Search Results for Internet -- Security measures - Narrowed by: EnglishSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dInternet$002b--$002bSecurity$002bmeasures$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list2024-05-25T14:20:52ZSecurity in IoT-Enabled Spaceent://SD_ILS/0/SD_ILS:8822842024-05-25T14:20:52Z2024-05-25T14:20:52Zby Al-Turjman, Fadi, author<br/>Author Al-Turjman, Fadi, author<br/>Format: Books<br/>Call Number TK5105.8857 A48 2019<br/>Publication Date 2019<br/>ISBN 9780367111236<br/>Network Forensicsent://SD_ILS/0/SD_ILS:8731732024-05-25T14:20:52Z2024-05-25T14:20:52Zby Messier, Ric, author<br/>Author Messier, Ric, author<br/>Format: Books<br/>Call Number TK5105.59 M47 2017<br/>Publication Date 2017<br/>ISBN 9781119328285<br/>Information security awareness model in social networking for teenagersent://SD_ILS/0/SD_ILS:8594672024-05-25T14:20:52Z2024-05-25T14:20:52Zby Mohamed Zul Hazmi Mohamed Khazin, 1983-, author<br/>Author Mohamed Zul Hazmi Mohamed Khazin, 1983-, author, Norziha Megat Mohd. Zainuddin, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number HM742 M64 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>Information security awareness model in social networking for teenagersent://SD_ILS/0/SD_ILS:8594682024-05-25T14:20:52Z2024-05-25T14:20:52Zby Mohamed Zul Hazmi Mohamed Khazin, 1983-, author<br/>Author Mohamed Zul Hazmi Mohamed Khazin, 1983-, author, Norziha Megat Mohd. Zainuddin, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034784 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>Web security : a WhiteHat perspectiveent://SD_ILS/0/SD_ILS:8358692024-05-25T14:20:52Z2024-05-25T14:20:52Zby Hanqing, Wu, author<br/>Author Hanqing, Wu, author, Zhao, Liz, author<br/>Format: Books<br/>Call Number TK5105.59 H363 2015<br/>Publisher CRC Press is an imprint of Taylor & Francis ; Publishing House of Electronics Industry,<br/>Publication Date 2015<br/>ISBN 9781466592612<br/>Computational network science : an algorithmic approachent://SD_ILS/0/SD_ILS:8383722024-05-25T14:20:52Z2024-05-25T14:20:52Zby Hexmoor, Henry, author<br/>Author Hexmoor, Henry, author<br/>Format: Books<br/>Call Number TK5105.59 H49 2015<br/>Publisher Morgan Kaufmann,<br/>Publication Date 2015<br/>ISBN 9780128008911<br/>Secure Messaging on the Internetent://SD_ILS/0/SD_ILS:8340182024-05-25T14:20:52Z2024-05-25T14:20:52Zby Oppliger, Rolf, author<br/>Author Oppliger, Rolf, author<br/>Format: Books<br/>Call Number TK5105.73 O67 2014<br/>Publisher Artech House,<br/>Publication Date 2014<br/>ISBN 9781608077175<br/>Advances in secure computing, internet services, and applicationsent://SD_ILS/0/SD_ILS:8412032024-05-25T14:20:52Z2024-05-25T14:20:52Zby Tripathy, B. K. editor<br/>Author Tripathy, B. K. editor, Acharjya, D. P. editor<br/>Format: Books<br/>Call Number TK5105.59 A38 2014 f<br/>Publisher Information Science Reference, an imprint of IGI Global,<br/>Publication Date 2014<br/>ISBN 9781466649408<br/>Windows forensic analysis toolkit : advanced analysis techniques for Windows 8ent://SD_ILS/0/SD_ILS:8380762024-05-25T14:20:52Z2024-05-25T14:20:52Zby Carvey, Harlan A., author<br/>Author Carvey, Harlan A., author<br/>Format: Books<br/>Call Number HV8079.C65 C374 2014<br/>Edition Fourth edition<br/>Publisher Syngress,<br/>Publication Date 2014<br/>ISBN 9780124171572<br/>Classification of phishing websites using machine learning techniquesent://SD_ILS/0/SD_ILS:8115992024-05-25T14:20:52Z2024-05-25T14:20:52Zby Hadi Zamani, 1987-<br/>Author Hadi Zamani, 1987-<br/>Format: Books<br/>Call Number CP 031145 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Trust, privacy, and security in digital business : 10th International conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013 : proceedingsent://SD_ILS/0/SD_ILS:8196482024-05-25T14:20:52Z2024-05-25T14:20:52Zby TrustBus (Conference) (10th : 2013 : Prague, Czech Republic)<br/>Author TrustBus (Conference) (10th : 2013 : Prague, Czech Republic), Furnell, Steven, 1970-, Lambrinoudakis, Costas, López, Javier<br/>Format: Books<br/>Call Number HF5548.32 T78 2013<br/>Edition 1st ed.<br/>Publisher Springer,<br/>Publication Date 2013<br/>ISBN 9783642403422<br/>Wireless mobile internet securityent://SD_ILS/0/SD_ILS:8073722024-05-25T14:20:52Z2024-05-25T14:20:52Zby Rhee, Man Young<br/>Author Rhee, Man Young<br/>Format: Books<br/>Call Number TK5103.4885 R44 2013<br/>Edition 2nd ed.<br/>Publisher John Wiley,<br/>Publication Date 2013<br/>ISBN 9781118496534<br/>Comparative study of machine learning algorithms in website phishing detectionent://SD_ILS/0/SD_ILS:8112232024-05-25T14:20:52Z2024-05-25T14:20:52Zby Almukhammed Kalybayev, 1988-<br/>Author Almukhammed Kalybayev, 1988-, Anazida Zainal, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number TK5105.59 A46 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Comparative study of machine learning algorithms in website phishing detectionent://SD_ILS/0/SD_ILS:8112252024-05-25T14:20:52Z2024-05-25T14:20:52Zby Almukhammed Kalybayev, 1988-<br/>Author Almukhammed Kalybayev, 1988-<br/>Format: Books<br/>Call Number CP 030867 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Anti-phishing model for phishing websites detection: using pruning decision treeent://SD_ILS/0/SD_ILS:8112802024-05-25T14:20:52Z2024-05-25T14:20:52Zby Ahmed I. M. Abunadi, 1986-<br/>Author Ahmed I. M. Abunadi, 1986-, Anazida Zainal, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number TK5105.59 A36 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Anti-phishing model for phishing websites detection: using pruning decision treeent://SD_ILS/0/SD_ILS:8112812024-05-25T14:20:52Z2024-05-25T14:20:52Zby Ahmed I. M. Abunadi, 1986-<br/>Author Ahmed I. M. Abunadi, 1986-<br/>Format: Books<br/>Call Number CP 030865 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Classification of phishing websites using machine learning techniquesent://SD_ILS/0/SD_ILS:8115922024-05-25T14:20:52Z2024-05-25T14:20:52Zby Hadi Zamani, 1987-<br/>Author Hadi Zamani, 1987-, Anazida Zainal, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number TK5105.59 H33 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>The death of the Internetent://SD_ILS/0/SD_ILS:8063842024-05-25T14:20:52Z2024-05-25T14:20:52Zby Jakobsson, Markus.<br/>Author Jakobsson, Markus.<br/>Format: Books<br/>Call Number TK5105.875.I57 D43 2012<br/>Publisher IEEE Press,<br/>Publication Date 2012<br/>ISBN 9781118062418<br/>Staying safe online in simple stepsent://SD_ILS/0/SD_ILS:8160862024-05-25T14:20:52Z2024-05-25T14:20:52Zby Ballew, Joli<br/>Author Ballew, Joli<br/>Format: Books<br/>Call Number TK5105.59 B355 2012<br/>Publisher Pearson,<br/>Publication Date 2012<br/>ISBN 9780273774730<br/>Awareness of information disclosure on social network sitesent://SD_ILS/0/SD_ILS:7902902024-05-25T14:20:52Z2024-05-25T14:20:52Zby Kibirige, George William, 1981-<br/>Author Kibirige, George William, 1981-<br/>Format: Books<br/>Call Number CP 027801 ra<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) – Universiti Teknologi Malaysia, 2012<br/>Awareness of information disclosure on social network sitesent://SD_ILS/0/SD_ILS:7902852024-05-25T14:20:52Z2024-05-25T14:20:52Zby Kibirige, George William, 1981-<br/>Author Kibirige, George William, 1981-, Shukor Abd. Razak, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 K535 2012 raf<br/>Publication Date 2012<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) – Universiti Teknologi Malaysia, 2012<br/>Security strategies in Web applications and social networkingent://SD_ILS/0/SD_ILS:7641552024-05-25T14:20:52Z2024-05-25T14:20:52Zby Harwood, Mike<br/>Author Harwood, Mike<br/>Format: Books<br/>Call Number HM742 H37 2011<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2011<br/>ISBN 9780763791957<br/>Secure Java : for web application developmentent://SD_ILS/0/SD_ILS:7316102024-05-25T14:20:52Z2024-05-25T14:20:52Zby Bhargav, Abhay<br/>Author Bhargav, Abhay, Kumar, B. V. (Balepur Venkatanna), 1959-<br/>Format: Books<br/>Call Number TK5105.888 B434 2011<br/>Publisher CRC Press,<br/>Publication Date 2011<br/>ISBN 9781439823514<br/>Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and dataent://SD_ILS/0/SD_ILS:6404622024-05-25T14:20:52Z2024-05-25T14:20:52Zby Lillard, Terrence V.