Search Results for Internet -- Security measures - Narrowed by: English SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dInternet$002b--$002bSecurity$002bmeasures$0026qf$003dLANGUAGE$002509Language$002509ENG$002509English$0026ic$003dtrue$0026ps$003d300$0026isd$003dtrue?dt=list 2024-05-25T14:20:52Z Security in IoT-Enabled Space ent://SD_ILS/0/SD_ILS:882284 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Al-Turjman, Fadi, author<br/>Author&#160;Al-Turjman, Fadi, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.8857 A48 2019<br/>Publication Date&#160;2019<br/>ISBN&#160;9780367111236<br/> Network Forensics ent://SD_ILS/0/SD_ILS:873173 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Messier, Ric, author<br/>Author&#160;Messier, Ric, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M47 2017<br/>Publication Date&#160;2017<br/>ISBN&#160;9781119328285<br/> Information security awareness model in social networking for teenagers ent://SD_ILS/0/SD_ILS:859467 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Mohamed Zul Hazmi Mohamed Khazin, 1983-, author<br/>Author&#160;Mohamed Zul Hazmi Mohamed Khazin, 1983-, author,&#160;Norziha Megat Mohd. Zainuddin, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;HM742 M64 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/> Information security awareness model in social networking for teenagers ent://SD_ILS/0/SD_ILS:859468 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Mohamed Zul Hazmi Mohamed Khazin, 1983-, author<br/>Author&#160;Mohamed Zul Hazmi Mohamed Khazin, 1983-, author,&#160;Norziha Megat Mohd. Zainuddin, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034784 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/> Web security : a WhiteHat perspective ent://SD_ILS/0/SD_ILS:835869 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Hanqing, Wu, author<br/>Author&#160;Hanqing, Wu, author,&#160;Zhao, Liz, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H363 2015<br/>Publisher&#160;CRC Press is an imprint of Taylor &amp; Francis ; Publishing House of Electronics Industry,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781466592612<br/> Computational network science : an algorithmic approach ent://SD_ILS/0/SD_ILS:838372 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Hexmoor, Henry, author<br/>Author&#160;Hexmoor, Henry, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H49 2015<br/>Publisher&#160;Morgan Kaufmann,<br/>Publication Date&#160;2015<br/>ISBN&#160;9780128008911<br/> Secure Messaging on the Internet ent://SD_ILS/0/SD_ILS:834018 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Oppliger, Rolf, author<br/>Author&#160;Oppliger, Rolf, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.73 O67 2014<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781608077175<br/> Advances in secure computing, internet services, and applications ent://SD_ILS/0/SD_ILS:841203 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Tripathy, B. K. editor<br/>Author&#160;Tripathy, B. K. editor,&#160;Acharjya, D. P. editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A38 2014 f<br/>Publisher&#160;Information Science Reference, an imprint of IGI Global,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466649408<br/> Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 ent://SD_ILS/0/SD_ILS:838076 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Carvey, Harlan A., author<br/>Author&#160;Carvey, Harlan A., author<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 C374 2014<br/>Edition&#160;Fourth edition<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2014<br/>ISBN&#160;9780124171572<br/> Classification of phishing websites using machine learning techniques ent://SD_ILS/0/SD_ILS:811599 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Hadi Zamani, 1987-<br/>Author&#160;Hadi Zamani, 1987-<br/>Format:&#160;Books<br/>Call Number&#160;CP 031145 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Trust, privacy, and security in digital business : 10th International conference, TrustBus 2013, Prague, Czech Republic, August 28-29, 2013 : proceedings ent://SD_ILS/0/SD_ILS:819648 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;TrustBus (Conference) (10th : 2013 : Prague, Czech Republic)<br/>Author&#160;TrustBus (Conference) (10th : 2013 : Prague, Czech Republic),&#160;Furnell, Steven, 1970-,&#160;Lambrinoudakis, Costas,&#160;L&oacute;pez, Javier<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 T78 2013<br/>Edition&#160;1st ed.<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2013<br/>ISBN&#160;9783642403422<br/> Wireless mobile internet security ent://SD_ILS/0/SD_ILS:807372 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Rhee, Man Young<br/>Author&#160;Rhee, Man Young<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.4885 R44 2013<br/>Edition&#160;2nd ed.<br/>Publisher&#160;John Wiley,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781118496534<br/> Comparative study of machine learning algorithms in website phishing detection ent://SD_ILS/0/SD_ILS:811223 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Almukhammed Kalybayev, 1988-<br/>Author&#160;Almukhammed Kalybayev, 1988-,&#160;Anazida Zainal, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A46 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Comparative study of machine learning algorithms in website phishing detection ent://SD_ILS/0/SD_ILS:811225 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Almukhammed Kalybayev, 1988-<br/>Author&#160;Almukhammed Kalybayev, 1988-<br/>Format:&#160;Books<br/>Call Number&#160;CP 030867 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Anti-phishing model for phishing websites detection: using pruning decision tree ent://SD_ILS/0/SD_ILS:811280 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Ahmed I. M. Abunadi, 1986-<br/>Author&#160;Ahmed I. M. Abunadi, 1986-,&#160;Anazida Zainal, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A36 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Anti-phishing model for phishing websites detection: using pruning decision tree ent://SD_ILS/0/SD_ILS:811281 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Ahmed I. M. Abunadi, 1986-<br/>Author&#160;Ahmed I. M. Abunadi, 1986-<br/>Format:&#160;Books<br/>Call Number&#160;CP 030865 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Classification of phishing websites using machine learning techniques ent://SD_ILS/0/SD_ILS:811592 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Hadi Zamani, 1987-<br/>Author&#160;Hadi Zamani, 1987-,&#160;Anazida Zainal, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 H33 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> The death of the Internet ent://SD_ILS/0/SD_ILS:806384 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Jakobsson, Markus.<br/>Author&#160;Jakobsson, Markus.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 D43 2012<br/>Publisher&#160;IEEE Press,<br/>Publication Date&#160;2012<br/>ISBN&#160;9781118062418<br/> Staying safe online in simple steps ent://SD_ILS/0/SD_ILS:816086 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Ballew, Joli<br/>Author&#160;Ballew, Joli<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 B355 2012<br/>Publisher&#160;Pearson,<br/>Publication Date&#160;2012<br/>ISBN&#160;9780273774730<br/> Awareness of information disclosure on social network sites ent://SD_ILS/0/SD_ILS:790290 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Kibirige, George William, 1981-<br/>Author&#160;Kibirige, George William, 1981-<br/>Format:&#160;Books<br/>Call Number&#160;CP 027801 ra<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) &ndash; Universiti Teknologi Malaysia, 2012<br/> Awareness of information disclosure on social network sites ent://SD_ILS/0/SD_ILS:790285 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Kibirige, George William, 1981-<br/>Author&#160;Kibirige, George William, 1981-,&#160;Shukor Abd. Razak, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K535 2012 raf<br/>Publication Date&#160;2012<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) &ndash; Universiti Teknologi Malaysia, 2012<br/> Security strategies in Web applications and social networking ent://SD_ILS/0/SD_ILS:764155 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Harwood, Mike<br/>Author&#160;Harwood, Mike<br/>Format:&#160;Books<br/>Call Number&#160;HM742 H37 2011<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780763791957<br/> Secure Java : for web application development ent://SD_ILS/0/SD_ILS:731610 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Bhargav, Abhay<br/>Author&#160;Bhargav, Abhay,&#160;Kumar, B. V. (Balepur Venkatanna), 1959-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.888 B434 2011<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781439823514<br/> Digital forensics for network, internet, and cloud computing : a forensic evidence guide for moving targets and data ent://SD_ILS/0/SD_ILS:640462 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Lillard, Terrence V.