Search Results for Production control - Narrowed by: Computer security SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dProduction$002bcontrol$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ps$003d300$0026isd$003dtrue?dt=list 2024-06-24T15:29:20Z Credential purpose-based access control for personal data protection in web-based applications ent://SD_ILS/0/SD_ILS:809106 2024-06-24T15:29:20Z 2024-06-24T15:29:20Z by&#160;Norjihan Abdul Ghani, 1977- , author<br/>Author&#160;Norjihan Abdul Ghani, 1977- , author,&#160;Harihodin Selamat,&#160;Zailani Mohamed Sidek, supervisor,&#160;Fakulti Kejuruteraan. Sekolah Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N676 2013 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2013<br/>Thesis (Doktor Falsafah, Bidang Penyelidikan: Sains Komputer)) - Universiti Teknologi Malaysia, 2013<br/> Information security policy development for compliance : ISO/IEC 27001, NIST SP 800-53, HIPAA standard, PCI DSS V2.0, and AUP V5.0 ent://SD_ILS/0/SD_ILS:805287 2024-06-24T15:29:20Z 2024-06-24T15:29:20Z by&#160;Williams, Barry L.<br/>Author&#160;Williams, Barry L.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W55 2013<br/>Publisher&#160;CRC Press, Taylor &amp; Francis Group,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781466580589<br/> Critical information infrastructures : resilience and protection ent://SD_ILS/0/SD_ILS:254481 2024-06-24T15:29:20Z 2024-06-24T15:29:20Z by&#160;Hyslop, Maitland<br/>Author&#160;Hyslop, Maitland<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H97 2007<br/>Publisher&#160;Springer,<br/>Publication Date&#160;2007<br/>ISBN&#160;9780387718613<br/><a href="http://dx.doi.org/10.1007/978-0-387-71862-0">Fulltext</a><br/>Remote access restricted to users with a valid UTM ID via VPN<br/> Cybersecurity for SCADA systems ent://SD_ILS/0/SD_ILS:195026 2024-06-24T15:29:20Z 2024-06-24T15:29:20Z by&#160;Shaw, William T.<br/>Author&#160;Shaw, William T.<br/>Format:&#160;Books<br/>Call Number&#160;TJ222 S52 2006<br/>Publisher&#160;PennWell Corporation,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781593700683<br/> Securing SCADA systems ent://SD_ILS/0/SD_ILS:112146 2024-06-24T15:29:20Z 2024-06-24T15:29:20Z by&#160;Krutz, Ronald L., 1938-<br/>Author&#160;Krutz, Ronald L., 1938-<br/>Format:&#160;Books<br/>Call Number&#160;TS156.8 K78 2006<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780764597879<br/> Developing information security policy : case study of Biruni Remote Sensing Center (BRSC) ent://SD_ILS/0/SD_ILS:131670 2024-06-24T15:29:20Z 2024-06-24T15:29:20Z by&#160;Mohamed. K. Bayoud<br/>Author&#160;Mohamed. K. Bayoud<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M525 2006 raf<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2006<br/>Thesis (Sarjana Sains Komputer - Keselamatan Maklumat)) - Fakulti Sains Komputer dan Sistem Maklumat, Universiti Teknologi Malaysia, 2006<br/> Sistem penilaian permarkahan latihan praktik (FSKSM) secara atas talian ent://SD_ILS/0/SD_ILS:7071 2024-06-24T15:29:20Z 2024-06-24T15:29:20Z by&#160;Farrah Maslina Umar<br/>Author&#160;Farrah Maslina Umar<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12994<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/> Ke arah pengurangan jurang masa sistem penindakbalasan pencerobohan melalui penggunaan pendekatan penjejakan pencerobohan pantas ent://SD_ILS/0/SD_ILS:353627 2024-06-24T15:29:20Z 2024-06-24T15:29:20Z by&#160;Mohd. Nizam Omar<br/>Author&#160;Mohd. Nizam Omar,&#160;Mohd. Aizaini Maarof,&#160;Subariah Ibrahim,&#160;Persidangan Sempena Pameran Penyelidikan dan Pembangunan IPTA (2003 : Kuala Lumpur )<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M54 2003<br/>Publication Date&#160;2003<br/> Perisian keselamatan data menggunakan gabungan teknik penyulitan data dan teknik pemampatan data ent://SD_ILS/0/SD_ILS:362382 2024-06-24T15:29:20Z 2024-06-24T15:29:20Z by&#160;Norfadzila Mohd. Yusof<br/>Author&#160;Norfadzila Mohd. Yusof<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N674 2003<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=57193">Full text</a><br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/> Perisian keselamatan data menggunakan gabungan teknik penyulitan data dan teknik pemampatan data ent://SD_ILS/0/SD_ILS:599953 2024-06-24T15:29:20Z 2024-06-24T15:29:20Z by&#160;Norfadzila Mohd. Yusof<br/>Author&#160;Norfadzila Mohd. Yusof<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 5544<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/> Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan ent://SD_ILS/0/SD_ILS:11180 2024-06-24T15:29:20Z 2024-06-24T15:29:20Z by&#160;Ali Yusny Daud<br/>Author&#160;Ali Yusny Daud<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 