<br/>Author Lillard, Terrence V., Lillard, Terrence<br/>Format: Books<br/>Call Number HV8079.C65 D54 2010<br/>Publisher Syngress,<br/>Publication Date 2010<br/>ISBN 9781597495370<br/>Web intelligence and security : advances in data and text mining techniques for detecting and preventing terrorist activities on the webent://SD_ILS/0/SD_ILS:8128222024-05-25T14:20:52Z2024-05-25T14:20:52Zby NATO Advanced Research Workshop on Web Intelligence and Security (2009 : En Boḳeḳ, Israel)<br/>Author NATO Advanced Research Workshop on Web Intelligence and Security (2009 : En Boḳeḳ, Israel), Last, Mark., Kandel, Abraham.<br/>Format: Books<br/>Call Number QA76.9.D343 N33 2010<br/>Publisher IOS Press,<br/>Publication Date 2010<br/>ISBN 9781607506102<br/>Feature selection for nids based on GA-CFS techniqueent://SD_ILS/0/SD_ILS:8360312024-05-25T14:20:52Z2024-05-25T14:20:52Zby Vahab Iranmanesh<br/>Author Vahab Iranmanesh, Bharanidharan Shanmugam, Dr., Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 V36 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Feature selection for nids based on GA-CFS techniqueent://SD_ILS/0/SD_ILS:8360322024-05-25T14:20:52Z2024-05-25T14:20:52Zby Vahab Iranmanesh<br/>Author Vahab Iranmanesh<br/>Format: Books<br/>Call Number CP 034159 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Network intrusion detection and prevention : concepts and techniquesent://SD_ILS/0/SD_ILS:3349552024-05-25T14:20:52Z2024-05-25T14:20:52Zby Ali A. Ghorbani<br/>Author Ali A. Ghorbani, Lu, Wei, Tavallaee, Mahbod<br/>Format: Books<br/>Call Number TK5105.59 A43 2010<br/>Publisher Springer,<br/>Publication Date 2010<br/>ISBN 9780387887708<br/>Behavioural approach to rapid malcode signatures generationent://SD_ILS/0/SD_ILS:6278192024-05-25T14:20:52Z2024-05-25T14:20:52Zby Hanieh Rajabi, 1983-<br/>Author Hanieh Rajabi, 1983-, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number CP 019252 ra<br/>Publication Date 2009<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Elektronik dan Telekomunikasi)) - Universiti Teknologi Malaysia, 2009<br/>Behavioural approach to rapid malcode signatures generationent://SD_ILS/0/SD_ILS:6278182024-05-25T14:20:52Z2024-05-25T14:20:52Zby Hanieh Rajabi, 1983-<br/>Author Hanieh Rajabi, 1983-, Muhammad Nadzir Marsono, supervisor, Fakulti Kejuruteraan Elektrik<br/>Format: Books<br/>Call Number TK5105.875.I57 H36 2009 raf<br/>Publication Date 2009<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Elektronik dan Telekomunikasi)) - Universiti Teknologi Malaysia, 2009<br/>Cyber risk insurance policy a proposed frameworkfor e-business in Malaysiaent://SD_ILS/0/SD_ILS:5905712024-05-25T14:20:52Z2024-05-25T14:20:52Zby Lee, Siok Hwee, 1979-<br/>Author Lee, Siok Hwee, 1979-, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Computer file<br/>Call Number CP 019845 ra<br/>Publication Date 2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/>Distributed systems security : issues, processes and solutionsent://SD_ILS/0/SD_ILS:2821492024-05-25T14:20:52Z2024-05-25T14:20:52Zby Belapurkar, Abhijit<br/>Author Belapurkar, Abhijit<br/>Format: Books<br/>Call Number QA76.9.A25 D57 2009<br/>Publisher Wiley,<br/>Publication Date 2009<br/>ISBN 9780470519882<br/>Securing PHP web applicationsent://SD_ILS/0/SD_ILS:3198802024-05-25T14:20:52Z2024-05-25T14:20:52Zby Ballad, Tricia<br/>Author Ballad, Tricia, Ballad, Bill<br/>Format: Books<br/>Call Number QA76.73.P224 B34 2009<br/>Publisher Pearson Education,<br/>Publication Date 2009<br/>ISBN 9780321534347<br/>Cyber risk insurance policy a proposed frameworkfor e-business in Malaysiaent://SD_ILS/0/SD_ILS:3222192024-05-25T14:20:52Z2024-05-25T14:20:52Zby Lee, Siok Hwee, 1979-<br/>Author Lee, Siok Hwee, 1979-, Rabiah Ahmad, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number HQ784.I58 L43 2009 raf<br/>Publication Date 2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/>Disappearing cryptography : information hiding : steganography and watermarkingent://SD_ILS/0/SD_ILS:3350292024-05-25T14:20:52Z2024-05-25T14:20:52Zby Wayner, Peter<br/>Author Wayner, Peter<br/>Format: Books<br/>Call Number TK5105.59 W39 2009<br/>Edition 3rd ed.<br/>Publisher Morgan Kaufmann,<br/>Publication Date 2009<br/>ISBN 9780123744791<br/>Your neighbor's secret life online : protecting families from Internet conmen, scammers and predatorsent://SD_ILS/0/SD_ILS:2102772024-05-25T14:20:52Z2024-05-25T14:20:52Zby Dean, Stephen<br/>Author Dean, Stephen<br/>Format: Books<br/>Call Number HV6773 D42 2008<br/>Edition 1st ed.<br/>Publisher New Horizon Press,<br/>Publication Date 2008<br/>ISBN 9780882822945<br/>Securing the information infrastructureent://SD_ILS/0/SD_ILS:6318672024-05-25T14:20:52Z2024-05-25T14:20:52Zby Kizza, Joseph Migga<br/>Author Kizza, Joseph Migga, Kizza, Florence Migga<br/>Format: Books<br/>Call Number HV6773 K59 2008<br/>Publisher Cybertech Pub.,<br/>Publication Date 2008<br/>ISBN 9781599043791 9781599043814<br/>ICT futures : delivering pervasive, real-time and secure servicesent://SD_ILS/0/SD_ILS:2884552024-05-25T14:20:52Z2024-05-25T14:20:52Zby Warren, Paul<br/>Author Warren, Paul, Davies, J., Brown, David<br/>Format: Books<br/>Call Number TK5102.5 I95 2008<br/>Publisher Wiley,<br/>Publication Date 2008<br/>ISBN 9780470997703<br/>The web application hacker's handbook : discovering and exploiting security flawsent://SD_ILS/0/SD_ILS:2867272024-05-25T14:20:52Z2024-05-25T14:20:52Zby Stuttard, Dafydd<br/>Author Stuttard, Dafydd, Pinto, Marcus, 1978-<br/>Format: Books<br/>Call Number TK5105.875.I57 S78 2008<br/>Publisher Wiley Publishing,<br/>Publication Date 2008<br/>ISBN 9780470170779<br/>Securing VoIP networks : threats, vulnerabilities, and countermeasuresent://SD_ILS/0/SD_ILS:2722802024-05-25T14:20:52Z2024-05-25T14:20:52Zby Thermos, Peter<br/>Author Thermos, Peter, Takanen, Ari. H.