<br/>Author&#160;Lillard, Terrence V.,&#160;Lillard, Terrence<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 D54 2010<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781597495370<br/> Web intelligence and security : advances in data and text mining techniques for detecting and preventing terrorist activities on the web ent://SD_ILS/0/SD_ILS:812822 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;NATO Advanced Research Workshop on Web Intelligence and Security (2009 : En Bo&#7731;e&#7731;, Israel)<br/>Author&#160;NATO Advanced Research Workshop on Web Intelligence and Security (2009 : En Bo&#7731;e&#7731;, Israel),&#160;Last, Mark.,&#160;Kandel, Abraham.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.D343 N33 2010<br/>Publisher&#160;IOS Press,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781607506102<br/> Feature selection for nids based on GA-CFS technique ent://SD_ILS/0/SD_ILS:836031 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Vahab Iranmanesh<br/>Author&#160;Vahab Iranmanesh,&#160;Bharanidharan Shanmugam, Dr.,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 V36 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> Feature selection for nids based on GA-CFS technique ent://SD_ILS/0/SD_ILS:836032 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Vahab Iranmanesh<br/>Author&#160;Vahab Iranmanesh<br/>Format:&#160;Books<br/>Call Number&#160;CP 034159 ra<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> Network intrusion detection and prevention : concepts and techniques ent://SD_ILS/0/SD_ILS:334955 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Ali A. Ghorbani<br/>Author&#160;Ali A. Ghorbani,&#160;Lu, Wei,&#160;Tavallaee, Mahbod<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A43 2010<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780387887708<br/> Behavioural approach to rapid malcode signatures generation ent://SD_ILS/0/SD_ILS:627819 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Hanieh Rajabi, 1983-<br/>Author&#160;Hanieh Rajabi, 1983-,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;CP 019252 ra<br/>Publication Date&#160;2009<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Elektronik dan Telekomunikasi)) - Universiti Teknologi Malaysia, 2009<br/> Behavioural approach to rapid malcode signatures generation ent://SD_ILS/0/SD_ILS:627818 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Hanieh Rajabi, 1983-<br/>Author&#160;Hanieh Rajabi, 1983-,&#160;Muhammad Nadzir Marsono, supervisor,&#160;Fakulti Kejuruteraan Elektrik<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 H36 2009 raf<br/>Publication Date&#160;2009<br/>Thesis (Sarjana Kejuruteraan (Elektrik - Elektronik dan Telekomunikasi)) - Universiti Teknologi Malaysia, 2009<br/> Cyber risk insurance policy a proposed frameworkfor e-business in Malaysia ent://SD_ILS/0/SD_ILS:590571 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Lee, Siok Hwee, 1979-<br/>Author&#160;Lee, Siok Hwee, 1979-,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 019845 ra<br/>Publication Date&#160;2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/> Distributed systems security : issues, processes and solutions ent://SD_ILS/0/SD_ILS:282149 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Belapurkar, Abhijit<br/>Author&#160;Belapurkar, Abhijit<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 D57 2009<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780470519882<br/> Securing PHP web applications ent://SD_ILS/0/SD_ILS:319880 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Ballad, Tricia<br/>Author&#160;Ballad, Tricia,&#160;Ballad, Bill<br/>Format:&#160;Books<br/>Call Number&#160;QA76.73.P224 B34 2009<br/>Publisher&#160;Pearson Education,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780321534347<br/> Cyber risk insurance policy a proposed frameworkfor e-business in Malaysia ent://SD_ILS/0/SD_ILS:322219 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Lee, Siok Hwee, 1979-<br/>Author&#160;Lee, Siok Hwee, 1979-,&#160;Rabiah Ahmad, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;HQ784.I58 L43 2009 raf<br/>Publication Date&#160;2009<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2009<br/> Disappearing cryptography : information hiding : steganography and watermarking ent://SD_ILS/0/SD_ILS:335029 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Wayner, Peter<br/>Author&#160;Wayner, Peter<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 W39 2009<br/>Edition&#160;3rd ed.<br/>Publisher&#160;Morgan Kaufmann,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780123744791<br/> Your neighbor's secret life online : protecting families from Internet conmen, scammers and predators ent://SD_ILS/0/SD_ILS:210277 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Dean, Stephen<br/>Author&#160;Dean, Stephen<br/>Format:&#160;Books<br/>Call Number&#160;HV6773 D42 2008<br/>Edition&#160;1st ed.<br/>Publisher&#160;New Horizon Press,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780882822945<br/> Securing the information infrastructure ent://SD_ILS/0/SD_ILS:631867 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Kizza, Joseph Migga<br/>Author&#160;Kizza, Joseph Migga,&#160;Kizza, Florence Migga<br/>Format:&#160;Books<br/>Call Number&#160;HV6773 K59 2008<br/>Publisher&#160;Cybertech Pub.,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781599043791&#160;9781599043814<br/> ICT futures : delivering pervasive, real-time and secure services ent://SD_ILS/0/SD_ILS:288455 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Warren, Paul<br/>Author&#160;Warren, Paul,&#160;Davies, J.,&#160;Brown, David<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.5 I95 2008<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470997703<br/> The web application hacker's handbook : discovering and exploiting security flaws ent://SD_ILS/0/SD_ILS:286727 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Stuttard, Dafydd<br/>Author&#160;Stuttard, Dafydd,&#160;Pinto, Marcus, 1978-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 S78 2008<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470170779<br/> Securing VoIP networks : threats, vulnerabilities, and countermeasures ent://SD_ILS/0/SD_ILS:272280 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Thermos, Peter<br/>Author&#160;Thermos, Peter,&#160;Takanen, Ari. H.