Search Results for Internet (Computer network) - Narrowed by: Computer networks -- Security measuresSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dInternet$002b$002528Computer$002bnetwork$002529$0026qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures$0026ps$003d300$0026isd$003dtrue?dt=list2024-06-10T06:20:21ZComputer Security Fundamentalsent://SD_ILS/0/SD_ILS:8861352024-06-10T06:20:21Z2024-06-10T06:20:21Zby Easttom, Chuck, author<br/>Author Easttom, Chuck, author<br/>Format: Books<br/>Call Number QA76.9.A25 E27 2020<br/>Edition Fourth Edition<br/>Publication Date 2020<br/>ISBN 9780135774779<br/>Security in IoT-Enabled Spaceent://SD_ILS/0/SD_ILS:8822842024-06-10T06:20:21Z2024-06-10T06:20:21Zby Al-Turjman, Fadi, author<br/>Author Al-Turjman, Fadi, author<br/>Format: Books<br/>Call Number TK5105.8857 A48 2019<br/>Publication Date 2019<br/>ISBN 9780367111236<br/>Network Forensicsent://SD_ILS/0/SD_ILS:8731732024-06-10T06:20:21Z2024-06-10T06:20:21Zby Messier, Ric, author<br/>Author Messier, Ric, author<br/>Format: Books<br/>Call Number TK5105.59 M47 2017<br/>Publication Date 2017<br/>ISBN 9781119328285<br/>Computational network science : an algorithmic approachent://SD_ILS/0/SD_ILS:8383722024-06-10T06:20:21Z2024-06-10T06:20:21Zby Hexmoor, Henry, author<br/>Author Hexmoor, Henry, author<br/>Format: Books<br/>Call Number TK5105.59 H49 2015<br/>Publisher Morgan Kaufmann,<br/>Publication Date 2015<br/>ISBN 9780128008911<br/>Advances in secure computing, internet services, and applicationsent://SD_ILS/0/SD_ILS:8412032024-06-10T06:20:21Z2024-06-10T06:20:21Zby Tripathy, B. K. editor<br/>Author Tripathy, B. K. editor, Acharjya, D. P. editor<br/>Format: Books<br/>Call Number TK5105.59 A38 2014 f<br/>Publisher Information Science Reference, an imprint of IGI Global,<br/>Publication Date 2014<br/>ISBN 9781466649408<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:8380762024-06-10T06:20:21Z2024-06-10T06:20:21Zby Carvey, Harlan A., author<br/>Author Carvey, Harlan A., author<br/>Format: Books<br/>Call Number HV8079.C65 C374 2014<br/>Edition Fourth edition<br/>Publisher Syngress,<br/>Publication Date 2014<br/>ISBN 9780124171572<br/>Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and dataent://SD_ILS/0/SD_ILS:6404622024-06-10T06:20:21Z2024-06-10T06:20:21Zby Lillard, Terrence V.<br/>Author Lillard, Terrence V., Lillard, Terrence<br/>Format: Books<br/>Call Number HV8079.C65 D54 2010<br/>Publisher Syngress,<br/>Publication Date 2010<br/>ISBN 9781597495370<br/>Network intrusion detection and prevention : concepts and techniquesent://SD_ILS/0/SD_ILS:3349552024-06-10T06:20:21Z2024-06-10T06:20:21Zby Ali A. Ghorbani<br/>Author Ali A. Ghorbani, Lu, Wei, Tavallaee, Mahbod<br/>Format: Books<br/>Call Number TK5105.59 A43 2010<br/>Publisher Springer,<br/>Publication Date 2010<br/>ISBN 9780387887708<br/>Disappearing cryptography : information hiding : steganography and watermarkingent://SD_ILS/0/SD_ILS:3350292024-06-10T06:20:21Z2024-06-10T06:20:21Zby Wayner, Peter<br/>Author Wayner, Peter<br/>Format: Books<br/>Call Number TK5105.59 W39 2009<br/>Edition 3rd ed.<br/>Publisher Morgan Kaufmann,<br/>Publication Date 2009<br/>ISBN 9780123744791<br/>Securing the information infrastructureent://SD_ILS/0/SD_ILS:6318672024-06-10T06:20:21Z2024-06-10T06:20:21Zby Kizza, Joseph Migga<br/>Author Kizza, Joseph Migga, Kizza, Florence Migga<br/>Format: Books<br/>Call Number HV6773 K59 2008<br/>Publisher Cybertech Pub.,<br/>Publication Date 2008<br/>ISBN 9781599043791 9781599043814<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:3538042024-06-10T06:20:21Z2024-06-10T06:20:21Zby Kahate, Atul<br/>Author Kahate, Atul<br/>Format: Books<br/>Call Number TK5105.59 K33 2008<br/>Edition 2nd ed.,<br/>Publisher Tata McGraw-Hill,<br/>Publication Date 2008<br/>ISBN 9780070648234<br/>An intrusion detection system (IDS) for internet networkent://SD_ILS/0/SD_ILS:1569382024-06-10T06:20:21Z2024-06-10T06:20:21Zby Mohd. Fauzan Safiee<br/>Author Mohd. Fauzan Safiee, Syarifah Hafizah Syed Ariffin<br/>Format: Books<br/>Call Number TK5105.59 M43 2007<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=48865">Preview</a><br/>Thesis (Sarjana Kejuruteraan (Elektrikal-Elektronik dan Telecommunication)) - Universiti Teknologi Malaysia, 2007<br/>Practical internet securityent://SD_ILS/0/SD_ILS:1584132024-06-10T06:20:21Z2024-06-10T06:20:21Zby Vacca, John R.