<br/>Format: Books<br/>Call Number TK5105.8865 H54 2007<br/>Publisher Pearson Education,<br/>Publication Date 2008<br/>ISBN 9780321437341<br/>Host identity protocol (HIP) : towards the secure mobile internetent://SD_ILS/0/SD_ILS:2900852024-05-25T14:20:52Z2024-05-25T14:20:52Zby Gurtov, Andrei<br/>Author Gurtov, Andrei<br/>Format: Books<br/>Call Number TK5103.4885 G87 2008<br/>Publisher John Wiley,<br/>Publication Date 2008<br/>ISBN 9780470997901<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:3538042024-05-25T14:20:52Z2024-05-25T14:20:52Zby Kahate, Atul<br/>Author Kahate, Atul<br/>Format: Books<br/>Call Number TK5105.59 K33 2008<br/>Edition 2nd ed.,<br/>Publisher Tata McGraw-Hill,<br/>Publication Date 2008<br/>ISBN 9780070648234<br/>Crimeware : understanding new attacks and defensesent://SD_ILS/0/SD_ILS:3198862024-05-25T14:20:52Z2024-05-25T14:20:52Zby Jakobsson, Markus<br/>Author Jakobsson, Markus, Ramzan, Zulfikar<br/>Format: Books<br/>Call Number QA76.9.A25 J344 2008<br/>Publisher Addison-Wesley,<br/>Publication Date 2008<br/>ISBN 9780321501950<br/>Trust and new technologies : marketing and management on the Internet and mobile mediaent://SD_ILS/0/SD_ILS:3238292024-05-25T14:20:52Z2024-05-25T14:20:52Zby Kautonen, Teemu<br/>Author Kautonen, Teemu, Karjaluoto, Heikki<br/>Format: Books<br/>Call Number HF5415.1265 T78 2008<br/>Publisher Northampton, MA : Edward Elgar,<br/>Publication Date 2008<br/>ISBN 9781847205681<br/>Wireless internet security : architecture and protocolsent://SD_ILS/0/SD_ILS:3377152024-05-25T14:20:52Z2024-05-25T14:20:52Zby Kempf, James, 1952-<br/>Author Kempf, James, 1952-<br/>Format: Books<br/>Call Number TK5103.4885 K45 2008<br/>Publisher Cambridge University Press,<br/>Publication Date 2008<br/>ISBN 9780521887830<br/>Internet security : hacking, counterhacking, and societyent://SD_ILS/0/SD_ILS:1950732024-05-25T14:20:52Z2024-05-25T14:20:52Zby Himma, Kenneth Einar<br/>Author Himma, Kenneth Einar<br/>Format: Books<br/>Call Number TK5105.875.I57 H55 2007<br/>Publisher Jones and Barlett,<br/>Publication Date 2007<br/>ISBN 9780763735364<br/>Synchronizing internet protocol security (SIPSec)ent://SD_ILS/0/SD_ILS:2097582024-05-25T14:20:52Z2024-05-25T14:20:52Zby Shoniregun, Charles A.<br/>Author Shoniregun, Charles A.<br/>Format: Books<br/>Call Number TK5105.875.I57 S56 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9780387327242<br/><a href="http://dx.doi.org/10.1007/978-0-387-68569-4">Fulltext</a><br/>An intrusion detection system (IDS) for internet networkent://SD_ILS/0/SD_ILS:1569382024-05-25T14:20:52Z2024-05-25T14:20:52Zby Mohd. Fauzan Safiee<br/>Author Mohd. Fauzan Safiee, Syarifah Hafizah Syed Ariffin<br/>Format: Books<br/>Call Number TK5105.59 M43 2007<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=48865">Preview</a><br/>Thesis (Sarjana Kejuruteraan (Elektrikal-Elektronik dan Telecommunication)) - Universiti Teknologi Malaysia, 2007<br/>Practical internet securityent://SD_ILS/0/SD_ILS:1584132024-05-25T14:20:52Z2024-05-25T14:20:52Zby Vacca, John R.<br/>Author Vacca, John R.<br/>Format: Books<br/>Call Number TK5105.59 V324 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9780387405339<br/><a href="http://dx.doi.org/10.1007/978-0-387-29844-3">FullText</a><br/>An intrusion detection system (IDS) for internet networkent://SD_ILS/0/SD_ILS:5682282024-05-25T14:20:52Z2024-05-25T14:20:52Zby Mohd. Fauzan Safiee<br/>Author Mohd. Fauzan Safiee, Syarifah Hafizah Syed Ariffin<br/>Format: Computer file<br/>Call Number CP 015165<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2007<br/>Thesis (Sarjana Kejuruteraan (Elektrikal-Elektronik dan Telecommunication)) - Universiti Teknologi Malaysia, 2007<br/>Secure e-government web servicesent://SD_ILS/0/SD_ILS:3012142024-05-25T14:20:52Z2024-05-25T14:20:52Zby Mitrakas, Andreas<br/>Author Mitrakas, Andreas<br/>Format: Books<br/>Call Number JK468.A8 S43 2007<br/>Publisher IGI Global,<br/>Publication Date 2007<br/>ISBN 9781599041384<br/>Hackers challenge 3 : 20 brand-new forensic scenarios & solutionsent://SD_ILS/0/SD_ILS:1005712024-05-25T14:20:52Z2024-05-25T14:20:52Zby Pollino, David<br/>Author Pollino, David<br/>Format: Books<br/>Call Number QA76.9.A25 H324 2006<br/>Publisher McGraw-Hill,<br/>Publication Date 2006<br/>ISBN 9780072263046<br/>How personal and internet security worksent://SD_ILS/0/SD_ILS:1018952024-05-25T14:20:52Z2024-05-25T14:20:52Zby Gralla, Preston<br/>Author Gralla, Preston<br/>Format: Books<br/>Call Number HV6773 G72 2006<br/>Publisher Que Publishing,<br/>Publication Date 2006<br/>ISBN 9780789735539<br/>Understanding Voice over IP securityent://SD_ILS/0/SD_ILS:918902024-05-25T14:20:52Z2024-05-25T14:20:52Zby Johnson, Alan B.<br/>Author Johnson, Alan B., Piscitello, David M.<br/>Format: Books<br/>Call Number TK5105.8865 J63 2006<br/>Publisher Artech House,<br/>Publication Date 2006<br/>ISBN 9781596930506<br/>(SCTS) Symantec Certified Technical Specialist small business security study guideent://SD_ILS/0/SD_ILS:5673652024-05-25T14:20:52Z2024-05-25T14:20:52Zby Alston, Nik<br/>Author Alston, Nik, Chapple, Mike, Hausman, Kalani Kirk<br/>Format: Computer file<br/>Call Number CP 8214<br/>Publisher Addison-Wesley,<br/>Publication Date 2006<br/>ISBN 9780321349941<br/>Active firewall mechanism as a comprehensive approach towards minimizing internet threatsent://SD_ILS/0/SD_ILS:4681052024-05-25T14:20:52Z2024-05-25T14:20:52Zby Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah<br/>Format: Books<br/>Call Number TK5105.875.I57 C33 2006<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Thesis (Doktor Falsafah (Fakulti Kejuteraan Elektrik)) - Universiti Teknologi Malaysia, 2007<br/>Extrusion detection : security monitoring for internal intrusionsent://SD_ILS/0/SD_ILS:4704522024-05-25T14:20:52Z2024-05-25T14:20:52Zby Bejtlich, Richard<br/>Author Bejtlich, Richard<br/>Format: Books<br/>Call Number TK5105.59 B44 2006<br/>Publisher Addison-Wesley,<br/>Publication Date 2006<br/>ISBN 9780321349965<br/>Windows forensics : the field guide for corporate computer investigationsent://SD_ILS/0/SD_ILS:2778572024-05-25T14:20:52Z2024-05-25T14:20:52Zby Steel, Chad<br/>Author Steel, Chad<br/>Format: Books<br/>Call Number HV8079.C65 S84 2006<br/>Publisher Wiley Pub.,<br/>Publication Date 2006<br/>ISBN 9780470038628<br/>Professional pen testing for Web applicationsent://SD_ILS/0/SD_ILS:1328132024-05-25T14:20:52Z2024-05-25T14:20:52Zby Andreu, Andres, 1968-<br/>Author Andreu, Andres, 1968-<br/>Format: Books<br/>Call Number QA76.9.A25 A525 2006<br/>Publisher Wiley Pub.,<br/>Publication Date 2006<br/>ISBN 9780471789666<br/>(SCTS) Symantec Certified Technical Specialist : small business security study guideent://SD_ILS/0/SD_ILS:1384642024-05-25T14:20:52Z2024-05-25T14:20:52Zby Alston, Nik<br/>Author Alston, Nik, Chapple, Mike, Hausman, Kalani Kirk<br/>Format: Books<br/>Call Number QA76.3 A47 2006<br/>Publisher Addison-Wesley,<br/>Publication Date 2006<br/>ISBN 9780321349941<br/>The Symantec guide to home internet securityent://SD_ILS/0/SD_ILS:1385122024-05-25T14:20:52Z2024-05-25T14:20:52Zby Conry-Murray, Andrew<br/>Author Conry-Murray, Andrew, Weafer, Vincent<br/>Format: Books<br/>Call Number QA76.9.A25 C664 2006<br/>Publisher Addison-Wesley,<br/>Publication Date 2006<br/>ISBN 9780321356413<br/>Securing the webent://SD_ILS/0/SD_ILS:85822024-05-25T14:20:52Z2024-05-25T14:20:52Zby Video Education Australasia<br/>Author Video Education Australasia<br/>Format: Visual Materials<br/>Call Number CP 015502<br/>Publisher VEA,<br/>Publication Date 2006<br/>Security management, integrity, and internal control in information systems : IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conferenceent://SD_ILS/0/SD_ILS:1164332024-05-25T14:20:52Z2024-05-25T14:20:52Zby IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems (1st : 2005 : Fairfax, Va.)