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.8865 H54 2007<br/>Publisher&#160;Pearson Education,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780321437341<br/> Host identity protocol (HIP) : towards the secure mobile internet ent://SD_ILS/0/SD_ILS:290085 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Gurtov, Andrei<br/>Author&#160;Gurtov, Andrei<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.4885 G87 2008<br/>Publisher&#160;John Wiley,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780470997901<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:353804 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Kahate, Atul<br/>Author&#160;Kahate, Atul<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 K33 2008<br/>Edition&#160;2nd ed.,<br/>Publisher&#160;Tata McGraw-Hill,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780070648234<br/> Crimeware : understanding new attacks and defenses ent://SD_ILS/0/SD_ILS:319886 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Jakobsson, Markus<br/>Author&#160;Jakobsson, Markus,&#160;Ramzan, Zulfikar<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 J344 2008<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780321501950<br/> Trust and new technologies : marketing and management on the Internet and mobile media ent://SD_ILS/0/SD_ILS:323829 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Kautonen, Teemu<br/>Author&#160;Kautonen, Teemu,&#160;Karjaluoto, Heikki<br/>Format:&#160;Books<br/>Call Number&#160;HF5415.1265 T78 2008<br/>Publisher&#160;Northampton, MA : Edward Elgar,<br/>Publication Date&#160;2008<br/>ISBN&#160;9781847205681<br/> Wireless internet security : architecture and protocols ent://SD_ILS/0/SD_ILS:337715 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Kempf, James, 1952-<br/>Author&#160;Kempf, James, 1952-<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.4885 K45 2008<br/>Publisher&#160;Cambridge University Press,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780521887830<br/> Internet security : hacking, counterhacking, and society ent://SD_ILS/0/SD_ILS:195073 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Himma, Kenneth Einar<br/>Author&#160;Himma, Kenneth Einar<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 H55 2007<br/>Publisher&#160;Jones and Barlett,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780763735364<br/> Synchronizing internet protocol security (SIPSec) ent://SD_ILS/0/SD_ILS:209758 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Shoniregun, Charles A.<br/>Author&#160;Shoniregun, Charles A.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 S56 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780387327242<br/><a href="http://dx.doi.org/10.1007/978-0-387-68569-4">Fulltext</a><br/> An intrusion detection system (IDS) for internet network ent://SD_ILS/0/SD_ILS:156938 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Mohd. Fauzan Safiee<br/>Author&#160;Mohd. Fauzan Safiee,&#160;Syarifah Hafizah Syed Ariffin<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M43 2007<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2007<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=48865">Preview</a><br/>Thesis (Sarjana Kejuruteraan (Elektrikal-Elektronik dan Telecommunication)) - Universiti Teknologi Malaysia, 2007<br/> Practical internet security ent://SD_ILS/0/SD_ILS:158413 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Vacca, John R.<br/>Author&#160;Vacca, John R.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 V324 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780387405339<br/><a href="http://dx.doi.org/10.1007/978-0-387-29844-3">FullText</a><br/> An intrusion detection system (IDS) for internet network ent://SD_ILS/0/SD_ILS:568228 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Mohd. Fauzan Safiee<br/>Author&#160;Mohd. Fauzan Safiee,&#160;Syarifah Hafizah Syed Ariffin<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 015165<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2007<br/>Thesis (Sarjana Kejuruteraan (Elektrikal-Elektronik dan Telecommunication)) - Universiti Teknologi Malaysia, 2007<br/> Secure e-government web services ent://SD_ILS/0/SD_ILS:301214 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Mitrakas, Andreas<br/>Author&#160;Mitrakas, Andreas<br/>Format:&#160;Books<br/>Call Number&#160;JK468.A8 S43 2007<br/>Publisher&#160;IGI Global,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781599041384<br/> Hackers challenge 3 : 20 brand-new forensic scenarios &amp; solutions ent://SD_ILS/0/SD_ILS:100571 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Pollino, David<br/>Author&#160;Pollino, David<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H324 2006<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780072263046<br/> How personal and internet security works ent://SD_ILS/0/SD_ILS:101895 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Gralla, Preston<br/>Author&#160;Gralla, Preston<br/>Format:&#160;Books<br/>Call Number&#160;HV6773 G72 2006<br/>Publisher&#160;Que Publishing,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780789735539<br/> Understanding Voice over IP security ent://SD_ILS/0/SD_ILS:91890 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Johnson, Alan B.<br/>Author&#160;Johnson, Alan B.,&#160;Piscitello, David M.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.8865 J63 2006<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781596930506<br/> (SCTS) Symantec Certified Technical Specialist small business security study guide ent://SD_ILS/0/SD_ILS:567365 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Alston, Nik<br/>Author&#160;Alston, Nik,&#160;Chapple, Mike,&#160;Hausman, Kalani Kirk<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 8214<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780321349941<br/> Active firewall mechanism as a comprehensive approach towards minimizing internet threats ent://SD_ILS/0/SD_ILS:468105 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Cahyo Crysdian<br/>Author&#160;Cahyo Crysdian,&#160;Abdul Hanan Abdullah<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 C33 2006<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Thesis (Doktor Falsafah (Fakulti Kejuteraan Elektrik)) - Universiti Teknologi Malaysia, 2007<br/> Extrusion detection : security monitoring for internal intrusions ent://SD_ILS/0/SD_ILS:470452 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Bejtlich, Richard<br/>Author&#160;Bejtlich, Richard<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 B44 2006<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780321349965<br/> Windows forensics : the field guide for corporate computer investigations ent://SD_ILS/0/SD_ILS:277857 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Steel, Chad<br/>Author&#160;Steel, Chad<br/>Format:&#160;Books<br/>Call Number&#160;HV8079.C65 S84 2006<br/>Publisher&#160;Wiley Pub.,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780470038628<br/> Professional pen testing for Web applications ent://SD_ILS/0/SD_ILS:132813 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Andreu, Andres, 1968-<br/>Author&#160;Andreu, Andres, 1968-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A525 2006<br/>Publisher&#160;Wiley Pub.,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780471789666<br/> (SCTS) Symantec Certified Technical Specialist : small business security study guide ent://SD_ILS/0/SD_ILS:138464 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Alston, Nik<br/>Author&#160;Alston, Nik,&#160;Chapple, Mike,&#160;Hausman, Kalani Kirk<br/>Format:&#160;Books<br/>Call Number&#160;QA76.3 A47 2006<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780321349941<br/> The Symantec guide to home internet security ent://SD_ILS/0/SD_ILS:138512 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Conry-Murray, Andrew<br/>Author&#160;Conry-Murray, Andrew,&#160;Weafer, Vincent<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C664 2006<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780321356413<br/> Securing the web ent://SD_ILS/0/SD_ILS:8582 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Video Education Australasia<br/>Author&#160;Video Education Australasia<br/>Format:&#160;Visual Materials<br/>Call Number&#160;CP 015502<br/>Publisher&#160;VEA,<br/>Publication Date&#160;2006<br/> Security management, integrity, and internal control in information systems : IFIP TC-11 WG 11.1 &amp; WG 11.5 Joint Working Conference ent://SD_ILS/0/SD_ILS:116433 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;IFIP TC-11 WG 11.1 &amp; WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems (1st : 2005 : Fairfax, Va.)