<br/>Author Vacca, John R.<br/>Format: Books<br/>Call Number TK5105.59 V324 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9780387405339<br/><a href="http://dx.doi.org/10.1007/978-0-387-29844-3">FullText</a><br/>An intrusion detection system (IDS) for internet networkent://SD_ILS/0/SD_ILS:5682282024-06-10T06:20:21Z2024-06-10T06:20:21Zby Mohd. Fauzan Safiee<br/>Author Mohd. Fauzan Safiee, Syarifah Hafizah Syed Ariffin<br/>Format: Computer file<br/>Call Number CP 015165<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/>Thesis (Sarjana Kejuruteraan (Elektrikal-Elektronik dan Telecommunication)) - Universiti Teknologi Malaysia, 2007<br/>Hackers challenge 3 : 20 brand-new forensic scenarios & solutionsent://SD_ILS/0/SD_ILS:1005712024-06-10T06:20:21Z2024-06-10T06:20:21Zby Pollino, David<br/>Author Pollino, David<br/>Format: Books<br/>Call Number QA76.9.A25 H324 2006<br/>Publisher McGraw-Hill,<br/>Publication Date 2006<br/>ISBN 9780072263046<br/>Active firewall mechanism as a comprehensive approach towards minimizing internet threatsent://SD_ILS/0/SD_ILS:6171512024-06-10T06:20:21Z2024-06-10T06:20:21Zby Cahyo Crysdian<br/>Author Cahyo Crysdian<br/>Format: Computer file<br/>Call Number CP 029338 ra<br/>Publication Date 2006<br/>Thesis (Doktor Falsafah (Fakulti Kejuteraan Elektrik)) - Universiti Teknologi Malaysia, 2006<br/>Active firewall mechanism as a comprehensive approach towards minimizing internet threatsent://SD_ILS/0/SD_ILS:4681052024-06-10T06:20:21Z2024-06-10T06:20:21Zby Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah<br/>Format: Books<br/>Call Number TK5105.875.I57 C33 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Thesis (Doktor Falsafah (Fakulti Kejuteraan Elektrik)) - Universiti Teknologi Malaysia, 2007<br/>Extrusion detection : security monitoring for internal intrusionsent://SD_ILS/0/SD_ILS:4704522024-06-10T06:20:21Z2024-06-10T06:20:21Zby Bejtlich, Richard<br/>Author Bejtlich, Richard<br/>Format: Books<br/>Call Number TK5105.59 B44 2006<br/>Publisher Addison-Wesley,<br/>Publication Date 2006<br/>ISBN 9780321349965<br/>Windows forensics : the field guide for corporate computer investigationsent://SD_ILS/0/SD_ILS:2778572024-06-10T06:20:21Z2024-06-10T06:20:21Zby Steel, Chad<br/>Author Steel, Chad<br/>Format: Books<br/>Call Number HV8079.C65 S84 2006<br/>Publisher Wiley Pub.,<br/>Publication Date 2006<br/>ISBN 9780470038628<br/>Professional pen testing for Web applicationsent://SD_ILS/0/SD_ILS:1328132024-06-10T06:20:21Z2024-06-10T06:20:21Zby Andreu, Andres, 1968-<br/>Author Andreu, Andres, 1968-<br/>Format: Books<br/>Call Number QA76.9.A25 A525 2006<br/>Publisher Wiley Pub.,<br/>Publication Date 2006<br/>ISBN 9780471789666<br/>Securing the webent://SD_ILS/0/SD_ILS:85822024-06-10T06:20:21Z2024-06-10T06:20:21Zby Video Education Australasia<br/>Author Video Education Australasia<br/>Format: Visual Materials<br/>Call Number CP 015502<br/>Publisher VEA,<br/>Publication Date 2006<br/>Scalable and secure internet services and architectureent://SD_ILS/0/SD_ILS:1566142024-06-10T06:20:21Z2024-06-10T06:20:21Zby Xu, Chengzhong<br/>Author Xu, Chengzhong<br/>Format: Books<br/>Call Number TK5105.875.I57 X82 2005<br/>Publisher Chapman & Hall,<br/>Publication Date 2005<br/>ISBN 9781584883777<br/>Protokol pengurusan kekunci keselamatan internet bagi algoritma penyulitan advance encryption standard (AES) dalam Internet Protocol Security (IPSEC)ent://SD_ILS/0/SD_ILS:6109462024-06-10T06:20:21Z2024-06-10T06:20:21Zby Nik Shahidah Afifi Md. Taujuddin<br/>Author Nik Shahidah Afifi Md. Taujuddin<br/>Format: Computer file<br/>Call Number CP 10390<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2005<br/>Protokol pengurusan kekunci keselamatan internet bagi algoritma penyulitan advance encryption standard (AES) dalam Internet Protocol Security (IPSEC)ent://SD_ILS/0/SD_ILS:4424702024-06-10T06:20:21Z2024-06-10T06:20:21Zby Nik Shahidah Afifi Md. Taujuddin<br/>Author Nik Shahidah Afifi Md. Taujuddin<br/>Format: Books<br/>Call Number TK5105.59 N544 2005 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2005<br/>Network