqing, Wu, author<br/>Author&#160;Hanqing, Wu, author,&#160;Zhao, Liz, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H363 2015<br/>Publisher&#160;CRC Press is an imprint of Taylor &amp; Francis ; Publishing House of Electronics Industry,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781466592612<br/> Computational network science : an algorithmic approach ent://SD_ILS/0/SD_ILS:838372 2024-07-01T12:55:13Z 2024-07-01T12:55:13Z by&#160;Hexmoor, Henry, author<br/>Author&#160;Hexmoor, Henry, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H49 2015<br/>Publisher&#160;Morgan Kaufmann,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780128008911<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:838076 2024-07-01T12:55:13Z 2024-07-01T12:55:13Z by&#160;Carvey, Harlan A., author<br/>Author&#160;Carvey, Harlan A., author<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 C374 2014<br/>Edition&#160;Fourth edition<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124171572<br/> Network intrusion detection and prevention : concepts and techniques ent://SD_ILS/0/SD_ILS:334955 2024-07-01T12:55:13Z 2024-07-01T12:55:13Z by&#160;Ali A. Ghorbani<br/>Author&#160;Ali A. Ghorbani,&#160;Lu, Wei,&#160;Tavallaee, Mahbod<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A43 2010<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780387887708<br/> Securing the information infrastructure ent://SD_ILS/0/SD_ILS:631867 2024-07-01T12:55:13Z 2024-07-01T12:55:13Z by&#160;Kizza, Joseph Migga<br/>Author&#160;Kizza, Joseph Migga,&#160;Kizza, Florence Migga<br/>Format:&#160;Books<br/>Call Number&#160;HV6773 K59 2008<br/>Publisher&#160;Cybertech Pub.,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781599043791&#160;9781599043814<br/> Synchronizing internet protocol security (SIPSec) ent://SD_ILS/0/SD_ILS:209758 2024-07-01T12:55:13Z 2024-07-01T12:55:13Z by&#160;Shoniregun, Charles A.<br/>Author&#160;Shoniregun, Charles A.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 S56 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780387327242<br/><a href="http://dx.doi.org/10.1007/978-0-387-68569-4">Fulltext</a><br/> Practical internet security ent://SD_ILS/0/SD_ILS:158413 2024-07-01T12:55:13Z 2024-07-01T12:55:13Z by&#160;Vacca, John R.<br/>Author&#160;Vacca, John R.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 V324 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780387405339<br/><a href="http://dx.doi.org/10.1007/978-0-387-29844-3">FullText</a><br/> Hackers challenge 3 : 20 brand-new forensic scenarios &amp; solutions ent://SD_ILS/0/SD_ILS:100571 2024-07-01T12:55:13Z 2024-07-01T12:55:13Z by&#160;Pollino, David<br/>Author&#160;Pollino, David<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H324 2006<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780072263046<br/> Windows forensics : the field guide for corporate computer investigations ent://SD_ILS/0/SD_ILS:277857 2024-07-01T12:55:13Z 2024-07-01T12:55:13Z by&#160;Steel, Chad<br/>Author&#160;Steel, Chad<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 S84 2006<br/>Publisher&#160;Wiley Pub.,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780470038628<br/> Professional pen testing for Web applications ent://SD_ILS/0/SD_ILS:132813 2024-07-01T12:55:13Z 2024-07-01T12:55:13Z by&#160;Andreu, Andres, 1968-<br/>Author&#160;Andreu, Andres, 1968-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A525 2006<br/>Publisher&#160;Wiley Pub.,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780471789666<br/> The executive guide to information security : threats, challenges, and solutions ent://SD_ILS/0/SD_ILS:430485 2024-07-01T12:55:13Z 2024-07-01T12:55:13Z by&#160;Egan, Mark<br/>Author&#160;Egan, Mark<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 E32 2005<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780321304513<br/> Network firewall development with multilevel security policy ent://SD_ILS/0/SD_ILS:395124 2024-07-01T12:55:13Z 2024-07-01T12:55:13Z by&#160;Cahyo Crysdian<br/>Author&#160;Cahyo Crysdian,&#160;Abdul Hanan Abdullah,&#160;International Conference on Computer Theory and Applications (14th. : 2004 : Egypt)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C334 2004<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/> Principles and practice of information security : protecting computers from hackers and lawyers ent://SD_ILS/0/SD_ILS:389219 2024-07-01T12:55:13Z 2024-07-01T12:55:13Z by&#160;Volonino, Linda<br/>Author&#160;Volonino, Linda,&#160;Robinson, Stephen R.,&#160;Volonino, Charles P.