<br/>Author&#160;IFIP TC-11 WG 11.1 &amp; WG 11.5 Joint Working Conference on Security Management, Integrity, and Internal Control in Information Systems (1st : 2005 : Fairfax, Va.),&#160;Dowland, Paul<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S427 2005<br/>Publisher&#160;Springer Verlag,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780387298269<br/> Scalable and secure internet services and architecture ent://SD_ILS/0/SD_ILS:156614 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Xu, Chengzhong<br/>Author&#160;Xu, Chengzhong<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 X82 2005<br/>Publisher&#160;Chapman &amp; Hall,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781584883777<br/> The executive guide to information security : threats, challenges, and solutions ent://SD_ILS/0/SD_ILS:430485 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Egan, Mark<br/>Author&#160;Egan, Mark<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 E32 2005<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780321304513<br/> AAA and network security for mobile access : radius, diameter, EAP, PKI, and IP mobility ent://SD_ILS/0/SD_ILS:440718 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Nakhjiri, Madjid<br/>Author&#160;Nakhjiri, Madjid,&#160;Nakhjiri, Mahsa<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.4885 N34 2005<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780470011942<br/> Web based energy information and control systems : ase studies and applications ent://SD_ILS/0/SD_ILS:143253 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Capehart, B. L. (Barney L.)<br/>Author&#160;Capehart, B. L. (Barney L.),&#160;Capehart, Lynne C.<br/>Format:&#160;Books<br/>Call Number&#160;TJ163.2 W42 2005<br/>Publisher&#160;Fairmont Press,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780849338984<br/> Synchronizing e-security ent://SD_ILS/0/SD_ILS:370217 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Williams, Godfried<br/>Author&#160;Williams, Godfried<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 W54 2004<br/>Publisher&#160;Kluwer Academic Pubs,<br/>Publication Date&#160;2004<br/>ISBN&#160;9781402076466<br/> Two layer image password for text encryption system ent://SD_ILS/0/SD_ILS:602037 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Ashok Muthu<br/>Author&#160;Ashok Muthu<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 013254<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2004<br/> Network firewall development with multilevel security policy ent://SD_ILS/0/SD_ILS:395124 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Cahyo Crysdian<br/>Author&#160;Cahyo Crysdian,&#160;Abdul Hanan Abdullah,&#160;International Conference on Computer Theory and Applications (14th. : 2004 : Egypt)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C334 2004<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/> Two layer image password for text encryption system ent://SD_ILS/0/SD_ILS:379512 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Ashok Muthu<br/>Author&#160;Ashok Muthu<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A83 2004<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2004<br/>Project Paper (Sarjana Muda Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2004<br/> Principles and practice of information security : protecting computers from hackers and lawyers ent://SD_ILS/0/SD_ILS:389219 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Volonino, Linda<br/>Author&#160;Volonino, Linda,&#160;Robinson, Stephen R.,&#160;Volonino, Charles P.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 V64 2004<br/>Publisher&#160;Pearson/Prentice Hall,<br/>Publication Date&#160;2004<br/>ISBN&#160;9780131840270<br/> Defense and detection strategies against Internet worms ent://SD_ILS/0/SD_ILS:417839 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Nazario, Jose<br/>Author&#160;Nazario, Jose<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N394 2004<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2004<br/>ISBN&#160;9781580535373<br/> Designing network security ent://SD_ILS/0/SD_ILS:135032 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Kaeo, Merike<br/>Author&#160;Kaeo, Merike<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 K34 2004<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Cisco Press,<br/>Publication Date&#160;2004<br/>ISBN&#160;9781587051173<br/> Security + guide to network security fundamentals ent://SD_ILS/0/SD_ILS:364391 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Cisco Learning Institute<br/>Author&#160;Cisco Learning Institute,&#160;Campbell, Paul,&#160;Calvert, Ben,&#160;Boswell, Steven<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C57 2003<br/>Publisher&#160;Thomson Learning,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780619212940<br/> Mastering Web services security ent://SD_ILS/0/SD_ILS:386444 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Hartman, Bret<br/>Author&#160;Hartman, Bret<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M374 2003<br/>Publisher&#160;Wiley Technology Pub.,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780471267164<br/> Security + guide to network security fundamentals ent://SD_ILS/0/SD_ILS:602181 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Cisco Learning Institute<br/>Author&#160;Cisco Learning Institute,&#160;Campbell, Paul,&#160;Calvert, Ben,&#160;Boswell, Steven<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 3021<br/>Publisher&#160;Thomson Learning,<br/>Publication Date&#160;2003<br/> An authentication method for secure internet transaction using smart card and secure coprocessor ent://SD_ILS/0/SD_ILS:606230 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Mustafa A. Ayad<br/>Author&#160;Mustafa A. Ayad,&#160;Prakash, V.,&#160;N. K. Noordin,&#160;W. A. Wan Adnan<br/>Format:&#160;Computer file<br/>Publication Date&#160;2003<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?id=15488">Full text</a><br/> Network intrusion detection ent://SD_ILS/0/SD_ILS:386349 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Northcutt, Stephen<br/>Author&#160;Northcutt, Stephen,&#160;Novak, Judy<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N673 2003<br/>Edition&#160;3rd ed.<br/>Publisher&#160;New Riders,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780735712652<br/> Financial cryptography : 6th International Conference, FC 2002 Southampton, Bermuda, March 11-14, 2002 : revised papers ent://SD_ILS/0/SD_ILS:397182 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;International conference Financial cryptography, (6th : 2002 : Southamton, Bermuda Islands)<br/>Author&#160;International conference Financial cryptography, (6th : 2002 : Southamton, Bermuda Islands),&#160;Blaze, Matt<br/>Format:&#160;Books<br/>Call Number&#160;HG1710 F56 2003<br/>Publisher&#160;Springer-Verlag,<br/>Publication Date&#160;2003<br/>ISBN&#160;9783540006466<br/> Enforcing multilevel security policies for network firewall ent://SD_ILS/0/SD_ILS:352173 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Cahyo Crysdian<br/>Author&#160;Cahyo Crysdian,&#160;Abdul Hanan Abdullah,&#160;Mohd. Aizaini Maarof,&#160;International Conference Information Technology in Asia (2003 : Kuching, Sarawak)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C34 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> A Benchmarking methodology for NPU-based stateful firewall ent://SD_ILS/0/SD_ILS:352612 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Lee, Eng Kean<br/>Author&#160;Lee, Eng Kean,&#160;Sulaiman Mohd. Nor,&#160;IEEE Asia Pacific Conference on Communication APCC 2003 (9th : 2003 : Penang)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 L44 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Internet security : cryptographic principles, algorithms, and protocols ent://SD_ILS/0/SD_ILS:340235 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Rhee, Man Young<br/>Author&#160;Rhee, Man Young<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 R44 2003<br/>Publisher&#160;J. Wiley,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780470852859<br/> Network security : a beginner's guide ent://SD_ILS/0/SD_ILS:347401 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Maiwald, Eric<br/>Author&#160;Maiwald, Eric<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M35 2003<br/>Edition&#160;2nd ed.