firewall development with multilevel security policyent://SD_ILS/0/SD_ILS:3951242024-06-10T06:20:21Z2024-06-10T06:20:21Zby Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, International Conference on Computer Theory and Applications (14th. : 2004 : Egypt)<br/>Format: Books<br/>Call Number TK5105.59 C334 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Principles and practice of information security : protecting computers from hackers and lawyersent://SD_ILS/0/SD_ILS:3892192024-06-10T06:20:21Z2024-06-10T06:20:21Zby Volonino, Linda<br/>Author Volonino, Linda, Robinson, Stephen R., Volonino, Charles P.<br/>Format: Books<br/>Call Number TK5105.59 V64 2004<br/>Publisher Pearson/Prentice Hall,<br/>Publication Date 2004<br/>ISBN 9780131840270<br/>Defense and detection strategies against Internet wormsent://SD_ILS/0/SD_ILS:4178392024-06-10T06:20:21Z2024-06-10T06:20:21Zby Nazario, Jose<br/>Author Nazario, Jose<br/>Format: Books<br/>Call Number QA76.9.A25 N394 2004<br/>Publisher Artech House,<br/>Publication Date 2004<br/>ISBN 9781580535373<br/>Designing network securityent://SD_ILS/0/SD_ILS:1350322024-06-10T06:20:21Z2024-06-10T06:20:21Zby Kaeo, Merike<br/>Author Kaeo, Merike<br/>Format: Books<br/>Call Number TK5105.59 K34 2004<br/>Edition 2nd ed.<br/>Publisher Cisco Press,<br/>Publication Date 2004<br/>ISBN 9781587051173<br/>Security + guide to network security fundamentalsent://SD_ILS/0/SD_ILS:3643912024-06-10T06:20:21Z2024-06-10T06:20:21Zby Cisco Learning Institute<br/>Author Cisco Learning Institute, Campbell, Paul, Calvert, Ben, Boswell, Steven<br/>Format: Books<br/>Call Number TK5105.59 C57 2003<br/>Publisher Thomson Learning,<br/>Publication Date 2003<br/>ISBN 9780619212940<br/>Security + guide to network security fundamentalsent://SD_ILS/0/SD_ILS:6021812024-06-10T06:20:21Z2024-06-10T06:20:21Zby Cisco Learning Institute<br/>Author Cisco Learning Institute, Campbell, Paul, Calvert, Ben, Boswell, Steven<br/>Format: Computer file<br/>Call Number CP 3021<br/>Publisher Thomson Learning,<br/>Publication Date 2003<br/>Hacker V : pakar keselamatan rangkaian Norton Internet securityent://SD_ILS/0/SD_ILS:4114412024-06-10T06:20:21Z2024-06-10T06:20:21Zby Man, P. C.<br/>Author Man, P. C.<br/>Format: Books<br/>Call Number TK5105.59 H32 2003<br/>Publisher King Information,<br/>Publication Date 2003<br/>ISBN 9789861250694<br/>Network intrusion detectionent://SD_ILS/0/SD_ILS:3863492024-06-10T06:20:21Z2024-06-10T06:20:21Zby Northcutt, Stephen<br/>Author Northcutt, Stephen, Novak, Judy<br/>Format: Books<br/>Call Number TK5105.59 N673 2003<br/>Edition 3rd ed.<br/>Publisher New Riders,<br/>Publication Date 2003<br/>ISBN 9780735712652<br/>Enforcing multilevel security policies for network firewallent://SD_ILS/0/SD_ILS:3521732024-06-10T06:20:21Z2024-06-10T06:20:21Zby Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, Mohd. Aizaini Maarof, International Conference Information Technology in Asia (2003 : Kuching, Sarawak)<br/>Format: Books<br/>Call Number TK5105.59 C34 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>A Benchmarking methodology for NPU-based stateful firewallent://SD_ILS/0/SD_ILS:3526122024-06-10T06:20:21Z2024-06-10T06:20:21Zby Lee, Eng Kean<br/>Author Lee, Eng Kean, Sulaiman Mohd. Nor, IEEE Asia Pacific Conference on Communication APCC 2003 (9th : 2003 : Penang)<br/>Format: Books<br/>Call Number TK5105.59 L44 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Network security : a beginner's guideent://SD_ILS/0/SD_ILS:3474012024-06-10T06:20:21Z2024-06-10T06:20:21Zby Maiwald, Eric<br/>Author Maiwald, Eric<br/>Format: Books<br/>Call Number TK5105.59 M35 2003<br/>Edition 2nd ed.<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2003<br/>ISBN 9780072229578<br/>Access controlling firewall using Bell-LaPadula security modelent://SD_ILS/0/SD_ILS:3535492024-06-10T06:20:21Z2024-06-10T06:20:21Zby Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, Quality in Research Seminar (6th : 2003 : Indonesia)<br/>Format: Books<br/>Call Number TK5105.59 C33 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:3548532024-06-10T06:20:21Z2024-06-10T06:20:21Zby Kahate, Atul<br/>Author Kahate, Atul<br/>Format: Books<br/>Call Number TK5105.59 K33 2003<br/>Publisher Tata McGraw-Hill,<br/>Publication Date 2003<br/>ISBN 9780070494831<br/>Practical Unix and internet securityent://SD_ILS/0/SD_ILS:3341472024-06-10T06:20:21Z2024-06-10T06:20:21Zby Garfinkel, Simson<br/>Author Garfinkel, Simson, Spafford, Gene, Schwartz, Alan<br/>Format: Books<br/>Call Number TK5105.59 G37 2003<br/>Edition 3rd ed.