<br/>Author IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems (1st : 2005 : Fairfax, Va.), Dowland, Paul<br/>Format: Books<br/>Call Number QA76.9.A25 S427 2005<br/>Publisher Springer Verlag,<br/>Publication Date 2005<br/>ISBN 9780387298269<br/>Scalable and secure internet services and architectureent://SD_ILS/0/SD_ILS:1566142024-05-25T14:20:52Z2024-05-25T14:20:52Zby Xu, Chengzhong<br/>Author Xu, Chengzhong<br/>Format: Books<br/>Call Number TK5105.875.I57 X82 2005<br/>Publisher Chapman & Hall,<br/>Publication Date 2005<br/>ISBN 9781584883777<br/>The executive guide to information security : threats, challenges, and solutionsent://SD_ILS/0/SD_ILS:4304852024-05-25T14:20:52Z2024-05-25T14:20:52Zby Egan, Mark<br/>Author Egan, Mark<br/>Format: Books<br/>Call Number HF5548.32 E32 2005<br/>Publisher Addison-Wesley,<br/>Publication Date 2005<br/>ISBN 9780321304513<br/>AAA and network security for mobile access : radius, diameter, EAP, PKI, and IP mobilityent://SD_ILS/0/SD_ILS:4407182024-05-25T14:20:52Z2024-05-25T14:20:52Zby Nakhjiri, Madjid<br/>Author Nakhjiri, Madjid, Nakhjiri, Mahsa<br/>Format: Books<br/>Call Number TK5103.4885 N34 2005<br/>Publisher John Wiley & Sons,<br/>Publication Date 2005<br/>ISBN 9780470011942<br/>Web based energy information and control systems : ase studies and applicationsent://SD_ILS/0/SD_ILS:1432532024-05-25T14:20:52Z2024-05-25T14:20:52Zby Capehart, B. L. (Barney L.)<br/>Author Capehart, B. L. (Barney L.), Capehart, Lynne C.<br/>Format: Books<br/>Call Number TJ163.2 W42 2005<br/>Publisher Fairmont Press,<br/>Publication Date 2005<br/>ISBN 9780849338984<br/>Synchronizing e-securityent://SD_ILS/0/SD_ILS:3702172024-05-25T14:20:52Z2024-05-25T14:20:52Zby Williams, Godfried<br/>Author Williams, Godfried<br/>Format: Books<br/>Call Number TK5105.875.I57 W54 2004<br/>Publisher Kluwer Academic Pubs,<br/>Publication Date 2004<br/>ISBN 9781402076466<br/>Two layer image password for text encryption systement://SD_ILS/0/SD_ILS:6020372024-05-25T14:20:52Z2024-05-25T14:20:52Zby Ashok Muthu<br/>Author Ashok Muthu<br/>Format: Computer file<br/>Call Number CP 013254<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2004<br/>Network firewall development with multilevel security policyent://SD_ILS/0/SD_ILS:3951242024-05-25T14:20:52Z2024-05-25T14:20:52Zby Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, International Conference on Computer Theory and Applications (14th. : 2004 : Egypt)<br/>Format: Books<br/>Call Number TK5105.59 C334 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Two layer image password for text encryption systement://SD_ILS/0/SD_ILS:3795122024-05-25T14:20:52Z2024-05-25T14:20:52Zby Ashok Muthu<br/>Author Ashok Muthu<br/>Format: Books<br/>Call Number TK5105.59 A83 2004<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2004<br/>Principles and practice of information security : protecting computers from hackers and lawyersent://SD_ILS/0/SD_ILS:3892192024-05-25T14:20:52Z2024-05-25T14:20:52Zby Volonino, Linda<br/>Author Volonino, Linda, Robinson, Stephen R., Volonino, Charles P.<br/>Format: Books<br/>Call Number TK5105.59 V64 2004<br/>Publisher Pearson/Prentice Hall,<br/>Publication Date 2004<br/>ISBN 9780131840270<br/>Defense and detection strategies against Internet wormsent://SD_ILS/0/SD_ILS:4178392024-05-25T14:20:52Z2024-05-25T14:20:52Zby Nazario, Jose<br/>Author Nazario, Jose<br/>Format: Books<br/>Call Number QA76.9.A25 N394 2004<br/>Publisher Artech House,<br/>Publication Date 2004<br/>ISBN 9781580535373<br/>Designing network securityent://SD_ILS/0/SD_ILS:1350322024-05-25T14:20:52Z2024-05-25T14:20:52Zby Kaeo, Merike<br/>Author Kaeo, Merike<br/>Format: Books<br/>Call Number TK5105.59 K34 2004<br/>Edition 2nd ed.<br/>Publisher Cisco Press,<br/>Publication Date 2004<br/>ISBN 9781587051173<br/>Security + guide to network security fundamentalsent://SD_ILS/0/SD_ILS:3643912024-05-25T14:20:52Z2024-05-25T14:20:52Zby Cisco Learning Institute<br/>Author Cisco Learning Institute, Campbell, Paul, Calvert, Ben, Boswell, Steven<br/>Format: Books<br/>Call Number TK5105.59 C57 2003<br/>Publisher Thomson Learning,<br/>Publication Date 2003<br/>ISBN 9780619212940<br/>Mastering Web services securityent://SD_ILS/0/SD_ILS:3864442024-05-25T14:20:52Z2024-05-25T14:20:52Zby Hartman, Bret<br/>Author Hartman, Bret<br/>Format: Books<br/>Call Number QA76.9.A25 M374 2003<br/>Publisher Wiley Technology Pub.,<br/>Publication Date 2003<br/>ISBN 9780471267164<br/>Security + guide to network security fundamentalsent://SD_ILS/0/SD_ILS:6021812024-05-25T14:20:52Z2024-05-25T14:20:52Zby Cisco Learning Institute<br/>Author Cisco Learning Institute, Campbell, Paul, Calvert, Ben, Boswell, Steven<br/>Format: Computer file<br/>Call Number CP 3021<br/>Publisher Thomson Learning,<br/>Publication Date 2003<br/>An authentication method for secure internet transaction using smart card and secure coprocessorent://SD_ILS/0/SD_ILS:6062302024-05-25T14:20:52Z2024-05-25T14:20:52Zby Mustafa A. Ayad<br/>Author Mustafa A. Ayad, Prakash, V., N. K. Noordin, W. A. Wan Adnan<br/>Format: Computer file<br/>Publication Date 2003<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?id=15488">Full text</a><br/>Network intrusion detectionent://SD_ILS/0/SD_ILS:3863492024-05-25T14:20:52Z2024-05-25T14:20:52Zby Northcutt, Stephen<br/>Author Northcutt, Stephen, Novak, Judy<br/>Format: Books<br/>Call Number TK5105.59 N673 2003<br/>Edition 3rd ed.<br/>Publisher New Riders,<br/>Publication Date 2003<br/>ISBN 9780735712652<br/>Financial cryptography : 6th International Conference, FC 2002 Southampton, Bermuda, March 11-14, 2002 : revised papersent://SD_ILS/0/SD_ILS:3971822024-05-25T14:20:52Z2024-05-25T14:20:52Zby International conference Financial cryptography, (6th : 2002 : Southamton, Bermuda Islands)<br/>Author International conference Financial cryptography, (6th : 2002 : Southamton, Bermuda Islands), Blaze, Matt<br/>Format: Books<br/>Call Number HG1710 F56 2003<br/>Publisher Springer-Verlag,<br/>Publication Date 2003<br/>ISBN 9783540006466<br/>Enforcing multilevel security policies for network firewallent://SD_ILS/0/SD_ILS:3521732024-05-25T14:20:52Z2024-05-25T14:20:52Zby Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, Mohd. Aizaini Maarof, International Conference Information Technology in Asia (2003 : Kuching, Sarawak)<br/>Format: Books<br/>Call Number TK5105.59 C34 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>A Benchmarking methodology for NPU-based stateful firewallent://SD_ILS/0/SD_ILS:3526122024-05-25T14:20:52Z2024-05-25T14:20:52Zby Lee, Eng Kean<br/>Author Lee, Eng Kean, Sulaiman Mohd. Nor, IEEE Asia Pacific Conference on Communication APCC 2003 (9th : 2003 : Penang)<br/>Format: Books<br/>Call Number TK5105.59 L44 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Internet security : cryptographic principles, algorithms, and protocolsent://SD_ILS/0/SD_ILS:3402352024-05-25T14:20:52Z2024-05-25T14:20:52Zby Rhee, Man Young<br/>Author Rhee, Man Young<br/>Format: Books<br/>Call Number TK5105.875.I57 R44 2003<br/>Publisher J. Wiley,<br/>Publication Date 2003<br/>ISBN 9780470852859<br/>Network security : a beginner's guideent://SD_ILS/0/SD_ILS:3474012024-05-25T14:20:52Z2024-05-25T14:20:52Zby Maiwald, Eric<br/>Author Maiwald, Eric<br/>Format: Books<br/>Call Number TK5105.59 M35 2003<br/>Edition 2nd ed.