<br/>Publisher&#160;McGraw-Hill/Osborne,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780072229578<br/> Access controlling firewall using Bell-LaPadula security model ent://SD_ILS/0/SD_ILS:353549 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Cahyo Crysdian<br/>Author&#160;Cahyo Crysdian,&#160;Abdul Hanan Abdullah,&#160;Quality in Research Seminar (6th : 2003 : Indonesia)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 C33 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/> Cryptography and network security ent://SD_ILS/0/SD_ILS:354853 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Kahate, Atul<br/>Author&#160;Kahate, Atul<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 K33 2003<br/>Publisher&#160;Tata McGraw-Hill,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780070494831<br/> Practical Unix and internet security ent://SD_ILS/0/SD_ILS:334147 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Garfinkel, Simson<br/>Author&#160;Garfinkel, Simson,&#160;Spafford, Gene,&#160;Schwartz, Alan<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 G37 2003<br/>Edition&#160;3rd ed.<br/>Publisher&#160;O'Reilly &amp; Associates,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780596003234<br/> Hacking exposed J2EE &amp; Java : developing secure applications with Java technology ent://SD_ILS/0/SD_ILS:356555 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Buege, Brian<br/>Author&#160;Buege, Brian,&#160;Taylor, Art, 1958-,&#160;Layman, Randy<br/>Format:&#160;Books<br/>Call Number&#160;QA76.73.J38 B834 2002<br/>Publisher&#160;McGraw-Hill/Osborne,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780072225655<br/> Securing E-business systems : a guide for managers and executives ent://SD_ILS/0/SD_ILS:370726 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Braithwaite, Timothy, 1942-<br/>Author&#160;Braithwaite, Timothy, 1942-<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 B72 2002<br/>Publisher&#160;John Wiley,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780471072980<br/> Internet security and firewalls ent://SD_ILS/0/SD_ILS:386675 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Preetham, V. V.<br/>Author&#160;Preetham, V. V.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P73 2002<br/>Publisher&#160;Premier Press,<br/>Publication Date&#160;2002<br/>ISBN&#160;9781931841979<br/> CoursePrep ent://SD_ILS/0/SD_ILS:592390 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Cioara, Jeremy<br/>Author&#160;Cioara, Jeremy<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 2268<br/>Publisher&#160;Course Technology/Thomson ,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780619062064<br/> Internet and wireless security ent://SD_ILS/0/SD_ILS:475589 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Temple, Robert, 1963-<br/>Author&#160;Temple, Robert, 1963-,&#160;Regnault, John<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 I55 2002<br/>Publisher&#160;Institution of Electrical Engineers,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780852961971<br/> Packet filtering personal firewall based on microsoft's internet protocol helper API ent://SD_ILS/0/SD_ILS:326714 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Abdul Hanan Abdullah<br/>Author&#160;Abdul Hanan Abdullah,&#160;Lau, Sei Ping,&#160;International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A32 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Cryptographic applications in database security : a survey study ent://SD_ILS/0/SD_ILS:326720 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.,&#160;Piper, Fred,&#160;Norbik Bashah Idris,&#160;Ciechanowicz, Zbigniew 'Chez',&#160;International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Z344 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Implementation of Brands' digital cash system in TCP/IP networking environment ent://SD_ILS/0/SD_ILS:327744 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Teo, Pock Chueng<br/>Author&#160;Teo, Pock Chueng,&#160;Ahmad Zuri Sha'ameri,&#160;Zulkarnain Mohd. Yusof,&#160;International Symposium on Information and Communications Technologies (2002 : Selangor)<br/>Format:&#160;Books<br/>Call Number&#160;HG1710 T46 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> File access permission change detection using immunological negative selection approach ent://SD_ILS/0/SD_ILS:328443 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Mohd. Yazid Idris<br/>Author&#160;Mohd. Yazid Idris,&#160;Abdul Hanan Abdullah,&#160;Mohd. Aizaini Maarof,&#160;International Arab Conference on Information Technology (2002 : University of Qatar, Doha, Qatar)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M92 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Authentication protocol : methods review ent://SD_ILS/0/SD_ILS:326821 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Cahyo Crysdian<br/>Author&#160;Cahyo Crysdian,&#160;Abdul Hanan Abdullah,&#160;International Technical Conference on Circuits, Systems, Computer and Communications (2002 : Thailand)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C35 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> MCSE guide to microsoft internet security and acceleration ( ISA ) server 2000 /Jeremy Cioara ent://SD_ILS/0/SD_ILS:328105 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Cioara, Jeremy<br/>Author&#160;Cioara, Jeremy<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 C56 2002<br/>Publisher&#160;Course Technology/Thomson ,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780619062064<br/> Security planning and disaster recovery ent://SD_ILS/0/SD_ILS:341667 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Maiwald, Eric<br/>Author&#160;Maiwald, Eric,&#160;Sieglein, William<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M36 2002<br/>Publisher&#160;McGraw-Hill Osborne,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780072224634<br/> Internet and intranet security ent://SD_ILS/0/SD_ILS:303203 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Oppliger, Rolf<br/>Author&#160;Oppliger, Rolf<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 O67 2002<br/>Edition&#160;2nd ed.<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2002<br/>ISBN&#160;9781580531665<br/> Online computer shop ent://SD_ILS/0/SD_ILS:168620 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Chan, Kian Koon<br/>Author&#160;Chan, Kian Koon<br/>Format:&#160;Books<br/>Call Number&#160;HF5415.1265 C54 2001<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/>Project Paper (Bachelor of Computer Science) - Universiti Teknologi Malaysia, 2001<br/> Network intrusion detection : an analyst's handbook ent://SD_ILS/0/SD_ILS:159454 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Northcutt, Stephen<br/>Author&#160;Northcutt, Stephen,&#160;Novak, Judy,&#160;McLachlan, Donald<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N673 2000<br/>Edition&#160;2nd ed.<br/>Publisher&#160;New Riders,<br/>Publication Date&#160;2001<br/>ISBN&#160;9780735710085<br/> Security and privacy for e-commerce ent://SD_ILS/0/SD_ILS:170004 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Ghosh, Anup K.<br/>Author&#160;Ghosh, Anup K.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 G57 2001<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2001<br/>ISBN&#160;9780471384212<br/> Network security : a beginner's guide ent://SD_ILS/0/SD_ILS:340640 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Maiwald, Eric<br/>Author&#160;Maiwald, Eric<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M35 2001<br/>Publisher&#160;McGraw-Hill/Osborne,<br/>Publication Date&#160;2001<br/>ISBN&#160;9780072133240<br/> Non-repudiation in electronic commerce ent://SD_ILS/0/SD_ILS:317073 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Zhou, Jianying<br/>Author&#160;Zhou, Jianying<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 Z49 2001<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2001<br/>ISBN&#160;9781580532471<br/> Agent technology approach for proxy server ent://SD_ILS/0/SD_ILS:331108 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Fazidah Othman<br/>Author&#160;Fazidah Othman,&#160;Abdul Hanan Abdullah,&#160;Malaysian Science and Technology Congress (2000 : Genting Highlands, Pahang)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 F39 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001&#160;2000<br/> The complete guide to internet security ent://SD_ILS/0/SD_ILS:137665 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Merkow, Mark S.