Search Results for Mobile computing -- Security measures SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dMobile$002bcomputing$002b--$002bSecurity$002bmeasures$0026ps$003d300? 2020-09-21T18:41:37Z Wireless and mobile device security ent://SD_ILS/0/SD_ILS:839177 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;Doherty, Jim, 1968- author<br/>Author&#160;Doherty, Jim, 1968- author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.78 D64 2016<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2016<br/>ISBN&#160;978128405927&#160;9781284059274<br/> Guideline to investigate data leakage by image capture using android mobile phone ent://SD_ILS/0/SD_ILS:859454 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;Mohd. Hazuwan Ab. Wahab, 1980-, author<br/>Author&#160;Mohd. Hazuwan Ab. Wahab, 1980-, author<br/>Format:&#160;Books<br/>Call Number&#160;CP 034752 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> Security implementation approach for the use of bring your own device in government agencies ent://SD_ILS/0/SD_ILS:859464 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;Mohamad Roshidi Rozali, 1980-<br/>Author&#160;Mohamad Roshidi Rozali, 1980-,&#160;Zuraini Ismai, author?UNAUTHORIZED,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034749 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> Secure development for mobile apps : how to design and code secure mobile applications with PHP and javascript ent://SD_ILS/0/SD_ILS:822512 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;Glaser, J. D.<br/>Author&#160;Glaser, J. D.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 G535 2015<br/>Publisher&#160;CRC Press, Taylor &amp; Francis Group, CRC Press is an imprint of the Taylor &amp; Francis Group, an informa business,<br/>Publication Date&#160;2015<br/>ISBN&#160;9781482209037<br/> A novel lightweight certificateless public key authentication scheme for mobile AD HOC networks ent://SD_ILS/0/SD_ILS:849752 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;Shabnam Kasra Kermanshahi, 1986-<br/>Author&#160;Shabnam Kasra Kermanshahi, 1986-,&#160;Mazleena Salleh,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.59 S53 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2015<br/> Guideline to investigate data leakage by image capture using android mobile phone ent://SD_ILS/0/SD_ILS:859453 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;Mohd. Hazuwan Ab. Wahab, 1980-, author<br/>Author&#160;Mohd. Hazuwan Ab. Wahab, 1980-, author,&#160;Azizah Abd. Manaf, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.4837 M64 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> Security implementation approach for the use of bring your own device in government agencies ent://SD_ILS/0/SD_ILS:859463 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;Mohamad Roshidi Rozali, 1980-, author<br/>Author&#160;Mohamad Roshidi Rozali, 1980-, author,&#160;Zuraini Ismail, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.85 M64 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> Android security : attacks and defenses ent://SD_ILS/0/SD_ILS:804238 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;Misram, Anmol<br/>Author&#160;Misram, Anmol,&#160;Dubey, Abhisbek<br/>Format:&#160;Books<br/>Call Number&#160;QA76.774.A53 M57 2013<br/>Publisher&#160;Taylor &amp; Francis,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781439896464<br/> Securing cloud and mobility : a practitioner's guide ent://SD_ILS/0/SD_ILS:821159 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;Lim, Ian<br/>Author&#160;Lim, Ian,&#160;Hourani, Paul,&#160;Coolidge, E. Coleen<br/>Format:&#160;Books<br/>Call Number&#160;QA76.585 L56 2013<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781439850558<br/> Android forensics : investigation, analysis and mobile security for google android ent://SD_ILS/0/SD_ILS:755579 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;Hoog, Andrew<br/>Author&#160;Hoog, Andrew<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.885.G66 H66 2011<br/>Publisher&#160;Syngress,<br/>Publication Date&#160;2011<br/>ISBN&#160;9781597496513<br/> Mobile device security for dummies ent://SD_ILS/0/SD_ILS:778300 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;Campagna, Rich R.<br/>Author&#160;Campagna, Rich R.,&#160;Iyer, Sibbu,&#160;Krishnan, Ashwin<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C364 2011<br/>Publisher&#160;Wiley Pubishing, Inc.,<br/>Publication Date&#160;2011<br/>ISBN&#160;9780470927533<br/> Mobile application security ent://SD_ILS/0/SD_ILS:643378 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;Dwivedi, Himanshu.<br/>Author&#160;Dwivedi, Himanshu.,&#160;Clark, Chris, 1980-,&#160;Thiel, David V.<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.85 D88 2010<br/>Publisher&#160;McGraw-Hill,<br/>Publication Date&#160;2010<br/>ISBN&#160;9780071633567<br/> Security of mobile communications ent://SD_ILS/0/SD_ILS:330057 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;Boudriga, Noureddine<br/>Author&#160;Boudriga, Noureddine<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.85 B68 2009<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780849379413<br/> Forensic analysis on mobile phone ent://SD_ILS/0/SD_ILS:291069 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;Lee, Chuw Fan<br/>Author&#160;Lee, Chuw Fan,&#160;Azizah Abdul Manaf,&#160;Universiti Teknologi Malaysia. Center for Advanced Software Engineering<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.85 L43 2008<br/>Publication Date&#160;2008<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/> Forensic analysis on mobile phone ent://SD_ILS/0/SD_ILS:772856 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;Lee, Chuw Fan<br/>Author&#160;Lee, Chuw Fan<br/>Format:&#160;Books<br/>Call Number&#160;CP 026601 ra<br/>Publication Date&#160;2008<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/> Embedded java security : security for mobile devices ent://SD_ILS/0/SD_ILS:142238 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;Debbabi, Mourad<br/>Author&#160;Debbabi, Mourad<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 E42 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781846285905<br/><a href="http://dx.doi.org/10.1007/978-1-84628-711-4">FullText</a><br/> New technologies, mobility and security ent://SD_ILS/0/SD_ILS:517582 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;Labiod, Houda<br/>Author&#160;Labiod, Houda,&#160;Badra, Mohamad,&#160;SpringerLink (Online service)<br/>Format:&#160;Computer file<br/>Call Number&#160;EB 000285<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9781402062704&#160;9781402062698<br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Network control and engineering for QoS, security and mobility, V : IFIP 19th World Computer Congress, TC-6, 5th IFIP International Conference on Network Control and Engineering for QoS, Security and Mobility, August 20-25, 2006, Santiago, Chile ent://SD_ILS/0/SD_ILS:116386 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;IFIP International Conference on Network Control and Engineering for QoS, Security, and Mobility (5th : 2006 : Santiago, Chile)<br/>Author&#160;IFIP International Conference on Network Control and Engineering for QoS, Security, and Mobility (5th : 2006 : Santiago, Chile),&#160;Gaiti, Dominique,&#160;IFIP World Computer Congress (19th : 2006 : Santiago, Chile)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5 I34 2006<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780387348254<br/> AAA and network security for mobile access : radius, diameter, EAP, PKI, and IP mobility ent://SD_ILS/0/SD_ILS:440718 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;Nakhjiri, Madjid<br/>Author&#160;Nakhjiri, Madjid,&#160;Nakhjiri, Mahsa<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.4885 N34 2005<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2005<br/>ISBN&#160;9780470011942<br/> Network control and engineering for QoS, security and mobility : IFIP TC6/WG6.2 &amp; WG6.7 Conference on Network Control and Engineering for QoS, Security, and Mobility (Net-Con 2002), October 23-25, 2002, Paris, France ent://SD_ILS/0/SD_ILS:410136 