<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2003<br/>ISBN 9780072229578<br/>Access controlling firewall using Bell-LaPadula security modelent://SD_ILS/0/SD_ILS:3535492024-05-25T14:20:52Z2024-05-25T14:20:52Zby Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, Quality in Research Seminar (6th : 2003 : Indonesia)<br/>Format: Books<br/>Call Number TK5105.59 C33 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Cryptography and network securityent://SD_ILS/0/SD_ILS:3548532024-05-25T14:20:52Z2024-05-25T14:20:52Zby Kahate, Atul<br/>Author Kahate, Atul<br/>Format: Books<br/>Call Number TK5105.59 K33 2003<br/>Publisher Tata McGraw-Hill,<br/>Publication Date 2003<br/>ISBN 9780070494831<br/>Practical Unix and internet securityent://SD_ILS/0/SD_ILS:3341472024-05-25T14:20:52Z2024-05-25T14:20:52Zby Garfinkel, Simson<br/>Author Garfinkel, Simson, Spafford, Gene, Schwartz, Alan<br/>Format: Books<br/>Call Number TK5105.59 G37 2003<br/>Edition 3rd ed.<br/>Publisher O'Reilly & Associates,<br/>Publication Date 2003<br/>ISBN 9780596003234<br/>Hacking exposed J2EE & Java : developing secure applications with Java technologyent://SD_ILS/0/SD_ILS:3565552024-05-25T14:20:52Z2024-05-25T14:20:52Zby Buege, Brian<br/>Author Buege, Brian, Taylor, Art, 1958-, Layman, Randy<br/>Format: Books<br/>Call Number QA76.73.J38 B834 2002<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2002<br/>ISBN 9780072225655<br/>Securing E-business systems : a guide for managers and executivesent://SD_ILS/0/SD_ILS:3707262024-05-25T14:20:52Z2024-05-25T14:20:52Zby Braithwaite, Timothy, 1942-<br/>Author Braithwaite, Timothy, 1942-<br/>Format: Books<br/>Call Number HF5548.32 B72 2002<br/>Publisher John Wiley,<br/>Publication Date 2002<br/>ISBN 9780471072980<br/>Internet security and firewallsent://SD_ILS/0/SD_ILS:3866752024-05-25T14:20:52Z2024-05-25T14:20:52Zby Preetham, V. V.<br/>Author Preetham, V. V.<br/>Format: Books<br/>Call Number TK5105.59 P73 2002<br/>Publisher Premier Press,<br/>Publication Date 2002<br/>ISBN 9781931841979<br/>CoursePrepent://SD_ILS/0/SD_ILS:5923902024-05-25T14:20:52Z2024-05-25T14:20:52Zby Cioara, Jeremy<br/>Author Cioara, Jeremy<br/>Format: Computer file<br/>Call Number CP 2268<br/>Publisher Course Technology/Thomson ,<br/>Publication Date 2002<br/>ISBN 9780619062064<br/>Internet and wireless securityent://SD_ILS/0/SD_ILS:4755892024-05-25T14:20:52Z2024-05-25T14:20:52Zby Temple, Robert, 1963-<br/>Author Temple, Robert, 1963-, Regnault, John<br/>Format: Books<br/>Call Number TK5105.59 I55 2002<br/>Publisher Institution of Electrical Engineers,<br/>Publication Date 2002<br/>ISBN 9780852961971<br/>Packet filtering personal firewall based on microsoft's internet protocol helper APIent://SD_ILS/0/SD_ILS:3267142024-05-25T14:20:52Z2024-05-25T14:20:52Zby Abdul Hanan Abdullah<br/>Author Abdul Hanan Abdullah, Lau, Sei Ping, International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format: Books<br/>Call Number TK5105.59 A32 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Cryptographic applications in database security : a survey studyent://SD_ILS/0/SD_ILS:3267202024-05-25T14:20:52Z2024-05-25T14:20:52Zby Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author Zailani Mohamed Sidek, Assoc.Prof.Dr., Piper, Fred, Norbik Bashah Idris, Ciechanowicz, Zbigniew 'Chez', International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format: Books<br/>Call Number QA76.9.A25 Z344 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Implementation of Brands' digital cash system in TCP/IP networking environmentent://SD_ILS/0/SD_ILS:3277442024-05-25T14:20:52Z2024-05-25T14:20:52Zby Teo, Pock Chueng<br/>Author Teo, Pock Chueng, Ahmad Zuri Sha'ameri, Zulkarnain Mohd. Yusof, International Symposium on Information and Communications Technologies (2002 : Selangor)<br/>Format: Books<br/>Call Number HG1710 T46 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>File access permission change detection using immunological negative selection approachent://SD_ILS/0/SD_ILS:3284432024-05-25T14:20:52Z2024-05-25T14:20:52Zby Mohd. Yazid Idris<br/>Author Mohd. Yazid Idris, Abdul Hanan Abdullah, Mohd. Aizaini Maarof, International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format: Books<br/>Call Number TK5105.59 M92 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Authentication protocol : methods reviewent://SD_ILS/0/SD_ILS:3268212024-05-25T14:20:52Z2024-05-25T14:20:52Zby Cahyo Crysdian<br/>Author Cahyo Crysdian, Abdul Hanan Abdullah, International Technical Conference on Circuits, Systems, Computer and Communications (2002 : Thailand)<br/>Format: Books<br/>Call Number QA76.9.A25 C35 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>MCSE guide to microsoft internet security and acceleration ( ISA ) server 2000 /Jeremy Cioaraent://SD_ILS/0/SD_ILS:3281052024-05-25T14:20:52Z2024-05-25T14:20:52Zby Cioara, Jeremy<br/>Author Cioara, Jeremy<br/>Format: Books<br/>Call Number TK5105.875.I57 C56 2002<br/>Publisher Course Technology/Thomson ,<br/>Publication Date 2002<br/>ISBN 9780619062064<br/>Security planning and disaster recoveryent://SD_ILS/0/SD_ILS:3416672024-05-25T14:20:52Z2024-05-25T14:20:52Zby Maiwald, Eric<br/>Author Maiwald, Eric, Sieglein, William<br/>Format: Books<br/>Call Number TK5105.59 M36 2002<br/>Publisher McGraw-Hill Osborne,<br/>Publication Date 2002<br/>ISBN 9780072224634<br/>Internet and intranet securityent://SD_ILS/0/SD_ILS:3032032024-05-25T14:20:52Z2024-05-25T14:20:52Zby Oppliger, Rolf<br/>Author Oppliger, Rolf<br/>Format: Books<br/>Call Number TK5105.875.I57 O67 2002<br/>Edition 2nd ed.<br/>Publisher Artech House,<br/>Publication Date 2002<br/>ISBN 9781580531665<br/>Online computer shopent://SD_ILS/0/SD_ILS:1686202024-05-25T14:20:52Z2024-05-25T14:20:52Zby Chan, Kian Koon<br/>Author Chan, Kian Koon<br/>Format: Books<br/>Call Number HF5415.1265 C54 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Project Paper (Bachelor of Computer Science) - Universiti Teknologi Malaysia, 2001<br/>Network intrusion detection : an analyst's handbookent://SD_ILS/0/SD_ILS:1594542024-05-25T14:20:52Z2024-05-25T14:20:52Zby Northcutt, Stephen<br/>Author Northcutt, Stephen, Novak, Judy, McLachlan, Donald<br/>Format: Books<br/>Call Number TK5105.59 N673 2000<br/>Edition 2nd ed.<br/>Publisher New Riders,<br/>Publication Date 2001<br/>ISBN 9780735710085<br/>Security and privacy for e-commerceent://SD_ILS/0/SD_ILS:1700042024-05-25T14:20:52Z2024-05-25T14:20:52Zby Ghosh, Anup K.<br/>Author Ghosh, Anup K.<br/>Format: Books<br/>Call Number HF5548.32 G57 2001<br/>Publisher Wiley,<br/>Publication Date 2001<br/>ISBN 9780471384212<br/>Network security : a beginner's guideent://SD_ILS/0/SD_ILS:3406402024-05-25T14:20:52Z2024-05-25T14:20:52Zby Maiwald, Eric<br/>Author Maiwald, Eric<br/>Format: Books<br/>Call Number TK5105.59 M35 2001<br/>Publisher McGraw-Hill/Osborne,<br/>Publication Date 2001<br/>ISBN 9780072133240<br/>Non-repudiation in electronic commerceent://SD_ILS/0/SD_ILS:3170732024-05-25T14:20:52Z2024-05-25T14:20:52Zby Zhou, Jianying<br/>Author Zhou, Jianying<br/>Format: Books<br/>Call Number HF5548.32 Z49 2001<br/>Publisher Artech House,<br/>Publication Date 2001<br/>ISBN 9781580532471<br/>Agent technology approach for proxy serverent://SD_ILS/0/SD_ILS:3311082024-05-25T14:20:52Z2024-05-25T14:20:52Zby Fazidah Othman<br/>Author Fazidah Othman, Abdul Hanan Abdullah, Malaysian Science and Technology Congress (2000 : Genting Highlands, Pahang)<br/>Format: Books<br/>Call Number TK5105.59 F39 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001 2000<br/>The complete guide to internet securityent://SD_ILS/0/SD_ILS:1376652024-05-25T14:20:52Z2024-05-25T14:20:52Zby Merkow, Mark S.