<br/>Author&#160;Merkow, Mark S.,&#160;Breithaupt, Jim<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 M47 2000<br/>Publisher&#160;Amacom,<br/>Publication Date&#160;2000<br/>ISBN&#160;9780814470701<br/> Electronic commerce relationships : trust by design ent://SD_ILS/0/SD_ILS:141849 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Keen, Peter<br/>Author&#160;Keen, Peter<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 E53 2000<br/>Publisher&#160;Prentice Hall,<br/>Publication Date&#160;2000<br/>ISBN&#160;9780130170378<br/> iPRO agent ent://SD_ILS/0/SD_ILS:146591 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Fazidah Othman<br/>Author&#160;Fazidah Othman,&#160;Abdul Hanan Abdullah,&#160;Malaysian Science and Technology Congress (2000 : Genting Highlands, Pahang)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 F38 2000<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2000<br/> The complete guide to Internet security ent://SD_ILS/0/SD_ILS:875639 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Merkow, Mark S.<br/>Author&#160;Merkow, Mark S.,&#160;Breithaupt, Jim, 1955-<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875 .I57 M47 2000<br/>Publication Date&#160;2000<br/>ISBN&#160;9780814470701<br/> Penganalisa leksikal dan sintaktik di dalam antaramuka dinding api ent://SD_ILS/0/SD_ILS:102708 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Md. Asri Ngadi<br/>Author&#160;Md. Asri Ngadi<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M37 1999<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1999<br/>Tesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 1999<br/> Investigation FKE's network security using firewall ent://SD_ILS/0/SD_ILS:116695 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Low, Ho Chit<br/>Author&#160;Low, Ho Chit<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 L68 1999 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1999<br/> Web pages/server for medical electronics : medical surgery and emergency ... [et al.] ent://SD_ILS/0/SD_ILS:13300 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Lee, Chai Hong<br/>Author&#160;Lee, Chai Hong,&#160;Lee, Kong Aik,&#160;Logeswari M. Shanmugam,&#160;Low, Ho Chit,&#160;Sivalingam R. Savassamy<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 9737<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1999<br/>Project Paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1999<br/> Network intrusion detection : an analyst's handbook ent://SD_ILS/0/SD_ILS:155582 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Northcutt, Stephen<br/>Author&#160;Northcutt, Stephen<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 N673 1999<br/>Publisher&#160;New Riders,<br/>Publication Date&#160;1999<br/>ISBN&#160;9780735708686<br/> Designing network security ent://SD_ILS/0/SD_ILS:129261 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Kaeo, Merike<br/>Author&#160;Kaeo, Merike<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 K34 1999<br/>Publisher&#160;Cisci Press,<br/>Publication Date&#160;1999<br/>ISBN&#160;9781578700431<br/> Proxy system : analysis in concept, design and implementation ... ent://SD_ILS/0/SD_ILS:7654 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Rabiah Ahmad, Dr.<br/>Author&#160;Rabiah Ahmad, Dr.,&#160;Rosely Kumoi,&#160;Suriati Sadimon,&#160;Zakiah Hussain<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 9138 ra<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1999<br/>Thesis (MSc in Information Security) - University of London, 1998<br/> Rangkaian berkelajuan tinggi di MSC ent://SD_ILS/0/SD_ILS:7863 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Kamarul Zamri Mohd. Zam<br/>Author&#160;Kamarul Zamri Mohd. Zam,&#160;Osman Aripin,&#160;Mohammad Rizal Julaihi,&#160;Lee, Ak Jenang,&#160;Mohd. Bakaruddin Abu Bakar<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 9152 ra<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1998<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknolo gi Malaysia, 1998<br/> E-commerce security strategies : protecting the enterprise ent://SD_ILS/0/SD_ILS:136356 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Cameron, Debra<br/>Author&#160;Cameron, Debra<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 C353 1998 f<br/>Publisher&#160;Computer Technology Research,<br/>Publication Date&#160;1998<br/>ISBN&#160;9781566070577<br/> E-commerce security : weak links, best defenses ent://SD_ILS/0/SD_ILS:114354 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Ghosh, Anup K.<br/>Author&#160;Ghosh, Anup K.<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 G56 1998<br/>Publisher&#160;John Wiley,<br/>Publication Date&#160;1998<br/>ISBN&#160;9780471192237<br/> Proxy system : analysis in concept, design and implementation ent://SD_ILS/0/SD_ILS:490082 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Rabiah Ahmad, Dr.<br/>Author&#160;Rabiah Ahmad, Dr.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 R33 1998 raf<br/>Publisher&#160;University of London,<br/>Publication Date&#160;1998<br/>Thesis (MSc in Information Security) - University of London, 1998<br/> Firewall : is it important ent://SD_ILS/0/SD_ILS:472198 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Tan, Wei Hong<br/>Author&#160;Tan, Wei Hong<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 T83 1998 raf<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1998<br/>Project paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1998<br/> Intranet security : stories from the trenches ent://SD_ILS/0/SD_ILS:481417 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;McCarthy, Linda<br/>Author&#160;McCarthy, Linda<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I6 M33 1998<br/>Publisher&#160;Sun Microsystems Press,<br/>Publication Date&#160;1998<br/>ISBN&#160;9780138947590<br/> Internet security : risk analysis, strategies and firewalls ent://SD_ILS/0/SD_ILS:615848 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Kyas, Othmar<br/>Author&#160;Kyas, Othmar<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 427<br/>Publisher&#160;International Thomson Computer Press,<br/>Publication Date&#160;1997<br/>ISBN&#160;9781850323020<br/> Intranet firewalls : planning &amp; implementing your network security system ent://SD_ILS/0/SD_ILS:456836 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Fuller, Scott<br/>Author&#160;Fuller, Scott,&#160;Pagan, Kevin<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 F84 1996<br/>Publisher&#160;Ventana Communications Group, Inc.,<br/>Publication Date&#160;1997<br/>ISBN&#160;9781566045063<br/> Digital cash : commerce on the net ent://SD_ILS/0/SD_ILS:468154 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Wayner, Peter<br/>Author&#160;Wayner, Peter<br/>Format:&#160;Books<br/>Call Number&#160;HG1710 W39 1997<br/>Edition&#160;2nd ed<br/>Publisher&#160;AP Professional,<br/>Publication Date&#160;1997<br/>ISBN&#160;9780127887722<br/> Internet security : risk analysis, strategies and firewalls ent://SD_ILS/0/SD_ILS:462849 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Kyas, Othmar<br/>Author&#160;Kyas, Othmar<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 K92 1997<br/>Publisher&#160;International Thomson Computer Press,<br/>Publication Date&#160;1997<br/>ISBN&#160;9781850323020<br/> Digital crime : policing the cybernation ent://SD_ILS/0/SD_ILS:487305 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Barrett, Neil<br/>Author&#160;Barrett, Neil<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 B36 1997<br/>Publisher&#160;Kogan Page,<br/>Publication Date&#160;1997<br/>ISBN&#160;9780749420970<br/> Internet security : professional reference ent://SD_ILS/0/SD_ILS:94244 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Atkins, Derek<br/>Author&#160;Atkins, Derek<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875 I57 1997<br/>Edition&#160;2nd ed.