<br/>Publisher O'Reilly & Associates,<br/>Publication Date 2003<br/>ISBN 9780596003234<br/>Pengurusan kekunci dalam sistem penyediaan dan pencapaian keputusan pelajar secara on-lineent://SD_ILS/0/SD_ILS:72782024-06-10T06:20:21Z2024-06-10T06:20:21Zby Ng, Swee Lim<br/>Author Ng, Swee Lim<br/>Format: Visual Materials<br/>Call Number MFL 12835<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/>Sistem pelayan khas untuk pengurusan penyimpanan data imej bagi aplikasi grafik 2D menggunakan JAVA RMIent://SD_ILS/0/SD_ILS:76282024-06-10T06:20:21Z2024-06-10T06:20:21Zby Afnizawati Mohamad Noh<br/>Author Afnizawati Mohamad Noh<br/>Format: Visual Materials<br/>Call Number MFL 12991<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/>Internet and wireless securityent://SD_ILS/0/SD_ILS:4755892024-06-10T06:20:21Z2024-06-10T06:20:21Zby Temple, Robert, 1963-<br/>Author Temple, Robert, 1963-, Regnault, John<br/>Format: Books<br/>Call Number TK5105.59 I55 2002<br/>Publisher Institution of Electrical Engineers,<br/>Publication Date 2002<br/>ISBN 9780852961971<br/>Sistem pengurusan web untuk keluarga menggunakan kaedah penapisanent://SD_ILS/0/SD_ILS:3086072024-06-10T06:20:21Z2024-06-10T06:20:21Zby Nor Hisham Khamis, 1965-<br/>Author Nor Hisham Khamis, 1965-<br/>Format: Books<br/>Call Number TK5105.59 N54 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/>Penggunaan protokol SSL dalam pembangunan halaman web bagi agensi pengiklananent://SD_ILS/0/SD_ILS:3099062024-06-10T06:20:21Z2024-06-10T06:20:21Zby Tan, Chin Wee<br/>Author Tan, Chin Wee<br/>Format: Books<br/>Call Number HF6146.I58 T36 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002 2001<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/>Packet filtering personal firewall based on microsoft's internet protocol helper APIent://SD_ILS/0/SD_ILS:3267142024-06-10T06:20:21Z2024-06-10T06:20:21Zby Abdul Hanan Abdullah<br/>Author Abdul Hanan Abdullah, Lau, Sei Ping, International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format: Books<br/>Call Number TK5105.59 A32 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Implementation of Brands' digital cash system in TCP/IP networking environmentent://SD_ILS/0/SD_ILS:3277442024-06-10T06:20:21Z2024-06-10T06:20:21Zby Teo, Pock Chueng<br/>Author Teo, Pock Chueng, Ahmad Zuri Sha'ameri, Zulkarnain Mohd. Yusof, International Symposium on Information and Communications Technologies (2002 : Selangor)<br/>Format: Books<br/>Call Number HG1710 T46 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>File access permission change detection using immunological negative selection approachent://SD_ILS/0/SD_ILS:3284432024-06-10T06:20:21Z2024-06-10T06:20:21Zby Mohd. Yazid Idris<br/>Author Mohd. Yazid Idris, Abdul Hanan Abdullah, Mohd. Aizaini Maarof, International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format: Books<br/>Call Number TK5105.59 M92 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Authentication protocol : methods reviewent://SD_ILS/0/SD_ILS:3268212024-06-10T06:20:21Z2024-06-10T06:20:21Zby Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, International Technical Conference on Circuits, Systems, Computer and Communications (2002 : Thailand)<br/>Format: Books<br/>Call Number QA76.9.A25 C35 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Security planning and disaster recoveryent://SD_ILS/0/SD_ILS:3416672024-06-10T06:20:21Z2024-06-10T06:20:21Zby Maiwald, Eric<br/>Author Maiwald, Eric, Sieglein, William<br/>Format: Books<br/>Call Number TK5105.59 M36 2002<br/>Publisher McGraw-Hill Osborne,<br/>Publication Date 2002<br/>ISBN 9780072224634<br/>Sistem E-komuniti FSKSMent://SD_ILS/0/SD_ILS:72612024-06-10T06:20:21Z2024-06-10T06:20:21Zby Anis Idayu Mustapha @ Rosli<br/>Author Anis Idayu Mustapha @ Rosli<br/>Format: Visual Materials<br/>Call Number MFL 12590<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Sarjana