Search Results for Production control - Narrowed by: Computer securitySirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dProduction$002bcontrol$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ps$003d300$0026isd$003dtrue?dt=list2024-06-24T15:29:20ZCredential purpose-based access control for personal data protection in web-based applicationsent://SD_ILS/0/SD_ILS:8091062024-06-24T15:29:20Z2024-06-24T15:29:20Zby Norjihan Abdul Ghani, 1977- , author<br/>Author Norjihan Abdul Ghani, 1977- , author, Harihodin Selamat, Zailani Mohamed Sidek, supervisor, Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 N676 2013 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2013<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/>Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0ent://SD_ILS/0/SD_ILS:8052872024-06-24T15:29:20Z2024-06-24T15:29:20Zby Williams, Barry L.<br/>Author Williams, Barry L.<br/>Format: Books<br/>Call Number QA76.9.A25 W55 2013<br/>Publisher CRC Press, Taylor & Francis Group,<br/>Publication Date 2013<br/>ISBN 9781466580589<br/>Critical information infrastructures : resilience and protectionent://SD_ILS/0/SD_ILS:2544812024-06-24T15:29:20Z2024-06-24T15:29:20Zby Hyslop, Maitland<br/>Author Hyslop, Maitland<br/>Format: Books<br/>Call Number QA76.9.A25 H97 2007<br/>Publisher Springer,<br/>Publication Date 2007<br/>ISBN 9780387718613<br/><a href="http://dx.doi.org/10.1007/978-0-387-71862-0">Fulltext</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/>Cybersecurity for SCADA systemsent://SD_ILS/0/SD_ILS:1950262024-06-24T15:29:20Z2024-06-24T15:29:20Zby Shaw, William T.<br/>Author Shaw, William T.<br/>Format: Books<br/>Call Number TJ222 S52 2006<br/>Publisher PennWell Corporation,<br/>Publication Date 2006<br/>ISBN 9781593700683<br/>Securing SCADA systemsent://SD_ILS/0/SD_ILS:1121462024-06-24T15:29:20Z2024-06-24T15:29:20Zby Krutz, Ronald L., 1938-<br/>Author Krutz, Ronald L., 1938-<br/>Format: Books<br/>Call Number TS156.8 K78 2006<br/>Publisher Wiley Publishing,<br/>Publication Date 2006<br/>ISBN 9780764597879<br/>Developing information security policy : case study of Biruni Remote Sensing Center (BRSC)ent://SD_ILS/0/SD_ILS:1316702024-06-24T15:29:20Z2024-06-24T15:29:20Zby Mohamed. K. Bayoud<br/>Author Mohamed. K. Bayoud<br/>Format: Books<br/>Call Number QA76.9.A25 M525 2006 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2006<br/>Thesis (Sarjana Sains Komputer - Keselamatan Maklumat)) - Fakulti Sains Komputer dan Sistem Maklumat, Universiti Teknologi Malaysia, 2006<br/>Sistem penilaian permarkahan latihan praktik (FSKSM) secara atas talianent://SD_ILS/0/SD_ILS:70712024-06-24T15:29:20Z2024-06-24T15:29:20Zby Farrah Maslina Umar<br/>Author Farrah Maslina Umar<br/>Format: Visual Materials<br/>Call Number MFL 12994<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/>Ke arah pengurangan jurang masa sistem penindakbalasan pencerobohan melalui penggunaan pendekatan penjejakan pencerobohan pantasent://SD_ILS/0/SD_ILS:3536272024-06-24T15:29:20Z2024-06-24T15:29:20Zby Mohd. Nizam Omar<br/>Author Mohd. Nizam Omar, Mohd. Aizaini Maarof, Subariah Ibrahim, Persidangan Sempena Pameran Penyelidikan dan Pembangunan IPTA (2003 : Kuala Lumpur )<br/>Format: Books<br/>Call Number TK5105.59 M54 2003<br/>Publication Date 2003<br/>Perisian keselamatan data menggunakan gabungan teknik penyulitan data dan teknik pemampatan dataent://SD_ILS/0/SD_ILS:3623822024-06-24T15:29:20Z2024-06-24T15:29:20Zby Norfadzila Mohd. Yusof<br/>Author Norfadzila Mohd. Yusof<br/>Format: Books<br/>Call Number QA76.9.A25 N674 2003<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=57193">Full text</a><br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/>Perisian keselamatan data menggunakan gabungan teknik penyulitan data dan teknik pemampatan dataent://SD_ILS/0/SD_ILS:5999532024-06-24T15:29:20Z2024-06-24T15:29:20Zby Norfadzila Mohd. Yusof<br/>Author Norfadzila Mohd. Yusof<br/>Format: Computer file<br/>Call Number CP 5544<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/>Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohanent://SD_ILS/0/SD_ILS:111802024-06-24T15:29:20Z2024-06-24T15:29:20Zby Ali Yusny Daud<br/>Author Ali