Search Results for Production management - Narrowed by: Computer securitySirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dProduction$002bmanagement$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ps$003d300?dt=list2024-04-26T15:29:30ZFramework of human behavior to mitigate the insider threatent://SD_ILS/0/SD_ILS:8034832024-04-26T15:29:30Z2024-04-26T15:29:30Zby Jihad Wajeeh Badawi, 1988-<br/>Author Jihad Wajeeh Badawi, 1988-, Norafida Ithnin, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 J54 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Development of metamodel for information security risk managementent://SD_ILS/0/SD_ILS:8116462024-04-26T15:29:30Z2024-04-26T15:29:30Zby Mohammed Salem Mohammed Ba Muqabel, 1988-<br/>Author Mohammed Salem Mohammed Ba Muqabel, 1988-, Siti Hajar Othman, supervisor, Fakulti Komputeran<br/>Format: Books<br/>Call Number QA76.9.A25 M648 2013 raf<br/>Publication Date 2013<br/>Thesis (Sarjana Komputer Sains (Pengawalan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Framework of human behavior to mitigate the insider threatent://SD_ILS/0/SD_ILS:8034862024-04-26T15:29:30Z2024-04-26T15:29:30Zby Jihad Wajeeh Badawi, 1988-<br/>Author Jihad Wajeeh Badawi, 1988-<br/>Format: Books<br/>Call Number CP 029824 ra<br/>Publication Date 2013<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2013<br/>Collaborative computer security and trust managementent://SD_ILS/0/SD_ILS:6319942024-04-26T15:29:30Z2024-04-26T15:29:30Zby Seigneur, Jean-Marc<br/>Author Seigneur, Jean-Marc, Slagell, Adam, 1977-<br/>Format: Books<br/>Call Number QA76.9.A25 C656 2010 f<br/>Publisher Information Science Reference,<br/>Publication Date 2010<br/>ISBN 9781605664149 9781605664156<br/>Data protection : governance, risk management, and complianceent://SD_ILS/0/SD_ILS:7363972024-04-26T15:29:30Z2024-04-26T15:29:30Zby Hill, David G. (David Gary), 1943-<br/>Author Hill, David G. (David Gary), 1943-<br/>Format: Books<br/>Call Number QA76.9.A25 H52 2009<br/>Publisher Taylor & Francis,<br/>Publication Date 2009<br/>ISBN 9781439806920<br/>Information security management metrics : a definitive guide to effective security monitoring and measurementent://SD_ILS/0/SD_ILS:2828952024-04-26T15:29:30Z2024-04-26T15:29:30Zby Brotby, W. Krag<br/>Author Brotby, W. Krag<br/>Format: Books<br/>Call Number HD30.2 B78 2009<br/>Publisher CRC Press,<br/>Publication Date 2009<br/>ISBN 9781420052855<br/>Information assurance architectureent://SD_ILS/0/SD_ILS:2828922024-04-26T15:29:30Z2024-04-26T15:29:30Zby WIllett, Keith D.<br/>Author WIllett, Keith D.<br/>Format: Books<br/>Call Number QA76.9.A25 W54 2008<br/>Publisher CRC Press,<br/>Publication Date 2008<br/>ISBN 9780849380679<br/>Information technology security & risk managementent://SD_ILS/0/SD_ILS:4671512024-04-26T15:29:30Z2024-04-26T15:29:30Zby Slay, Jill<br/>Author Slay, Jill, Koronios, Andy<br/>Format: Books<br/>Call Number QA76.9.A25 S54 2006<br/>Publisher John Wiley & Sons Australia,<br/>Publication Date 2006<br/>ISBN 9780470805749<br/>Spatial domain technique to embed visible and invisible wetermarkingent://SD_ILS/0/SD_ILS:4116652024-04-26T15:29:30Z2024-04-26T15:29:30Zby Akram Mohd. