Search Results for Mobile computing -- Security measures - Narrowed by: Sekolah Informatiks Termaju SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dMobile$002bcomputing$002b--$002bSecurity$002bmeasures$0026qf$003dAUTHOR$002509Author$002509Sekolah$002bInformatiks$002bTermaju$002509Sekolah$002bInformatiks$002bTermaju$0026ps$003d300?dt=list 2024-05-08T13:58:40Z Guideline to investigate data leakage by image capture using android mobile phone ent://SD_ILS/0/SD_ILS:859453 2024-05-08T13:58:40Z 2024-05-08T13:58:40Z by&#160;Mohd. Hazuwan Ab. Wahab, 1980-, author<br/>Author&#160;Mohd. Hazuwan Ab. Wahab, 1980-, author,&#160;Azizah Abd. Manaf, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.4837 M64 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> Security implementation approach for the use of bring your own device in government agencies ent://SD_ILS/0/SD_ILS:859463 2024-05-08T13:58:40Z 2024-05-08T13:58:40Z by&#160;Mohamad Roshidi Rozali, 1980-, author<br/>Author&#160;Mohamad Roshidi Rozali, 1980-, author,&#160;Zuraini Ismail, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.85 M64 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> Security implementation approach for the use of bring your own device in government agencies ent://SD_ILS/0/SD_ILS:859464 2024-05-08T13:58:40Z 2024-05-08T13:58:40Z by&#160;Mohamad Roshidi Rozali, 1980-<br/>Author&#160;Mohamad Roshidi Rozali, 1980-,&#160;Zuraini Ismai, author?UNAUTHORIZED,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034749 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> SECURITY MODEL FOR MICROSOFT BASED MOBILE SALES MANAGEMENT APPLICATION IN PRIVATE CLOUD COMPUTING ent://SD_ILS/0/SD_ILS:839427 2024-05-08T13:58:40Z 2024-05-08T13:58:40Z by&#160;Kuan, Chee Houng, 1986-, author<br/>Author&#160;Kuan, Chee Houng, 1986-, author,&#160;Bharanidharan Shanmugam, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.585 K83 2012 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> SECURITY MODEL FOR MICROSOFT BASED MOBILE SALES MANAGEMENT APPLICATION IN PRIVATE CLOUD COMPUTING ent://SD_ILS/0/SD_ILS:839428 2024-05-08T13:58:40Z 2024-05-08T13:58:40Z by&#160;Kuan, Chee Houng, 1986-, author<br/>Author&#160;Kuan, Chee Houng, 1986-, author,&#160;Bharanidharan Shanmugam, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034562 ra<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> ENHANCING GRAPHICAL PASSWORD AUTHENTICATION ON SMARTPHONES ent://SD_ILS/0/SD_ILS:871224 2024-05-08T13:58:40Z 2024-05-08T13:58:40Z by&#160;al-Hashedi, Khaled Gubran Yahya, 1990-, author<br/>Author&#160;al-Hashedi, Khaled Gubran Yahya, 1990-, author,&#160;Mohd. Shahidan Abdullah, Assoc.Prof.Dr., 1960-, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H377 2017 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/> SUCCESS MODEL FOR BYOD IMPLEMENTATION CONSIDERING HUMAN AND SECURITY PERSPECTIVES IN MALAYSIA GOVERNMENT ENVIRONMENT ent://SD_ILS/0/SD_ILS:871269 2024-05-08T13:58:40Z 2024-05-08T13:58:40Z by&#160;Haslinda Mat Akhir, 1979-, author<br/>Author&#160;Haslinda Mat Akhir, 1979-, author,&#160;Nurazean Maarop, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.85 H37 2017 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/> ENHANCING GRAPHICAL PASSWORD AUTHENTICATION ON SMARTPHONES ent://SD_ILS/0/SD_ILS:871942 2024-05-08T13:58:40Z 2024-05-08T13:58:40Z by&#160;al-Hashedi, Khaled Gubran Yahya, 1990-, author<br/>Author&#160;al-Hashedi, Khaled Gubran Yahya, 1990-, author,&#160;Mohd. Shahidan Abdullah, Assoc.Prof.Dr., 1960-, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 064064 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/> SUCCESS MODEL FOR BYOD IMPLEMENTATION CONSIDERING HUMAN AND SECURITY PERSPECTIVES IN MALAYSIA GOVERNMENT ENVIRONMENT ent://SD_ILS/0/SD_ILS:871980 2024-05-08T13:58:40Z 2024-05-08T13:58:40Z by&#160;Haslinda Mat Akhir, 1979-, author<br/>Author&#160;Haslinda Mat Akhir, 1979-, author,&#160;Nurazean Maarop, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 064073 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/>