Muda Sains komputer) - Universiti Teknologi Malaysia, 2002<br/>Sistem faraid di dalam webent://SD_ILS/0/SD_ILS:205852024-06-10T06:20:21Z2024-06-10T06:20:21Zby Azwan Hazle Aminuddin<br/>Author Azwan Hazle Aminuddin<br/>Format: Visual Materials<br/>Call Number MFL 11992<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/>Sistem panduan untuk ibu- ibu mengandung berasaskan web (SPUIM)ent://SD_ILS/0/SD_ILS:204852024-06-10T06:20:21Z2024-06-10T06:20:21Zby Noor Asmahan Mohd. Sofian<br/>Author Noor Asmahan Mohd. Sofian<br/>Format: Visual Materials<br/>Call Number MFL 11983<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Capaian alatan yang selamat dalam pembelajaran kolaboratif = Secure tools access in collaborative learningent://SD_ILS/0/SD_ILS:209352024-06-10T06:20:21Z2024-06-10T06:20:21Zby Faaz Anwar Asan<br/>Author Faaz Anwar Asan<br/>Format: Visual Materials<br/>Call Number MFL 12189<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Network intrusion detection : an analyst's handbookent://SD_ILS/0/SD_ILS:1594542024-06-10T06:20:21Z2024-06-10T06:20:21Zby Northcutt, Stephen<br/>Author Northcutt, Stephen, Novak, Judy, McLachlan, Donald<br/>Format: Books<br/>Call Number TK5105.59 N673 2000<br/>Edition 2nd ed.<br/>Publisher New Riders,<br/>Publication Date 2001<br/>ISBN 9780735710085<br/>Capaian alatan yang selamat dalam pembelajaran kolaboratif = Secure tools access in collaborative learningent://SD_ILS/0/SD_ILS:3019972024-06-10T06:20:21Z2024-06-10T06:20:21Zby Faaz Anwar Asan<br/>Author Faaz Anwar Asan<br/>Format: Books<br/>Call Number QA76.9.A25 F33 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Network security : a beginner's guideent://SD_ILS/0/SD_ILS:3406402024-06-10T06:20:21Z2024-06-10T06:20:21Zby Maiwald, Eric<br/>Author Maiwald, Eric<br/>Format: Books<br/>Call Number TK5105.59 M35 2001<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2001<br/>ISBN 9780072133240<br/>Agent technology approach for proxy serverent://SD_ILS/0/SD_ILS:3311082024-06-10T06:20:21Z2024-06-10T06:20:21Zby Fazidah Othman<br/>Author Fazidah Othman, Abdul Hanan Abdullah, Malaysian Science and Technology Congress (2000 : Genting Highlands, Pahang)<br/>Format: Books<br/>Call Number TK5105.59 F39 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001 2000<br/>Database synchronizerent://SD_ILS/0/SD_ILS:156282024-06-10T06:20:21Z2024-06-10T06:20:21Zby Ahmad Nazri Amran<br/>Author Ahmad Nazri Amran<br/>Format: Visual Materials<br/>Call Number MFL 11191<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Project Paper (Sarjana Muda Sains (Komputer) - Universiti Teknologi Malaysia, 2000<br/>Sistem pengurusan keselamatan melalui internet (untuk sistem pengoperasian unix)ent://SD_ILS/0/SD_ILS:1490842024-06-10T06:20:21Z2024-06-10T06:20:21Zby Noor Azizah Mat Isa<br/>Author Noor Azizah Mat Isa, Yusnita Khalid<br/>Format: Books<br/>Call Number TK5105.59 N667 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/>iPRO agentent://SD_ILS/0/SD_ILS:1465912024-06-10T06:20:21Z2024-06-10T06:20:21Zby Fazidah Othman<br/>Author Fazidah Othman, Abdul Hanan Abdullah, Malaysian Science and Technology Congress (2000 : Genting Highlands, Pahang)<br/>Format: Books<br/>Call Number TK5105.59 F38 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Penjanaan laporan bergrafik untuk pentadbir firewallent://SD_ILS/0/SD_ILS:1485972024-06-10T06:20:21Z2024-06-10T06:20:21Zby Mohd. Izham Mohammad<br/>Author Mohd. Izham Mohammad<br/>Format: Books<br/>Call Number TK5105.59 M63 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/>Penyelesaian beberapa kelas Persamaan Pembeza dengan menggunakan Kaedah Lelaran AGEent://SD_ILS/0/SD_ILS:169542024-06-10T06:20:21Z2024-06-10T06:20:21Zby Dhanabalan Muthusamy<br/>Author Dhanabalan Muthusamy<br/>Format: Visual Materials<br/>Call Number MFL 11130<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2000<br/>Keselamatan sistem pembayaran melalui rangkaian/internetent://SD_ILS/0/SD_ILS:1000312024-06-10T06:20:21Z2024-06-10T06:20:21Zby Noorliana Ismail<br/>Author Noorliana Ismail<br/>Format: Books<br/>Call Number TK5105.59 N66 1999 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1999<br/>Penganalisa leksikal dan sintaktik di dalam antaramuka dinding apient://SD_ILS/0/SD_ILS:1027082024-06-10T06:20:21Z2024-06-10T06:20:21Zby Md. Asri Ngadi<br/>Author Md. Asri Ngadi<br/>Format: Books<br/>Call Number TK5105.59 M37 1999<br/>Publisher UTM,<br/>Publication Date 1999<br/>Tesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 1999<br/>Investigation FKE's network security using firewallent://SD_ILS/0/SD_ILS:1166952024-06-10T06:20:21Z2024-06-10T06:20:21Zby Low, Ho Chit<br/>Author Low, Ho Chit<br/>Format: Books<br/>Call Number TK5105.59 L68 1999 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1999<br/>Perisian internet conference ... [et al.]ent://SD_ILS/0/SD_ILS:130502024-06-10T06:20:21Z2024-06-10T06:20:21Zby Jaipal Singh Jaspal Singh<br/>Author Jaipal Singh Jaspal Singh, Tan, Huang Khoon, Lai, Min Teck, Mohd. Nazri Masri, Norzamzarini Mohd. Bajuri<br/>Format: Visual Materials<br/>Call Number MFL 9506<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1999<br/>Web pages/server for medical electronics : medical surgery and emergency ... [et al.]ent://SD_ILS/0/SD_ILS:133002024-06-10T06:20:21Z2024-06-10T06:20:21Zby Lee, Chai Hong<br/>Author Lee, Chai Hong, Lee, Kong Aik, Logeswari M. Shanmugam, Low, Ho Chit, Sivalingam R. Savassamy<br/>Format: Visual Materials<br/>Call Number MFL 9737<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1999<br/>Simulasi rangkaian bangunan lama Fakulti Sains Komputer dan Sistem Maklumat menggunakan ethernet ... [et al.]ent://SD_ILS/0/SD_ILS:134052024-06-10T06:20:21Z2024-06-10T06:20:21Zby Nik Fadly Afzan Nik Mohammed Kamil<br/>Author Nik Fadly Afzan Nik Mohammed Kamil, Noorliana Ismail, Normalini Md. Kassim, Nor Hadzalina Sukarseh, Zakaria Abdullah<br/>Format: Visual Materials<br/>Call Number MFL 9425<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1999<br/>Network intrusion detection : an analyst's handbookent://SD_ILS/0/SD_ILS:1555822024-06-10T06:20:21Z2024-06-10T06:20:21Zby Northcutt, Stephen<br/>Author Northcutt, Stephen<br/>Format: Books<br/>Call Number TK5105.59 N673 1999<br/>Publisher New Riders,<br/>Publication Date 1999<br/>ISBN 9780735708686<br/>Designing network securityent://SD_ILS/0/SD_ILS:1292612024-06-10T06:20:21Z2024-06-10T06:20:21Zby Kaeo, Merike<br/>Author Kaeo, Merike<br/>Format: Books<br/>Call Number TK5105.59 K34 1999<br/>Publisher Cisci Press,<br/>Publication Date 1999<br/>ISBN 9781578700431<br/>Proxy system : analysis in concept, design and implementation ...ent://SD_ILS/0/SD_ILS:76542024-06-10T06:20:21Z2024-06-10T06:20:21Zby Rabiah Ahmad, Dr.<br/>Author Rabiah Ahmad, Dr., Rosely Kumoi, Suriati Sadimon, Zakiah Hussain<br/>Format: Visual Materials<br/>Call Number MFL 9138 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Thesis (MSc in Information Security) - University of London, 1998<br/>Sistem pengurusan rangkaian telekomunikasi AIN ... [et al.]ent://SD_ILS/0/SD_ILS:86482024-06-10T06:20:21Z2024-06-10T06:20:21Zby Anis Aznita Abdul Rasid<br/>Author Anis Aznita Abdul Rasid, Kirahman Ab. Razak, Mak, Fey Loong, Mohammad Faizul Seman @ Othman, Wan Mohammad Maizu Wan Mahmood<br/>Format: Visual Materials<br/>Call Number MFL 9422<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Kertas projek (Sarjana Muda Kejuruteraan (Komputer)) - Universiti Teknologi Malaysia, 1999<br/>Konfigurasi dan pembangunan perkhidmatan FWTK serta analisa keberkesanannyaent://SD_ILS/0/SD_ILS:1027022024-06-10T06:20:21Z2024-06-10T06:20:21Zby Mazura Mat Din<br/>Author Mazura Mat Din<br/>Format: Books<br/>Call Number TK5105.59 M32 1999<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=42723">Preview</a><br/>Tesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 1999<br/>Rangkaian berkelajuan tinggi di MSCent://SD_ILS/0/SD_ILS:78632024-06-10T06:20:21Z2024-06-10T06:20:21Zby Kamarul Zamri Mohd. Zam<br/>Author Kamarul Zamri Mohd. Zam, Osman Aripin, Mohammad Rizal Julaihi, Lee, Ak Jenang, Mohd. Bakaruddin Abu Bakar<br/>Format: Visual Materials<br/>Call Number MFL 9152 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1998<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknolo gi Malaysia, 1998<br/>Proxy system : analysis in concept, design and implementationent://SD_ILS/0/SD_ILS:4900822024-06-10T06:20:21Z2024-06-10T06:20:21Zby Rabiah Ahmad, Dr.