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 V64 2004<br/>Publisher&#160;Pearson/Prentice Hall,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780131840270<br/> Designing network security ent://SD_ILS/0/SD_ILS:135032 2024-07-01T12:55:13Z 2024-07-01T12:55:13Z by&#160;Kaeo, Merike<br/>Author&#160;Kaeo, Merike<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 K34 2004<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Cisco Press,<br/>Publication Date&#160;2004<br/>ISBN&#160;9781587051173<br/> Network intrusion detection ent://SD_ILS/0/SD_ILS:386349 2024-07-01T12:55:13Z 2024-07-01T12:55:13Z by&#160;Northcutt, Stephen<br/>Author&#160;Northcutt, Stephen,&#160;Novak, Judy<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N673 2003<br/>Edition&#160;3rd ed.<br/>Publisher&#160;New Riders,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780735712652<br/> Enforcing multilevel security policies for network firewall ent://SD_ILS/0/SD_ILS:352173 2024-07-01T12:55:13Z 2024-07-01T12:55:13Z by&#160;Cahyo Crysdian<br/>Author&#160;Cahyo Crysdian,&#160;Abdul Hanan Abdullah,&#160;Mohd. Aizaini Maarof,&#160;International Conference Information Technology in Asia (2003 : Kuching, Sarawak)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C34 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Access controlling firewall using Bell-LaPadula security model ent://SD_ILS/0/SD_ILS:353549 2024-07-01T12:55:13Z 2024-07-01T12:55:13Z by&#160;Cahyo Crysdian<br/>Author&#160;Cahyo Crysdian,&#160;Abdul Hanan Abdullah,&#160;Quality in Research Seminar (6th : 2003 : Indonesia)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C33 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Securing E-business systems : a guide for managers and executives ent://SD_ILS/0/SD_ILS:370726 2024-07-01T12:55:13Z 2024-07-01T12:55:13Z by&#160;Braithwaite, Timothy, 1942-<br/>Author&#160;Braithwaite, Timothy, 1942-<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 B72 2002<br/>Publisher&#160;John Wiley,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780471072980<br/> Packet filtering personal firewall based on microsoft's internet protocol helper API ent://SD_ILS/0/SD_ILS:326714 2024-07-01T12:55:13Z 2024-07-01T12:55:13Z by&#160;Abdul Hanan Abdullah<br/>Author&#160;Abdul Hanan Abdullah,&#160;Lau, Sei Ping,&#160;International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A32 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Authentication protocol : methods review ent://SD_ILS/0/SD_ILS:326821 2024-07-01T12:55:13Z 2024-07-01T12:55:13Z by&#160;Cahyo Crysdian<br/>Author&#160;Cahyo Crysdian,&#160;Abdul Hanan Abdullah,&#160;International Technical Conference on Circuits, Systems, Computer and Communications (2002 : Thailand)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C35 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Internet and intranet security ent://SD_ILS/0/SD_ILS:303203 2024-07-01T12:55:13Z 2024-07-01T12:55:13Z by&#160;Oppliger, Rolf<br/>Author&#160;Oppliger, Rolf<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 O67 2002<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2002<br/>ISBN&#160;9781580531665<br/> Non-repudiation in electronic commerce ent://SD_ILS/0/SD_ILS:317073 2024-07-01T12:55:13Z 2024-07-01T12:55:13Z by&#160;Zhou, Jianying<br/>Author&#160;Zhou, Jianying<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 Z49 2001<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2001<br/>ISBN&#160;9781580532471<br/> Agent technology approach for proxy server ent://SD_ILS/0/SD_ILS:331108 2024-07-01T12:55:13Z 2024-07-01T12:55:13Z by&#160;Fazidah Othman<br/>Author&#160;Fazidah Othman,&#160;Abdul Hanan Abdullah,&#160;Malaysian Science and Technology Congress (2000 : Genting Highlands, Pahang)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 F39 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001&#160;2000<br/> iPRO agent ent://SD_ILS/0/SD_ILS:146591 2024-07-01T12:55:13Z 2024-07-01T12:55:13Z by&#160;Fazidah Othman<br/>Author&#160;Fazidah Othman,&#160;Abdul Hanan Abdullah,&#160;Malaysian Science and Technology Congress (2000 : Genting Highlands, Pahang)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 F38 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/> Designing network security ent://SD_ILS/0/SD_ILS:129261 2024-07-01T12:55:13Z 2024-07-01T12:55:13Z by&#160;Kaeo, Merike<br/>Author&#160;Kaeo, Merike<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 K34 1999<br/>Publisher&#160;Cisci Press,<br/>Publication Date&#160;1999<br/>ISBN&#160;9781578700431<br/> Internet security for business ent://SD_ILS/0/SD_ILS:112376 2024-07-01T12:55:13Z 2024-07-01T12:55:13Z by&#160;Bernstein, Terry<br/>Author&#160;Bernstein, Terry<br/>Format:&#160;Books<br/>Call Number&#160;HD30.38 I57 1996<br/>Publisher&#160;John Wiley,<br/>Publication Date&#160;1996<br/>ISBN&#160;9780471137528<br/>