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;IFIP TC6/WG6.2 &amp; WG6.7 Conference on Network Control and Engineering for QoS, Security, and Mobility (2002 : Paris, France)<br/>Author&#160;IFIP TC6/WG6.2 &amp; WG6.7 Conference on Network Control and Engineering for QoS, Security, and Mobility (2002 : Paris, France),&#160;Gaiti, Dominique,&#160;Boukhatem, Nadia<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.5 I344 2003<br/>Publisher&#160;Kluwer Academic Publishers,<br/>Publication Date&#160;2003<br/>ISBN&#160;9781402072680<br/> mCommerce security : a beginner's guide ent://SD_ILS/0/SD_ILS:340616 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;Raina, Kapil<br/>Author&#160;Raina, Kapil,&#160;Harsh, Anurag<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.32 R35 2002<br/>Publisher&#160;McGraw-Hill/Osborne,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780072194609<br/> Pengesahan keutuhan laman web menggunakan tanda masa ent://SD_ILS/0/SD_ILS:20924 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;Afzan Zaidi<br/>Author&#160;Afzan Zaidi<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12241<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/> SECURITY MODEL FOR MICROSOFT BASED MOBILE SALES MANAGEMENT APPLICATION IN PRIVATE CLOUD COMPUTING ent://SD_ILS/0/SD_ILS:839428 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;Kuan, Chee Houng, 1986-, author<br/>Author&#160;Kuan, Chee Houng, 1986-, author,&#160;Bharanidharan Shanmugam, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034562 ra<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> SECURITY MODEL FOR MICROSOFT BASED MOBILE SALES MANAGEMENT APPLICATION IN PRIVATE CLOUD COMPUTING ent://SD_ILS/0/SD_ILS:839427 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;Kuan, Chee Houng, 1986-, author<br/>Author&#160;Kuan, Chee Houng, 1986-, author,&#160;Bharanidharan Shanmugam, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.585 K83 2012 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> ENHANCING GRAPHICAL PASSWORD AUTHENTICATION ON SMARTPHONES ent://SD_ILS/0/SD_ILS:871224 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;al-Hashedi, Khaled Gubran Yahya, 1990-, author<br/>Author&#160;al-Hashedi, Khaled Gubran Yahya, 1990-, author,&#160;Mohd. Shahidan Abdullah, Assoc.Prof.Dr., 1960-, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H377 2017 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/> SUCCESS MODEL FOR BYOD IMPLEMENTATION CONSIDERING HUMAN AND SECURITY PERSPECTIVES IN MALAYSIA GOVERNMENT ENVIRONMENT ent://SD_ILS/0/SD_ILS:871269 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;Haslinda Mat Akhir, 1979-, author<br/>Author&#160;Haslinda Mat Akhir, 1979-, author,&#160;Nurazean Maarop, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.85 H37 2017 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/> ENHANCING GRAPHICAL PASSWORD AUTHENTICATION ON SMARTPHONES ent://SD_ILS/0/SD_ILS:871942 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;al-Hashedi, Khaled Gubran Yahya, 1990-, author<br/>Author&#160;al-Hashedi, Khaled Gubran Yahya, 1990-, author,&#160;Mohd. Shahidan Abdullah, Assoc.Prof.Dr., 1960-, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 064064 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/> SUCCESS MODEL FOR BYOD IMPLEMENTATION CONSIDERING HUMAN AND SECURITY PERSPECTIVES IN MALAYSIA GOVERNMENT ENVIRONMENT ent://SD_ILS/0/SD_ILS:871980 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;Haslinda Mat Akhir, 1979-, author<br/>Author&#160;Haslinda Mat Akhir, 1979-, author,&#160;Nurazean Maarop, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 064073 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/> MOBILE SECURITY AND PRIVACY : Advances, Challenges and Future Research Directions ent://SD_ILS/0/SD_ILS:873237 2020-09-21T18:41:37Z 2020-09-21T18:41:37Z by&#160;Au, Man-Ho, editor<br/>Author&#160;Au, Man-Ho, editor,&#160;Choo, Raymond Kim-Kwang, editor,&#160;Gary Kessler, editor<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M635 2017<br/>ISBN&#160;9780128046296<br/>