Search Results for Production management - Narrowed by: Computer security SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dProduction$002bmanagement$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ps$003d300?dt=list 2024-04-26T15:29:30Z Framework of human behavior to mitigate the insider threat ent://SD_ILS/0/SD_ILS:803483 2024-04-26T15:29:30Z 2024-04-26T15:29:30Z by&#160;Jihad Wajeeh Badawi, 1988-<br/>Author&#160;Jihad Wajeeh Badawi, 1988-,&#160;Norafida Ithnin,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 J54 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Development of metamodel for information security risk management ent://SD_ILS/0/SD_ILS:811646 2024-04-26T15:29:30Z 2024-04-26T15:29:30Z by&#160;Mohammed Salem Mohammed Ba Muqabel, 1988-<br/>Author&#160;Mohammed Salem Mohammed Ba Muqabel, 1988-,&#160;Siti Hajar Othman, supervisor,&#160;Fakulti Komputeran<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 M648 2013 raf<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Komputer Sains (Pengawalan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Framework of human behavior to mitigate the insider threat ent://SD_ILS/0/SD_ILS:803486 2024-04-26T15:29:30Z 2024-04-26T15:29:30Z by&#160;Jihad Wajeeh Badawi, 1988-<br/>Author&#160;Jihad Wajeeh Badawi, 1988-<br/>Format:&#160;Books<br/>Call Number&#160;CP 029824 ra<br/>Publication Date&#160;2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/> Collaborative computer security and trust management ent://SD_ILS/0/SD_ILS:631994 2024-04-26T15:29:30Z 2024-04-26T15:29:30Z by&#160;Seigneur, Jean-Marc<br/>Author&#160;Seigneur, Jean-Marc,&#160;Slagell, Adam, 1977-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 C656 2010 f<br/>Publisher&#160;Information Science Reference,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781605664149&#160;9781605664156<br/> Data protection : governance, risk management, and compliance ent://SD_ILS/0/SD_ILS:736397 2024-04-26T15:29:30Z 2024-04-26T15:29:30Z by&#160;Hill, David G. (David Gary), 1943-<br/>Author&#160;Hill, David G. (David Gary), 1943-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 H52 2009<br/>Publisher&#160;Taylor &amp; Francis,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781439806920<br/> Information security management metrics : a definitive guide to effective security monitoring and measurement ent://SD_ILS/0/SD_ILS:282895 2024-04-26T15:29:30Z 2024-04-26T15:29:30Z by&#160;Brotby, W. Krag<br/>Author&#160;Brotby, W. Krag<br/>Format:&#160;Books<br/>Call Number&#160;HD30.2 B78 2009<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781420052855<br/> Information assurance architecture ent://SD_ILS/0/SD_ILS:282892 2024-04-26T15:29:30Z 2024-04-26T15:29:30Z by&#160;WIllett, Keith D.<br/>Author&#160;WIllett, Keith D.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 W54 2008<br/>Publisher&#160;CRC Press,<br/>Publication Date&#160;2008<br/>ISBN&#160;9780849380679<br/> Information technology security &amp; risk management ent://SD_ILS/0/SD_ILS:467151 2024-04-26T15:29:30Z 2024-04-26T15:29:30Z by&#160;Slay, Jill<br/>Author&#160;Slay, Jill,&#160;Koronios, Andy<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 S54 2006<br/>Publisher&#160;John Wiley &amp; Sons Australia,<br/>Publication Date&#160;2006<br/>ISBN&#160;9780470805749<br/> Spatial domain technique to embed visible and invisible wetermarking ent://SD_ILS/0/SD_ILS:411665 2024-04-26T15:29:30Z 2024-04-26T15:29:30Z by&#160;Akram Mohd. Zeki<br/>Author&#160;Akram Mohd. Zeki,&#160;Azizah Abdul Manaf,&#160;Sayuthi Jaafar,&#160;International Conference Information and Communication Technology in Management (2005 : Melaka)<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 A37 