<br/>Author Merkow, Mark S., Breithaupt, Jim<br/>Format: Books<br/>Call Number TK5105.875.I57 M47 2000<br/>Publisher Amacom,<br/>Publication Date 2000<br/>ISBN 9780814470701<br/>Electronic commerce relationships : trust by designent://SD_ILS/0/SD_ILS:1418492024-05-25T14:20:52Z2024-05-25T14:20:52Zby Keen, Peter<br/>Author Keen, Peter<br/>Format: Books<br/>Call Number HF5548.32 E53 2000<br/>Publisher Prentice Hall,<br/>Publication Date 2000<br/>ISBN 9780130170378<br/>iPRO agentent://SD_ILS/0/SD_ILS:1465912024-05-25T14:20:52Z2024-05-25T14:20:52Zby Fazidah Othman<br/>Author Fazidah Othman, Abdul Hanan Abdullah, Malaysian Science and Technology Congress (2000 : Genting Highlands, Pahang)<br/>Format: Books<br/>Call Number TK5105.59 F38 2000<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2000<br/>The complete guide to Internet securityent://SD_ILS/0/SD_ILS:8756392024-05-25T14:20:52Z2024-05-25T14:20:52Zby Merkow, Mark S.<br/>Author Merkow, Mark S., Breithaupt, Jim, 1955-<br/>Format: Books<br/>Call Number TK5105.875 .I57 M47 2000<br/>Publication Date 2000<br/>ISBN 9780814470701<br/>Penganalisa leksikal dan sintaktik di dalam antaramuka dinding apient://SD_ILS/0/SD_ILS:1027082024-05-25T14:20:52Z2024-05-25T14:20:52Zby Md. Asri Ngadi<br/>Author Md. Asri Ngadi<br/>Format: Books<br/>Call Number TK5105.59 M37 1999<br/>Publisher UTM,<br/>Publication Date 1999<br/>Tesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 1999<br/>Investigation FKE's network security using firewallent://SD_ILS/0/SD_ILS:1166952024-05-25T14:20:52Z2024-05-25T14:20:52Zby Low, Ho Chit<br/>Author Low, Ho Chit<br/>Format: Books<br/>Call Number TK5105.59 L68 1999 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1999<br/>Web pages/server for medical electronics : medical surgery and emergency ... [et al.]ent://SD_ILS/0/SD_ILS:133002024-05-25T14:20:52Z2024-05-25T14:20:52Zby Lee, Chai Hong<br/>Author Lee, Chai Hong, Lee, Kong Aik, Logeswari M. Shanmugam, Low, Ho Chit, Sivalingam R. Savassamy<br/>Format: Visual Materials<br/>Call Number MFL 9737<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1999<br/>Network intrusion detection : an analyst's handbookent://SD_ILS/0/SD_ILS:1555822024-05-25T14:20:52Z2024-05-25T14:20:52Zby Northcutt, Stephen<br/>Author Northcutt, Stephen<br/>Format: Books<br/>Call Number TK5105.59 N673 1999<br/>Publisher New Riders,<br/>Publication Date 1999<br/>ISBN 9780735708686<br/>Designing network securityent://SD_ILS/0/SD_ILS:1292612024-05-25T14:20:52Z2024-05-25T14:20:52Zby Kaeo, Merike<br/>Author Kaeo, Merike<br/>Format: Books<br/>Call Number TK5105.59 K34 1999<br/>Publisher Cisci Press,<br/>Publication Date 1999<br/>ISBN 9781578700431<br/>Proxy system : analysis in concept, design and implementation ...ent://SD_ILS/0/SD_ILS:76542024-05-25T14:20:52Z2024-05-25T14:20:52Zby Rabiah Ahmad, Dr.<br/>Author Rabiah Ahmad, Dr., Rosely Kumoi, Suriati Sadimon, Zakiah Hussain<br/>Format: Visual Materials<br/>Call Number MFL 9138 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Thesis (MSc in Information Security) - University of London, 1998<br/>Rangkaian berkelajuan tinggi di MSCent://SD_ILS/0/SD_ILS:78632024-05-25T14:20:52Z2024-05-25T14:20:52Zby Kamarul Zamri Mohd. Zam<br/>Author Kamarul Zamri Mohd. Zam, Osman Aripin, Mohammad Rizal Julaihi, Lee, Ak Jenang, Mohd. Bakaruddin Abu Bakar<br/>Format: Visual Materials<br/>Call Number MFL 9152 ra<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1998<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknolo gi Malaysia, 1998<br/>E-commerce security strategies : protecting the enterpriseent://SD_ILS/0/SD_ILS:1363562024-05-25T14:20:52Z2024-05-25T14:20:52Zby Cameron, Debra<br/>Author Cameron, Debra<br/>Format: Books<br/>Call Number HF5548.32 C353 1998 f<br/>Publisher Computer Technology Research,<br/>Publication Date 1998<br/>ISBN 9781566070577<br/>E-commerce security : weak links, best defensesent://SD_ILS/0/SD_ILS:1143542024-05-25T14:20:52Z2024-05-25T14:20:52Zby Ghosh, Anup K.<br/>Author Ghosh, Anup K.<br/>Format: Books<br/>Call Number HF5548.32 G56 1998<br/>Publisher John Wiley,<br/>Publication Date 1998<br/>ISBN 9780471192237<br/>Proxy system : analysis in concept, design and implementationent://SD_ILS/0/SD_ILS:4900822024-05-25T14:20:52Z2024-05-25T14:20:52Zby Rabiah Ahmad, Dr.<br/>Author Rabiah Ahmad, Dr.<br/>Format: Books<br/>Call Number TK5105.59 R33 1998 raf<br/>Publisher University of London,<br/>Publication Date 1998<br/>Thesis (MSc in Information Security) - University of London, 1998<br/>Firewall : is it importantent://SD_ILS/0/SD_ILS:4721982024-05-25T14:20:52Z2024-05-25T14:20:52Zby Tan, Wei Hong<br/>Author Tan, Wei Hong<br/>Format: Books<br/>Call Number TK5105.59 T83 1998 raf<br/>Publisher UTM,<br/>Publication Date 1998<br/>Project paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1998<br/>Intranet security : stories from the trenchesent://SD_ILS/0/SD_ILS:4814172024-05-25T14:20:52Z2024-05-25T14:20:52Zby McCarthy, Linda<br/>Author McCarthy, Linda<br/>Format: Books<br/>Call Number TK5105.875.I6 M33 1998<br/>Publisher Sun Microsystems Press,<br/>Publication Date 1998<br/>ISBN 9780138947590<br/>Internet security : risk analysis, strategies and firewallsent://SD_ILS/0/SD_ILS:6158482024-05-25T14:20:52Z2024-05-25T14:20:52Zby Kyas, Othmar<br/>Author Kyas, Othmar<br/>Format: Computer file<br/>Call Number CP 427<br/>Publisher International Thomson Computer Press,<br/>Publication Date 1997<br/>ISBN 9781850323020<br/>Intranet firewalls : planning & implementing your network security systement://SD_ILS/0/SD_ILS:4568362024-05-25T14:20:52Z2024-05-25T14:20:52Zby Fuller, Scott<br/>Author Fuller, Scott, Pagan, Kevin<br/>Format: Books<br/>Call Number TK5105.59 F84 1996<br/>Publisher Ventana Communications Group, Inc.,<br/>Publication Date 1997<br/>ISBN 9781566045063<br/>Digital cash : commerce on the netent://SD_ILS/0/SD_ILS:4681542024-05-25T14:20:52Z2024-05-25T14:20:52Zby Wayner, Peter<br/>Author Wayner, Peter<br/>Format: Books<br/>Call Number HG1710 W39 1997<br/>Edition 2nd ed<br/>Publisher AP Professional,<br/>Publication Date 1997<br/>ISBN 9780127887722<br/>Internet security : risk analysis, strategies and firewallsent://SD_ILS/0/SD_ILS:4628492024-05-25T14:20:52Z2024-05-25T14:20:52Zby Kyas, Othmar<br/>Author Kyas, Othmar<br/>Format: Books<br/>Call Number TK5105.875.I57 K92 1997<br/>Publisher International Thomson Computer Press,<br/>Publication Date 1997<br/>ISBN 9781850323020<br/>Digital crime : policing the cybernationent://SD_ILS/0/SD_ILS:4873052024-05-25T14:20:52Z2024-05-25T14:20:52Zby Barrett, Neil<br/>Author Barrett, Neil<br/>Format: Books<br/>Call Number TK5105.875.I57 B36 1997<br/>Publisher Kogan Page,<br/>Publication Date 1997<br/>ISBN 9780749420970<br/>Internet security : professional referenceent://SD_ILS/0/SD_ILS:942442024-05-25T14:20:52Z2024-05-25T14:20:52Zby Atkins, Derek<br/>Author Atkins, Derek<br/>Format: Books<br/>Call Number TK5105.875 I57 1997<br/>Edition 2nd ed.