<br/>Publisher&#160;New Riders Pub.,<br/>Publication Date&#160;1997<br/>ISBN&#160;9781562057602<br/> Internet security for business ent://SD_ILS/0/SD_ILS:112376 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Bernstein, Terry<br/>Author&#160;Bernstein, Terry<br/>Format:&#160;Books<br/>Call Number&#160;HD30.38 I57 1996<br/>Publisher&#160;John Wiley,<br/>Publication Date&#160;1996<br/>ISBN&#160;9780471137528<br/> Network and Internet security ent://SD_ILS/0/SD_ILS:424640 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Ahuja, Vijay<br/>Author&#160;Ahuja, Vijay<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A38 1996<br/>Publisher&#160;AP Professional,<br/>Publication Date&#160;1996<br/>ISBN&#160;9780120455959<br/> Internet commerce ent://SD_ILS/0/SD_ILS:453572 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Dahl, Andrew<br/>Author&#160;Dahl, Andrew,&#160;Lesnick, Leslie<br/>Format:&#160;Books<br/>Call Number&#160;HF5415.1265 D33 1996<br/>Publisher&#160;New Riders,<br/>Publication Date&#160;1996<br/>ISBN&#160;9781562054960<br/> What you need to know : bandits on the information superhighway ent://SD_ILS/0/SD_ILS:477227 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Barrett, Daniel J.<br/>Author&#160;Barrett, Daniel J.<br/>Format:&#160;Books<br/>Call Number&#160;HV6773 B37 1992<br/>Publisher&#160;O'Reilly &amp; Associates,<br/>Publication Date&#160;1996<br/>ISBN&#160;9781565921566<br/> Internet firewalls and network security ent://SD_ILS/0/SD_ILS:368519 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Hare, R. Christopher E.<br/>Author&#160;Hare, R. Christopher E.,&#160;Siyan, Karanjit S.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 H27 1995<br/>Publisher&#160;New Riders Pub.,<br/>Publication Date&#160;1995<br/>ISBN&#160;9781562054373<br/> The computer privacy handbook ent://SD_ILS/0/SD_ILS:410431 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Bacard, Andre<br/>Author&#160;Bacard, Andre<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B32 1995<br/>Publisher&#160;Peachpit Press,<br/>Publication Date&#160;1995<br/>ISBN&#160;9781566091718<br/> Implementing internet security ent://SD_ILS/0/SD_ILS:458580 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Cooper, Frederic J.<br/>Author&#160;Cooper, Frederic J.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 I46 1995<br/>Publisher&#160;New Riders,<br/>Publication Date&#160;1995<br/>ISBN&#160;9781562054717<br/> Firewalls and Internet security : repelling the wily hacker ent://SD_ILS/0/SD_ILS:410439 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Cheswick, William R.<br/>Author&#160;Cheswick, William R.,&#160;Bellovin, Steven M.<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 C43 1994<br/>Publisher&#160;Addison-Wesley,<br/>Publication Date&#160;1994<br/>ISBN&#160;9780201633573<br/> Computer auditing, security and internal control manual ent://SD_ILS/0/SD_ILS:450650 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Kuong, Javier F.<br/>Author&#160;Kuong, Javier F.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 K86 1987<br/>Publisher&#160;Prentice-Hall,<br/>Publication Date&#160;1987<br/>ISBN&#160;9780131629677<br/> A SECURE MODEL OF IMAGE-BASED AUTHENTICATION ON ONLINE BANKING ent://SD_ILS/0/SD_ILS:844081 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Ratna Dewi Ibrahim, 1977-, author<br/>Author&#160;Ratna Dewi Ibrahim, 1977-, author,&#160;Mohd. Shahidan Abdullah, Dr., supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;HG1708.7 R38 2014 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> ONLINE BANKING SECURITY PERCEPTION AND AWEARNESS OF ONLINE TRANSCTIONS ent://SD_ILS/0/SD_ILS:839053 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Mohammed A. Sabri Alrawi, 1981-, author<br/>Author&#160;Mohammed A. Sabri Alrawi, 1981-, author,&#160;Azizah Abd. Manaf, Prof.Dr., supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;HG1708.7 M643 2012 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> ONLINE BANKING SECURITY PERCEPTION AND AWEARNESS OF ONLINE TRANSCTIONS ent://SD_ILS/0/SD_ILS:839054 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Mohammed A. Sabri Alrawi, 1981-, author<br/>Author&#160;Mohammed A. Sabri Alrawi, 1981-, author,&#160;Azizah Abd. Manaf, Prof.Dr., supervisor<br/>Format:&#160;Books<br/>Call Number&#160;CP 034112 ra<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> SECURITY IN VOICE OVER INTERNET PROTOCOL (VOIP) : IMPLEMENTATION AND ANALYSIS ent://SD_ILS/0/SD_ILS:839589 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Maimun Rizal, 1980-, author<br/>Author&#160;Maimun Rizal, 1980-, author,&#160;Abdul Hanan Abdullah, Prof.Dr., supervisor,&#160;Saiful Adli Ismail,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.8865 M35 2007<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> PRESERVING PRIVACY IN SOCIAL NETWORK SITES USING INTEGRATED ANONYMITY ALGORITHM ent://SD_ILS/0/SD_ILS:840459 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Sanaz Kavianpour, 1984-, author<br/>Author&#160;Sanaz Kavianpour, 1984-, author,&#160;Zuraini Ismail, Assoc.Prof.Dr., supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 S26 2010 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> PRESERVING PRIVACY IN SOCIAL NETWORK SITES USING INTEGRATED ANONYMITY ALGORITHM ent://SD_ILS/0/SD_ILS:840460 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Sanaz Kavianpour, 1984-, author<br/>Author&#160;Sanaz Kavianpour, 1984-, author,&#160;Zuraini Ismail, Assoc.Prof.Dr., supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 034008 ra<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> DNS PACKET CAPTURING AND ANALYZING SYSTEM ent://SD_ILS/0/SD_ILS:840483 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Babak Abdollahi Khameneh, 1983-, author<br/>Author&#160;Babak Abdollahi Khameneh, 1983-, author,&#160;Nurulhuda Firdaus Mohd. Azmi, Dr., supervisor,&#160;Sekolah Informatik Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 B33 2013 raf<br/>Thesis&#160;Sarjana Kejuruteraan Perisian<br/> DNS PACKET CAPTURING AND ANALYZING SYSTEM ent://SD_ILS/0/SD_ILS:840485 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Babak Abdollahi Khameneh, 1983-, author<br/>Author&#160;Babak Abdollahi Khameneh, 1983-, author,&#160;Nurulhuda Firdaus Mohd. Azmi, Dr., supervisor,&#160;Sekolah Informatik Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034038 ra<br/>Thesis&#160;Sarjana Kejuruteraan Perisian<br/> A SECURE MODEL OF IMAGE-BASED AUTHENTICATION ON ONLINE BANKING ent://SD_ILS/0/SD_ILS:844082 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Ratna Dewi Ibrahim, 1977-, author<br/>Author&#160;Ratna Dewi Ibrahim, 1977-, author,&#160;Mohd. Shahidan Abdullah, Dr., supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 034516 ra<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> PRIVACY INFORMATION DISCLOSURE ON FACEBOOK (A CASE STUDY IN INSTITUT TEKNOLOGI PERAK) ent://SD_ILS/0/SD_ILS:859417 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Munaliza Jaimun, 1980-, author<br/>Author&#160;Munaliza Jaimun, 1980-, author,&#160;Rasimah Che Mohd. Yusoff, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;HM742 M86 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> PRIVACY INFORMATION DISCLOSURE ON FACEBOOK (A CASE STUDY IN INSTITUT TEKNOLOGI PERAK) ent://SD_ILS/0/SD_ILS:859418 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Munaliza Jaimun, 1980-, author<br/>Author&#160;Munaliza Jaimun, 1980-, author,&#160;Rasimah Che Mohd. Yusoff, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034765 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> ENHANCED E-COMMERCE RISK MANAGEMENT FRAMEWORK ent://SD_ILS/0/SD_ILS:859485 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Zeinab Najafi Arab, 1987-, author<br/>Author&#160;Zeinab Najafi Arab, 1987-, author,&#160;Norziha