<br/>Author Rabiah Ahmad, Dr.<br/>Format: Books<br/>Call Number TK5105.59 R33 1998 raf<br/>Publisher University of London,<br/>Publication Date 1998<br/>Thesis (MSc in Information Security) - University of London, 1998<br/>Understanding security on the netent://SD_ILS/0/SD_ILS:4707062024-06-10T06:20:21Z2024-06-10T06:20:21Zby Gan, Beng Ser<br/>Author Gan, Beng Ser<br/>Format: Books<br/>Call Number TK5105.59 G36 1998 raf<br/>Publisher UTM,<br/>Publication Date 1998<br/>Project paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1998<br/>Firewall : is it importantent://SD_ILS/0/SD_ILS:4721982024-06-10T06:20:21Z2024-06-10T06:20:21Zby Tan, Wei Hong<br/>Author Tan, Wei Hong<br/>Format: Books<br/>Call Number TK5105.59 T83 1998 raf<br/>Publisher UTM,<br/>Publication Date 1998<br/>Project paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1998<br/>Penghantaran mel dan web melalui firewall dual homed hostent://SD_ILS/0/SD_ILS:4700742024-06-10T06:20:21Z2024-06-10T06:20:21Zby Suraya Ibrahim<br/>Author Suraya Ibrahim, Azlina Adnan<br/>Format: Books<br/>Call Number TK5105.59 S97 1998 raf<br/>Publisher UTM,<br/>Publication Date 1998<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1998<br/>Intranet security : stories from the trenchesent://SD_ILS/0/SD_ILS:4814172024-06-10T06:20:21Z2024-06-10T06:20:21Zby McCarthy, Linda<br/>Author McCarthy, Linda<br/>Format: Books<br/>Call Number TK5105.875.I6 M33 1998<br/>Publisher Sun Microsystems Press,<br/>Publication Date 1998<br/>ISBN 9780138947590<br/>Internet security : risk analysis, strategies and firewallsent://SD_ILS/0/SD_ILS:6158482024-06-10T06:20:21Z2024-06-10T06:20:21Zby Kyas, Othmar<br/>Author Kyas, Othmar<br/>Format: Computer file<br/>Call Number CP 427<br/>Publisher International Thomson Computer Press,<br/>Publication Date 1997<br/>ISBN 9781850323020<br/>Intranet firewalls : planning & implementing your network security systement://SD_ILS/0/SD_ILS:4568362024-06-10T06:20:21Z2024-06-10T06:20:21Zby Fuller, Scott<br/>Author Fuller, Scott, Pagan, Kevin<br/>Format: Books<br/>Call Number TK5105.59 F84 1996<br/>Publisher Ventana Communications Group, Inc.,<br/>Publication Date 1997<br/>ISBN 9781566045063<br/>Digital cash : commerce on the netent://SD_ILS/0/SD_ILS:4681542024-06-10T06:20:21Z2024-06-10T06:20:21Zby Wayner, Peter<br/>Author Wayner, Peter<br/>Format: Books<br/>Call Number HG1710 W39 1997<br/>Edition 2nd ed<br/>Publisher AP Professional,<br/>Publication Date 1997<br/>ISBN 9780127887722<br/>Keselamatan rangkaian internet dalam persekitaran LINUXent://SD_ILS/0/SD_ILS:4688412024-06-10T06:20:21Z2024-06-10T06:20:21Zby Md. Nazri Ahmad<br/>Author Md. Nazri Ahmad<br/>Format: Books<br/>Call Number TK5105.59 M62 1997 raf<br/>Publisher UTM,<br/>Publication Date 1997<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1997<br/>Internet security : risk analysis, strategies and firewallsent://SD_ILS/0/SD_ILS:4628492024-06-10T06:20:21Z2024-06-10T06:20:21Zby Kyas, Othmar<br/>Author Kyas, Othmar<br/>Format: Books<br/>Call Number TK5105.875.I57 K92 1997<br/>Publisher International Thomson Computer Press,<br/>Publication Date 1997<br/>ISBN 9781850323020<br/>Implementasi firewall keatas sistem rangkaian Fakulti Sains Komputer dan Sistem Maklumatent://SD_ILS/0/SD_ILS:4690912024-06-10T06:20:21Z2024-06-10T06:20:21Zby Ruhi Hayati Abd. Rahman<br/>Author Ruhi Hayati Abd. Rahman, Rabiah Ahmad, Dr.<br/>Format: Books<br/>Call Number TK5105.59 R83 1997 raf<br/>Publisher UTM,<br/>Publication Date 1997<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1997<br/>Rangkaian ATM untuk UTM ...ent://SD_ILS/0/SD_ILS:76572024-06-10T06:20:21Z2024-06-10T06:20:21Zby Hazinah Kutty Mammi<br/>Author Hazinah Kutty Mammi, Jasmin Othman, Ramlan Ja'afar, Md. Nazri Ahmad, Nurul Anwar Mohamad Kajaan<br/>Format: Visual Materials<br/>Call Number MFL 9037 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1997<br/>Kertas Projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1997<br/>Network and Internet securityent://SD_ILS/0/SD_ILS:4246402024-06-10T06:20:21Z2024-06-10T06:20:21Zby Ahuja, Vijay<br/>Author Ahuja, Vijay<br/>Format: Books<br/>Call Number TK5105.59 A38 1996<br/>Publisher AP Professional,<br/>Publication Date 1996<br/>ISBN 9780120455959<br/>What you need to know : bandits on the information superhighwayent://SD_ILS/0/SD_ILS:4772272024-06-10T06:20:21Z2024-06-10T06:20:21Zby Barrett, Daniel J.