<br/>Publisher New Riders Pub.,<br/>Publication Date 1997<br/>ISBN 9781562057602<br/>Internet security for businessent://SD_ILS/0/SD_ILS:1123762024-05-25T14:20:52Z2024-05-25T14:20:52Zby Bernstein, Terry<br/>Author Bernstein, Terry<br/>Format: Books<br/>Call Number HD30.38 I57 1996<br/>Publisher John Wiley,<br/>Publication Date 1996<br/>ISBN 9780471137528<br/>Network and Internet securityent://SD_ILS/0/SD_ILS:4246402024-05-25T14:20:52Z2024-05-25T14:20:52Zby Ahuja, Vijay<br/>Author Ahuja, Vijay<br/>Format: Books<br/>Call Number TK5105.59 A38 1996<br/>Publisher AP Professional,<br/>Publication Date 1996<br/>ISBN 9780120455959<br/>Internet commerceent://SD_ILS/0/SD_ILS:4535722024-05-25T14:20:52Z2024-05-25T14:20:52Zby Dahl, Andrew<br/>Author Dahl, Andrew, Lesnick, Leslie<br/>Format: Books<br/>Call Number HF5415.1265 D33 1996<br/>Publisher New Riders,<br/>Publication Date 1996<br/>ISBN 9781562054960<br/>What you need to know : bandits on the information superhighwayent://SD_ILS/0/SD_ILS:4772272024-05-25T14:20:52Z2024-05-25T14:20:52Zby Barrett, Daniel J.<br/>Author Barrett, Daniel J.<br/>Format: Books<br/>Call Number HV6773 B37 1992<br/>Publisher O'Reilly & Associates,<br/>Publication Date 1996<br/>ISBN 9781565921566<br/>Internet firewalls and network securityent://SD_ILS/0/SD_ILS:3685192024-05-25T14:20:52Z2024-05-25T14:20:52Zby Hare, R. Christopher E.<br/>Author Hare, R. Christopher E., Siyan, Karanjit S.<br/>Format: Books<br/>Call Number TK5105.875.I57 H27 1995<br/>Publisher New Riders Pub.,<br/>Publication Date 1995<br/>ISBN 9781562054373<br/>The computer privacy handbookent://SD_ILS/0/SD_ILS:4104312024-05-25T14:20:52Z2024-05-25T14:20:52Zby Bacard, Andre<br/>Author Bacard, Andre<br/>Format: Books<br/>Call Number QA76.9.A25 B32 1995<br/>Publisher Peachpit Press,<br/>Publication Date 1995<br/>ISBN 9781566091718<br/>Implementing internet securityent://SD_ILS/0/SD_ILS:4585802024-05-25T14:20:52Z2024-05-25T14:20:52Zby Cooper, Frederic J.<br/>Author Cooper, Frederic J.<br/>Format: Books<br/>Call Number TK5105.59 I46 1995<br/>Publisher New Riders,<br/>Publication Date 1995<br/>ISBN 9781562054717<br/>Firewalls and Internet security : repelling the wily hackerent://SD_ILS/0/SD_ILS:4104392024-05-25T14:20:52Z2024-05-25T14:20:52Zby Cheswick, William R.<br/>Author Cheswick, William R., Bellovin, Steven M.<br/>Format: Books<br/>Call Number TK5105.875.I57 C43 1994<br/>Publisher Addison-Wesley,<br/>Publication Date 1994<br/>ISBN 9780201633573<br/>Computer auditing, security and internal control manualent://SD_ILS/0/SD_ILS:4506502024-05-25T14:20:52Z2024-05-25T14:20:52Zby Kuong, Javier F.<br/>Author Kuong, Javier F.<br/>Format: Books<br/>Call Number QA76.9.A25 K86 1987<br/>Publisher Prentice-Hall,<br/>Publication Date 1987<br/>ISBN 9780131629677<br/>A SECURE MODEL OF IMAGE-BASED AUTHENTICATION ON ONLINE BANKINGent://SD_ILS/0/SD_ILS:8440812024-05-25T14:20:52Z2024-05-25T14:20:52Zby Ratna Dewi Ibrahim, 1977-, author<br/>Author Ratna Dewi Ibrahim, 1977-, author, Mohd. Shahidan Abdullah, Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number HG1708.7 R38 2014 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>ONLINE BANKING SECURITY PERCEPTION AND AWEARNESS OF ONLINE TRANSCTIONSent://SD_ILS/0/SD_ILS:8390532024-05-25T14:20:52Z2024-05-25T14:20:52Zby Mohammed A. Sabri Alrawi, 1981-, author<br/>Author Mohammed A. Sabri Alrawi, 1981-, author, Azizah Abd. Manaf, Prof.Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number HG1708.7 M643 2012 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>ONLINE BANKING SECURITY PERCEPTION AND AWEARNESS OF ONLINE TRANSCTIONSent://SD_ILS/0/SD_ILS:8390542024-05-25T14:20:52Z2024-05-25T14:20:52Zby Mohammed A. Sabri Alrawi, 1981-, author<br/>Author Mohammed A. Sabri Alrawi, 1981-, author, Azizah Abd. Manaf, Prof.Dr., supervisor<br/>Format: Books<br/>Call Number CP 034112 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>SECURITY IN VOICE OVER INTERNET PROTOCOL (VOIP) : IMPLEMENTATION AND ANALYSISent://SD_ILS/0/SD_ILS:8395892024-05-25T14:20:52Z2024-05-25T14:20:52Zby Maimun Rizal, 1980-, author<br/>Author Maimun Rizal, 1980-, author, Abdul Hanan Abdullah, Prof.Dr., supervisor, Saiful Adli Ismail, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.8865 M35 2007<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>PRESERVING PRIVACY IN SOCIAL NETWORK SITES USING INTEGRATED ANONYMITY ALGORITHMent://SD_ILS/0/SD_ILS:8404592024-05-25T14:20:52Z2024-05-25T14:20:52Zby Sanaz Kavianpour, 1984-, author<br/>Author Sanaz Kavianpour, 1984-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number TK5105.59 S26 2010 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>PRESERVING PRIVACY IN SOCIAL NETWORK SITES USING INTEGRATED ANONYMITY ALGORITHMent://SD_ILS/0/SD_ILS:8404602024-05-25T14:20:52Z2024-05-25T14:20:52Zby Sanaz Kavianpour, 1984-, author<br/>Author Sanaz Kavianpour, 1984-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034008 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>DNS PACKET CAPTURING AND ANALYZING SYSTEMent://SD_ILS/0/SD_ILS:8404832024-05-25T14:20:52Z2024-05-25T14:20:52Zby Babak Abdollahi Khameneh, 1983-, author<br/>Author Babak Abdollahi Khameneh, 1983-, author, Nurulhuda Firdaus Mohd. Azmi, Dr., supervisor, Sekolah Informatik Termaju<br/>Format: Books<br/>Call Number TK5105.59 B33 2013 raf<br/>Thesis Sarjana Kejuruteraan Perisian<br/>DNS PACKET CAPTURING AND ANALYZING SYSTEMent://SD_ILS/0/SD_ILS:8404852024-05-25T14:20:52Z2024-05-25T14:20:52Zby Babak Abdollahi Khameneh, 1983-, author<br/>Author Babak Abdollahi Khameneh, 1983-, author, Nurulhuda Firdaus Mohd. Azmi, Dr., supervisor, Sekolah Informatik Termaju<br/>Format: Books<br/>Call Number CP 034038 ra<br/>Thesis Sarjana Kejuruteraan Perisian<br/>A SECURE MODEL OF IMAGE-BASED AUTHENTICATION ON ONLINE BANKINGent://SD_ILS/0/SD_ILS:8440822024-05-25T14:20:52Z2024-05-25T14:20:52Zby Ratna Dewi Ibrahim, 1977-, author<br/>Author Ratna Dewi Ibrahim, 1977-, author, Mohd. Shahidan Abdullah, Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034516 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>PRIVACY INFORMATION DISCLOSURE ON FACEBOOK (A CASE STUDY IN INSTITUT TEKNOLOGI PERAK)ent://SD_ILS/0/SD_ILS:8594172024-05-25T14:20:52Z2024-05-25T14:20:52Zby Munaliza Jaimun, 1980-, author<br/>Author Munaliza Jaimun, 1980-, author, Rasimah Che Mohd. Yusoff, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number HM742 M86 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>PRIVACY INFORMATION DISCLOSURE ON FACEBOOK (A CASE STUDY IN INSTITUT TEKNOLOGI PERAK)ent://SD_ILS/0/SD_ILS:8594182024-05-25T14:20:52Z2024-05-25T14:20:52Zby Munaliza Jaimun, 1980-, author<br/>Author Munaliza Jaimun, 1980-, author, Rasimah Che Mohd. Yusoff, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034765 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>ENHANCED E-COMMERCE RISK MANAGEMENT FRAMEWORKent://SD_ILS/0/SD_ILS:8594852024-05-25T14:20:52Z2024-05-25T14:20:52Zby Zeinab Najafi Arab, 1987-, author<br/>Author Zeinab Najafi Arab, 1987-, author, Norziha Megat Mohd. Zainuddin, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number HF5548.32 Z45 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>ENHANCED E-COMMERCE RISK MANAGEMENT