2005<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2005<br/> The business case for network security : advocacy, governance, and ROI ent://SD_ILS/0/SD_ILS:444224 2024-04-26T15:29:30Z 2024-04-26T15:29:30Z by&#160;Paquet, Cathrine<br/>Author&#160;Paquet, Cathrine,&#160;Saxe, Warren<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.59 P36 2005<br/>Publisher&#160;Cisco Press,<br/>Publication Date&#160;2005<br/>ISBN&#160;9781587201219<br/> Sistem penilaian permarkahan latihan praktik (FSKSM) secara atas talian ent://SD_ILS/0/SD_ILS:7071 2024-04-26T15:29:30Z 2024-04-26T15:29:30Z by&#160;Farrah Maslina Umar<br/>Author&#160;Farrah Maslina Umar<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12994<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/> Sistem diagnosis penyakit kulit menggunakan pendekatan berasaskan peraturan ent://SD_ILS/0/SD_ILS:8284 2024-04-26T15:29:30Z 2024-04-26T15:29:30Z by&#160;Kuang, Yee Ling<br/>Author&#160;Kuang, Yee Ling<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12984<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/> Information security policies, procedures, and standards : guidelines for effective information security management ent://SD_ILS/0/SD_ILS:167979 2024-04-26T15:29:30Z 2024-04-26T15:29:30Z by&#160;Peltier, Thomas R.<br/>Author&#160;Peltier, Thomas R.<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 P447 2002<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780849311376<br/> Pembelajaran matematik tingkatan satu : topik mempermudahkan hasil tambah dan hasil tolak integer positif dan negatif secara berkomputer ent://SD_ILS/0/SD_ILS:7307 2024-04-26T15:29:30Z 2024-04-26T15:29:30Z by&#160;Aidah Misran<br/>Author&#160;Aidah Misran<br/>Format:&#160;Visual Materials<br/>Call Number&#160;MFL 12219<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/> E-learning : pakej pembelajaran asas grafik berkomputer secara online - bab atribut primitif output ent://SD_ILS/0/SD_ILS:610998 2024-04-26T15:29:30Z 2024-04-26T15:29:30Z by&#160;Mohd. Hafiz Haron<br/>Author&#160;Mohd. Hafiz Haron<br/>Format:&#160;Computer file<br/>Call Number&#160;MFL 11962<br/>Publisher&#160;Universiti Teknologi Malaysia,<br/>Publication Date&#160;2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/> Protecting business information : a manager's guide ent://SD_ILS/0/SD_ILS:467470 2024-04-26T15:29:30Z 2024-04-26T15:29:30Z by&#160;Schweitzer, James A.<br/>Author&#160;Schweitzer, James A.<br/>Format:&#160;Books<br/>Call Number&#160;HD38.7 S34 1996<br/>Publisher&#160;Butterworth-Heinemann,<br/>Publication Date&#160;1996<br/>ISBN&#160;9780750696586<br/> ANALYZING DATA LEAKAGE IN GEOGRAPHICAL INFORMATION SYSTEM FOR GOVERNMENT SECTOR ent://SD_ILS/0/SD_ILS:839093 2024-04-26T15:29:30Z 2024-04-26T15:29:30Z by&#160;Mona Liza Ja'afar, 1975-, author<br/>Author&#160;Mona Liza Ja'afar, 1975-, author,&#160;Mohd. Shahidan Abdullah, Dr., supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;CP 034541 ra<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> The Complete book of data anonymization : from planning to implementation ent://SD_ILS/0/SD_ILS:837298 2024-04-26T15:29:30Z 2024-04-26T15:29:30Z by&#160;Raghunathan, Balaji author<br/>Author&#160;Raghunathan, Balaji author<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 R348 2013<br/>ISBN&#160;9781439877302<br/> ANALYZING DATA LEAKAGE IN GEOGRAPHICAL INFORMATION SYSTEM FOR GOVERNMENT SECTOR ent://SD_ILS/0/SD_ILS:839092 2024-04-26T15:29:30Z 2024-04-26T15:29:30Z by&#160;Mona Liza Ja'afar, 1975-, author<br/>Author&#160;Mona Liza Ja'afar, 1975-, author,&#160;Mohd. Shahidan Abdullah, Dr., supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;T58.64 M663 2012 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/>