<br/>Author Barrett, Daniel J.<br/>Format: Books<br/>Call Number HV6773 B37 1992<br/>Publisher O'Reilly & Associates,<br/>Publication Date 1996<br/>ISBN 9781565921566<br/>Pelaksanaan dan analisis prestasi teknik penggantian dalam kaedah enkripsi untuk sistem pangkalan dataent://SD_ILS/0/SD_ILS:165782024-06-10T06:20:21Z2024-06-10T06:20:21Zby Ilfendri Yusnir<br/>Author Ilfendri Yusnir<br/>Format: Visual Materials<br/>Call Number MFL 10381<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1996<br/>Thesis (Sarjana Sains Komputer) - Universiti Teknologi Malaysia, 1996<br/>Internet firewalls and network securityent://SD_ILS/0/SD_ILS:3685192024-06-10T06:20:21Z2024-06-10T06:20:21Zby Hare, R. Christopher E.<br/>Author Hare, R. Christopher E., Siyan, Karanjit S.<br/>Format: Books<br/>Call Number TK5105.875.I57 H27 1995<br/>Publisher New Riders Pub.,<br/>Publication Date 1995<br/>ISBN 9781562054373<br/>The computer privacy handbookent://SD_ILS/0/SD_ILS:4104312024-06-10T06:20:21Z2024-06-10T06:20:21Zby Bacard, Andre<br/>Author Bacard, Andre<br/>Format: Books<br/>Call Number QA76.9.A25 B32 1995<br/>Publisher Peachpit Press,<br/>Publication Date 1995<br/>ISBN 9781566091718<br/>Implementing internet securityent://SD_ILS/0/SD_ILS:4585802024-06-10T06:20:21Z2024-06-10T06:20:21Zby Cooper, Frederic J.<br/>Author Cooper, Frederic J.<br/>Format: Books<br/>Call Number TK5105.59 I46 1995<br/>Publisher New Riders,<br/>Publication Date 1995<br/>ISBN 9781562054717<br/>Firewalls and Internet security : repelling the wily hackerent://SD_ILS/0/SD_ILS:4104392024-06-10T06:20:21Z2024-06-10T06:20:21Zby Cheswick, William R.<br/>Author Cheswick, William R., Bellovin, Steven M.<br/>Format: Books<br/>Call Number TK5105.875.I57 C43 1994<br/>Publisher Addison-Wesley,<br/>Publication Date 1994<br/>ISBN 9780201633573<br/>SECURITY IN VOICE OVER INTERNET PROTOCOL (VOIP) : IMPLEMENTATION AND ANALYSISent://SD_ILS/0/SD_ILS:8395892024-06-10T06:20:21Z2024-06-10T06:20:21Zby Maimun Rizal, 1980-, author<br/>Author Maimun Rizal, 1980-, author, Abdul Hanan Abdullah, Prof.Dr., supervisor, Saiful Adli Ismail, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.8865 M35 2007<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>DNS PACKET CAPTURING AND ANALYZING SYSTEMent://SD_ILS/0/SD_ILS:8404832024-06-10T06:20:21Z2024-06-10T06:20:21Zby Babak Abdollahi Khameneh, 1983-, author<br/>Author Babak Abdollahi Khameneh, 1983-, author, Nurulhuda Firdaus Mohd. Azmi, Dr., supervisor, Sekolah Informatik Termaju<br/>Format: Books<br/>Call Number TK5105.59 B33 2013 raf<br/>Thesis Sarjana Kejuruteraan Perisian<br/>DNS PACKET CAPTURING AND ANALYZING SYSTEMent://SD_ILS/0/SD_ILS:8404852024-06-10T06:20:21Z2024-06-10T06:20:21Zby Babak Abdollahi Khameneh, 1983-, author<br/>Author Babak Abdollahi Khameneh, 1983-, author, Nurulhuda Firdaus Mohd. Azmi, Dr., supervisor, Sekolah Informatik Termaju<br/>Format: Books<br/>Call Number CP 034038 ra<br/>Thesis Sarjana Kejuruteraan Perisian<br/>DESIGNING LIGHTWEIGHT CRYPTOGRAPHY ALGORITHM FOR INTERNET OF THINGSent://SD_ILS/0/SD_ILS:8647512024-06-10T06:20:21Z2024-06-10T06:20:21Zby Mohd. Fairus Mustapha, 1980-, author<br/>Author Mohd. Fairus Mustapha, 1980-, author, Majid Bakhtiari, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035068 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>SECURITY IN VOICE OVER INTERNET PROTOCOL (VOIP) : IMPLEMENTATION AND ANALYSISent://SD_ILS/0/SD_ILS:8395902024-06-10T06:20:21Z2024-06-10T06:20:21Zby Maimun Rizal, 1980-, author<br/>Author Maimun Rizal, 1980-, author, Abdul Hanan Abdullah, Prof.Dr., supervisor, Saiful Adli Ismail, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034567 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>DESIGNING LIGHTWEIGHT CRYPTOGRAPHY ALGORITHM FOR INTERNET OF THINGSent://SD_ILS/0/SD_ILS:8646792024-06-10T06:20:21Z2024-06-10T06:20:21Zby Mohd. Fairus Mustapha, 1980-, author<br/>Author Mohd. Fairus Mustapha, 1980-, author, Majid Bakhtiari, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 M6434 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>