FRAMEWORKent://SD_ILS/0/SD_ILS:8594862024-05-25T14:20:52Z2024-05-25T14:20:52Zby Zeinab Najafi Arab, 1987-, author<br/>Author Zeinab Najafi Arab, 1987-, author, Norziha Megat Mohd. Zainuddin, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034782 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/>SECURITY AWARENESS FACTORS INFLUENCING CUSTOMERS’ BEHAVIOR IN ONLINE SERVICESent://SD_ILS/0/SD_ILS:8594932024-05-25T14:20:52Z2024-05-25T14:20:52Zby Moaad Abdulrahman M. Khalil, 1989-, author<br/>Author Moaad Abdulrahman M. Khalil, 1989-, author, Mohd. Shahidan Abdullah, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number TK5105.875.I57 M633 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>SECURITY AWARENESS FACTORS INFLUENCING CUSTOMERS’ BEHAVIOR IN ONLINE SERVICESent://SD_ILS/0/SD_ILS:8594942024-05-25T14:20:52Z2024-05-25T14:20:52Zby Moaad Abdulrahman M. Khalil, 1989-, author<br/>Author Moaad Abdulrahman M. Khalil, 1989-, author, Mohd. Shahidan Abdullah, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034774 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>SECURE MODEL AWARENESS FOR MOBILE PHONE BANKING APPLICATIONS AMONG USERSent://SD_ILS/0/SD_ILS:8608402024-05-25T14:20:52Z2024-05-25T14:20:52Zby al-Hadhrami, Taqi Mohammed Ali, 1989-, author<br/>Author al-Hadhrami, Taqi Mohammed Ali, 1989-, author, Mohd. Shahidan Abdullah, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034795 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) -Universiti Teknologi Malaysia, 2015<br/>INFORMATION PRIVACY CONCERNS MODEL FOR INTERNET USERS IN MARITIME ENVIRONMENTent://SD_ILS/0/SD_ILS:8609512024-05-25T14:20:52Z2024-05-25T14:20:52Zby Yat, Guo Quan, 1985-, author<br/>Author Yat, Guo Quan, 1985-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035021 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/>Secure Model for Online Shopping Among Millennial in Yemenent://SD_ILS/0/SD_ILS:8610282024-05-25T14:20:52Z2024-05-25T14:20:52Zby Shehab Mohammed Ali Albadri, 1989-, author<br/>Author Shehab Mohammed Ali Albadri, 1989-, author, Nurazean Maarop, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035033 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>DESIGNING LIGHTWEIGHT CRYPTOGRAPHY ALGORITHM FOR INTERNET OF THINGSent://SD_ILS/0/SD_ILS:8647512024-05-25T14:20:52Z2024-05-25T14:20:52Zby Mohd. Fairus Mustapha, 1980-, author<br/>Author Mohd. Fairus Mustapha, 1980-, author, Majid Bakhtiari, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035068 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>SECURITY IN VOICE OVER INTERNET PROTOCOL (VOIP) : IMPLEMENTATION AND ANALYSISent://SD_ILS/0/SD_ILS:8395902024-05-25T14:20:52Z2024-05-25T14:20:52Zby Maimun Rizal, 1980-, author<br/>Author Maimun Rizal, 1980-, author, Abdul Hanan Abdullah, Prof.Dr., supervisor, Saiful Adli Ismail, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034567 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>SECURE MODEL AWARENESS FOR MOBILE PHONE BANKING APPLICATIONS AMONG USERSent://SD_ILS/0/SD_ILS:8601772024-05-25T14:20:52Z2024-05-25T14:20:52Zby al-Hadhrami, Taqi Mohammed Ali, 1989-, author<br/>Author al-Hadhrami, Taqi Mohammed Ali, 1989-, author, Mohd. Shahidan Abdullah, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number HG1708.7 H33 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) -Universiti Teknologi Malaysia, 2015<br/>INFORMATION PRIVACY CONCERNS MODEL FOR INTERNET USERS IN MARITIME ENVIRONMENTent://SD_ILS/0/SD_ILS:8605692024-05-25T14:20:52Z2024-05-25T14:20:52Zby Yat, Guo Quan, 1985-, author<br/>Author Yat, Guo Quan, 1985-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number TK5105.8855 Y38 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/>Secure Model for Online Shopping Among Millennial in Yemenent://SD_ILS/0/SD_ILS:8605772024-05-25T14:20:52Z2024-05-25T14:20:52Zby Shehab Mohammed Ali Albadri, 1989-, author<br/>Author Shehab Mohammed Ali Albadri, 1989-, author, Nurazean Maarop, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number TK5105.875.I57 S54 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>DESIGNING LIGHTWEIGHT CRYPTOGRAPHY ALGORITHM FOR INTERNET OF THINGSent://SD_ILS/0/SD_ILS:8646792024-05-25T14:20:52Z2024-05-25T14:20:52Zby Mohd. Fairus Mustapha, 1980-, author<br/>Author Mohd. Fairus Mustapha, 1980-, author, Majid Bakhtiari, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 M6434 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>RIoT Control : Understanding and Managing Risks and the Internet of Thingsent://SD_ILS/0/SD_ILS:8668352024-05-25T14:20:52Z2024-05-25T14:20:52Zby Macaulay, Tyson<br/>Author Macaulay, Tyson<br/>Format: Books<br/>Call Number TK5105.59 M33 2017<br/>ISBN 9780124199712<br/>The Basics of Cyber Safety : Computer and Mobile Device Safety Made Easyent://SD_ILS/0/SD_ILS:8668982024-05-25T14:20:52Z2024-05-25T14:20:52Zby Sammons, John<br/>Author Sammons, John, Cross, Michael<br/>Format: Books<br/>Call Number QA76.9.A25 S266 2017<br/>ISBN 9780124166509<br/>Secure Connected Objectsent://SD_ILS/0/SD_ILS:8719922024-05-25T14:20:52Z2024-05-25T14:20:52Zby Paret, Dominique, author<br/>Author Paret, Dominique, author, Huon, Jean-Paul, author<br/>Format: Books<br/>Call Number TK5105.8857 P37 2017<br/>ISBN 9781786300591<br/>ACCEPTANCE OF INTERNET OF THINGS FROM SECURITY PERSPECTIVE IN MALAYSIAN GOVERNMENT AGENCYent://SD_ILS/0/SD_ILS:8719942024-05-25T14:20:52Z2024-05-25T14:20:52Zby Siti Riniy Fariza Mohd. Borham, 1979-, author<br/>Author Siti Riniy Fariza Mohd. Borham, 1979-, author, Nurazean Maarop, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 064075 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/>Internet of Things Security : Challenges, Advances, and Analyticsent://SD_ILS/0/SD_ILS:8822872024-05-25T14:20:52Z2024-05-25T14:20:52Zby Patel, Chintan, author<br/>Author Patel, Chintan, author, Doshi, Nishant, author<br/>Format: Books<br/>Call Number TK5105.8857 P38 2019<br/>ISBN 9781138341364<br/>Big Data, Surveillance and Crisis Managementent://SD_ILS/0/SD_ILS:8873972024-05-25T14:20:52Z2024-05-25T14:20:52Zby Boersma, Kees, editor<br/>Author Boersma, Kees, editor, Fonio, Chiara, editor<br/>Format: Books<br/>Call Number HD49 B54 2018<br/>ISBN 9780367876203<br/>ACCEPTANCE OF INTERNET OF THINGS FROM SECURITY PERSPECTIVE IN MALAYSIAN GOVERNMENT AGENCYent://SD_ILS/0/SD_ILS:8712252024-05-25T14:20:52Z2024-05-25T14:20:52Zby Siti Riniy Fariza Mohd. Borham, 1979-, author<br/>Author Siti Riniy Fariza Mohd. Borham, 1979-, author, Nurazean Maarop, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number TK5105.8857 S58 2017 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/>A Beginner’s Guide to Internet of Things Security : Attacks, Applications, Authentication, and Fundamentalsent://SD_ILS/0/SD_ILS:8873952024-05-25T14:20:52Z2024-05-25T14:20:52Zby Gupta, Brij, 1982-, author<br/>Author Gupta, Brij, 1982-, author, Tewari, Aakanksha, author<br/>Format: Books<br/>Call Number QA76.9.A25 G87 2020<br/>ISBN 9780367430696<br/>Child Protection and Safeguarding Technologies : Appropriate or Excessive 'Solutions' to Social Problems?ent://SD_ILS/0/SD_ILS:8875512024-05-25T14:20:52Z2024-05-25T14:20:52Zby Phippen, Andy, author<br/>Author Phippen, Andy, author, Brennan, Maggie, author<br/>Format: Books<br/>Call Number HQ784.I58 P45 2020<br/>ISBN 9781138555402<br/>