13917<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/> Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan ent://SD_ILS/0/SD_ILS:601002 2024-06-24T15:29:20Z 2024-06-24T15:29:20Z by&#160;Ali Yusny Daud<br/>Author&#160;Ali Yusny Daud<br/>Format:&#160;Computer file<br/>Call Number&#160;CP 8375<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/> Database encrytion schemes : a comparative study ent://SD_ILS/0/SD_ILS:351511 2024-06-24T15:29:20Z 2024-06-24T15:29:20Z by&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author&#160;Zailani Mohamed Sidek, Assoc.Prof.Dr.,&#160;Norbik Bashah Idris,&#160;Harihodin Selamat,&#160;Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 Z34 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Analisa penggunaan sumber bagi simulasi serangan teragih ke atas hos sistem pengesanan pencerobohan ent://SD_ILS/0/SD_ILS:371161 2024-06-24T15:29:20Z 2024-06-24T15:29:20Z by&#160;Ali Yusny Daud<br/>Author&#160;Ali Yusny Daud<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 A44 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/><a href="http://www.psz.utm.my/sla/billing/login.asp?mid=51186">Preview</a><br/>Thesis (Sarjana Sains (Sains Komputer - Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2002<br/> A novel key recovery scheme implemented in public key infrastructure ent://SD_ILS/0/SD_ILS:316205 2024-06-24T15:29:20Z 2024-06-24T15:29:20Z by&#160;Teoh, Su Chi<br/>Author&#160;Teoh, Su Chi,&#160;Norbik Bashah Idris,&#160;World Engineering Congress (2nd : 2002 : Sarawak, Malaysia)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 T48 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Detection &amp; prevention of DoS attacks using intrusion detection system : design &amp; development ent://SD_ILS/0/SD_ILS:322481 2024-06-24T15:29:20Z 2024-06-24T15:29:20Z by&#160;Pathmenanthan Ramakrishna<br/>Author&#160;Pathmenanthan Ramakrishna,&#160;Mohd. Aizaini Maarof,&#160;Malaysian Science and Technology Congress (2002 : Johor Bahru)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P376 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> DoS attacks detection using intrusion detection system and system calls ent://SD_ILS/0/SD_ILS:321462 2024-06-24T15:29:20Z 2024-06-24T15:29:20Z by&#160;Mohd. Aizaini Maarof<br/>Author&#160;Mohd. Aizaini Maarof,&#160;Pathmenanthan Ramakrishna,&#160;Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 M346 2002<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/> Sistem inventori berasaskan internet ... [et al.] ent://SD_ILS/0/SD_ILS:8693 2024-06-24T15:29:20Z 2024-06-24T15:29:20Z by&#160;Fazli Mat Nor<br/>Author&#160;Fazli Mat Nor,&#160;Mohd. Rashidan Abdul Rahim,&#160;Liew, Kim Loong,&#160;Saliza Hasan,&#160;Zahrina Abd. Gani<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 9509<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;1999<br/>Kertas projek (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 1999<br/> Kriptologi ent://SD_ILS/0/SD_ILS:336218 2024-06-24T15:29:20Z 2024-06-24T15:29:20Z by&#160;Bong, Thai Kwong<br/>Author&#160;Bong, Thai Kwong<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 B66 1994 raf<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1994<br/>Kertas projek (Sarjana Muda Sains dan Komputer serta Pendidikan (Matematik)) - Universiti Teknologi Malaysia, 1994<br/> Kriptologi ent://SD_ILS/0/SD_ILS:336220 2024-06-24T15:29:20Z 2024-06-24T15:29:20Z by&#160;Bong, Thai Kwong<br/>Author&#160;Bong, Thai Kwong<br/>Format:&#160;Books<br/>Call Number&#160;DSK 616 ra<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1994<br/>Kertas projek (Sarjana Muda Sains dan Komputer serta Pendidikan (Matematik)) - Universiti Teknologi Malaysia, 1994<br/> The support features for the intelligent terminal emulator; Building a network adapter card for IBM working in a ring topology local area network Part II; Building a standard central controller for local area network using star topology; Pengkod dan penyahkod DTMF Bahagian I (Perisian); Screen transferring and massege switching across a network; A point to point computer communication link using communication controller chip; Bit error rate measurement for high data transmission; Pemproses enkripsi piawai (Bahagian 3) : implementasi DES dengan perisian ent://SD_ILS/0/SD_ILS:271202 2024-06-24T15:29:20Z 2024-06-24T15:29:20Z by&#160;Fauziah Hanim Omar<br/>Author&#160;Fauziah Hanim Omar,&#160;Jasmi Mohd Daron,&#160;Jayaseelan Manickam,&#160;Mohd. Zaki Yahaya,&#160;Ooi, Foong Yen<br/>Format:&#160;Books<br/>Call Number&#160;MFL 7750 ra<br/>Publisher&#160;UTM,<br/>Publication Date&#160;1992<br/>Project paper (Bachelor of Electrical Engineering) - Universiti Teknologi Malaysia, 1992<br/>