Megat Mohd. Zainuddin, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 Z45 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/> ENHANCED E-COMMERCE RISK MANAGEMENT FRAMEWORK ent://SD_ILS/0/SD_ILS:859486 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Zeinab Najafi Arab, 1987-, author<br/>Author&#160;Zeinab Najafi Arab, 1987-, author,&#160;Norziha Megat Mohd. Zainuddin, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034782 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/> SECURITY AWARENESS FACTORS INFLUENCING CUSTOMERS&rsquo; BEHAVIOR IN ONLINE SERVICES ent://SD_ILS/0/SD_ILS:859493 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Moaad Abdulrahman M. Khalil, 1989-, author<br/>Author&#160;Moaad Abdulrahman M. Khalil, 1989-, author,&#160;Mohd. Shahidan Abdullah, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 M633 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> SECURITY AWARENESS FACTORS INFLUENCING CUSTOMERS&rsquo; BEHAVIOR IN ONLINE SERVICES ent://SD_ILS/0/SD_ILS:859494 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Moaad Abdulrahman M. Khalil, 1989-, author<br/>Author&#160;Moaad Abdulrahman M. Khalil, 1989-, author,&#160;Mohd. Shahidan Abdullah, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034774 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> SECURE MODEL AWARENESS FOR MOBILE PHONE BANKING APPLICATIONS AMONG USERS ent://SD_ILS/0/SD_ILS:860840 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;al-Hadhrami, Taqi Mohammed Ali, 1989-, author<br/>Author&#160;al-Hadhrami, Taqi Mohammed Ali, 1989-, author,&#160;Mohd. Shahidan Abdullah, Assoc.Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034795 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) -Universiti Teknologi Malaysia, 2015<br/> INFORMATION PRIVACY CONCERNS MODEL FOR INTERNET USERS IN MARITIME ENVIRONMENT ent://SD_ILS/0/SD_ILS:860951 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Yat, Guo Quan, 1985-, author<br/>Author&#160;Yat, Guo Quan, 1985-, author,&#160;Zuraini Ismail, Assoc.Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 035021 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/> Secure Model for Online Shopping Among Millennial in Yemen ent://SD_ILS/0/SD_ILS:861028 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Shehab Mohammed Ali Albadri, 1989-, author<br/>Author&#160;Shehab Mohammed Ali Albadri, 1989-, author,&#160;Nurazean Maarop, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 035033 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> DESIGNING LIGHTWEIGHT CRYPTOGRAPHY ALGORITHM FOR INTERNET OF THINGS ent://SD_ILS/0/SD_ILS:864751 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Mohd. Fairus Mustapha, 1980-, author<br/>Author&#160;Mohd. Fairus Mustapha, 1980-, author,&#160;Majid Bakhtiari, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 035068 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/> SECURITY IN VOICE OVER INTERNET PROTOCOL (VOIP) : IMPLEMENTATION AND ANALYSIS ent://SD_ILS/0/SD_ILS:839590 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Maimun Rizal, 1980-, author<br/>Author&#160;Maimun Rizal, 1980-, author,&#160;Abdul Hanan Abdullah, Prof.Dr., supervisor,&#160;Saiful Adli Ismail, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 034567 ra<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> SECURE MODEL AWARENESS FOR MOBILE PHONE BANKING APPLICATIONS AMONG USERS ent://SD_ILS/0/SD_ILS:860177 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;al-Hadhrami, Taqi Mohammed Ali, 1989-, author<br/>Author&#160;al-Hadhrami, Taqi Mohammed Ali, 1989-, author,&#160;Mohd. Shahidan Abdullah, Assoc.Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;HG1708.7 H33 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) -Universiti Teknologi Malaysia, 2015<br/> INFORMATION PRIVACY CONCERNS MODEL FOR INTERNET USERS IN MARITIME ENVIRONMENT ent://SD_ILS/0/SD_ILS:860569 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Yat, Guo Quan, 1985-, author<br/>Author&#160;Yat, Guo Quan, 1985-, author,&#160;Zuraini Ismail, Assoc.Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.8855 Y38 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/> Secure Model for Online Shopping Among Millennial in Yemen ent://SD_ILS/0/SD_ILS:860577 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Shehab Mohammed Ali Albadri, 1989-, author<br/>Author&#160;Shehab Mohammed Ali Albadri, 1989-, author,&#160;Nurazean Maarop, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.875.I57 S54 2015 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> DESIGNING LIGHTWEIGHT CRYPTOGRAPHY ALGORITHM FOR INTERNET OF THINGS ent://SD_ILS/0/SD_ILS:864679 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Mohd. Fairus Mustapha, 1980-, author<br/>Author&#160;Mohd. Fairus Mustapha, 1980-, author,&#160;Majid Bakhtiari, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M6434 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/> RIoT Control : Understanding and Managing Risks and the Internet of Things ent://SD_ILS/0/SD_ILS:866835 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Macaulay, Tyson<br/>Author&#160;Macaulay, Tyson<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M33 2017<br/>ISBN&#160;9780124199712<br/> The Basics of Cyber Safety : Computer and Mobile Device Safety Made Easy ent://SD_ILS/0/SD_ILS:866898 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Sammons, John<br/>Author&#160;Sammons, John,&#160;Cross, Michael<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S266 2017<br/>ISBN&#160;9780124166509<br/> Secure Connected Objects ent://SD_ILS/0/SD_ILS:871992 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Paret, Dominique, author<br/>Author&#160;Paret, Dominique, author,&#160;Huon, Jean-Paul, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.8857 P37 2017<br/>ISBN&#160;9781786300591<br/> ACCEPTANCE OF INTERNET OF THINGS FROM SECURITY PERSPECTIVE IN MALAYSIAN GOVERNMENT AGENCY ent://SD_ILS/0/SD_ILS:871994 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Siti Riniy Fariza Mohd. Borham, 1979-, author<br/>Author&#160;Siti Riniy Fariza Mohd. Borham, 1979-, author,&#160;Nurazean Maarop, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 064075 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/> Internet of Things Security : Challenges, Advances, and Analytics ent://SD_ILS/0/SD_ILS:882287 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Patel, Chintan, author<br/>Author&#160;Patel, Chintan, author,&#160;Doshi, Nishant, author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.8857 P38 2019<br/>ISBN&#160;9781138341364<br/> Big Data, Surveillance and Crisis Management ent://SD_ILS/0/SD_ILS:887397 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Boersma, Kees, editor<br/>Author&#160;Boersma, Kees, editor,&#160;Fonio, Chiara, editor<br/>Format:&#160;Books<br/>Call Number&#160;HD49 B54 2018<br/>ISBN&#160;9780367876203<br/> ACCEPTANCE OF INTERNET OF THINGS FROM SECURITY PERSPECTIVE IN MALAYSIAN GOVERNMENT AGENCY ent://SD_ILS/0/SD_ILS:871225 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Siti Riniy Fariza Mohd. Borham, 1979-, author<br/>Author&#160;Siti Riniy Fariza Mohd. Borham, 1979-, author,&#160;Nurazean Maarop, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.8857 S58 2017 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/> A Beginner&rsquo;s Guide to Internet of Things Security : Attacks, Applications, Authentication, and Fundamentals ent://SD_ILS/0/SD_ILS:887395 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Gupta, Brij, 1982-, author<br/>Author&#160;Gupta, Brij, 1982-, author,&#160;Tewari, Aakanksha, author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G87 2020<br/>ISBN&#160;9780367430696<br/> Child Protection and Safeguarding Technologies : Appropriate or Excessive 'Solutions' to Social Problems? ent://SD_ILS/0/SD_ILS:887551 2024-05-25T14:20:52Z 2024-05-25T14:20:52Z by&#160;Phippen, Andy, author<br/>Author&#160;Phippen, Andy, author,&#160;Brennan, Maggie, author<br/>Format:&#160;Books<br/>Call Number&#160;HQ784.I58 P45 2020<br/>ISBN&#160;9781138555402<br/>