Yusny Daud<br/>Format: Visual Materials<br/>Call Number MFL 13917<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/>Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohanent://SD_ILS/0/SD_ILS:6010022024-06-24T15:29:20Z2024-06-24T15:29:20Zby Ali Yusny Daud<br/>Author Ali Yusny Daud<br/>Format: Computer file<br/>Call Number CP 8375<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/>Database encrytion schemes : a comparative studyent://SD_ILS/0/SD_ILS:3515112024-06-24T15:29:20Z2024-06-24T15:29:20Zby Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author Zailani Mohamed Sidek, Assoc.Prof.Dr., Norbik Bashah Idris, Harihodin Selamat, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.9.A25 Z34 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohanent://SD_ILS/0/SD_ILS:3711612024-06-24T15:29:20Z2024-06-24T15:29:20Zby Ali Yusny Daud<br/>Author Ali Yusny Daud<br/>Format: Books<br/>Call Number TK5105.59 A44 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=51186">Preview</a><br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/>A novel key recovery scheme implemented in public key infrastructureent://SD_ILS/0/SD_ILS:3162052024-06-24T15:29:20Z2024-06-24T15:29:20Zby Teoh, Su Chi<br/>Author Teoh, Su Chi, Norbik Bashah Idris, World Engineering Congress (2nd : 2002 : Sarawak, Malaysia)<br/>Format: Books<br/>Call Number QA76.9.A25 T48 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Detection & prevention of DoS attacks using intrusion detection system : design & developmentent://SD_ILS/0/SD_ILS:3224812024-06-24T15:29:20Z2024-06-24T15:29:20Zby Pathmenanthan Ramakrishna<br/>Author Pathmenanthan Ramakrishna, Mohd. Aizaini Maarof, Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format: Books<br/>Call Number TK5105.59 P376 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>DoS attacks detection using intrusion detection system and system callsent://SD_ILS/0/SD_ILS:3214622024-06-24T15:29:20Z2024-06-24T15:29:20Zby Mohd. Aizaini Maarof<br/>Author Mohd. Aizaini Maarof, Pathmenanthan Ramakrishna, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number TK5105.59 M346 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Sistem inventori berasaskan internet ... [et al.]ent://SD_ILS/0/SD_ILS:86932024-06-24T15:29:20Z2024-06-24T15:29:20Zby Fazli Mat Nor<br/>Author Fazli Mat Nor, Mohd. Rashidan Abdul Rahim, Liew, Kim Loong, Saliza Hasan, Zahrina Abd. Gani<br/>Format: Visual Materials<br/>Call Number MFL 9509<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 1999<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1999<br/>Kriptologient://SD_ILS/0/SD_ILS:3362182024-06-24T15:29:20Z2024-06-24T15:29:20Zby Bong, Thai Kwong<br/>Author Bong, Thai Kwong<br/>Format: Books<br/>Call Number QA76.9.A25 B66 1994 raf<br/>Publisher UTM,<br/>Publication Date 1994<br/>Kertas projek (Sarjana Muda Sains dan Komputer serta Pendidikan (Matematik)) - Universiti Teknologi Malaysia, 1994<br/>Kriptologient://SD_ILS/0/SD_ILS:3362202024-06-24T15:29:20Z2024-06-24T15:29:20Zby Bong, Thai Kwong<br/>Author Bong, Thai Kwong<br/>Format: Books<br/>Call Number DSK 616 ra<br/>Publisher UTM,<br/>Publication Date 1994<br/>Kertas projek (Sarjana Muda Sains dan Komputer serta Pendidikan (Matematik)) - Universiti Teknologi Malaysia, 1994<br/>The support features for the intelligent terminal emulator; Building a network adapter card for IBM working in a ring topology local area network Part II; Building a standard central controller for local area network using star topology; Pengkod dan penyahkod DTMF Bahagian I (Perisian); Screen transferring and massege switching across a network; A point to point computer communication link using communication controller chip; Bit error rate measurement for high data transmission; Pemproses enkripsi piawai (Bahagian 3) : implementasi DES dengan perisianent://SD_ILS/0/SD_ILS:2712022024-06-24T15:29:20Z2024-06-24T15:29:20Zby Fauziah Hanim Omar<br/>Author Fauziah Hanim Omar, Jasmi Mohd Daron, Jayaseelan Manickam, Mohd. Zaki Yahaya, Ooi, Foong Yen<br/>Format: Books<br/>Call Number MFL 7750 ra<br/>Publisher UTM,<br/>Publication Date 1992<br/>Project paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1992<br/>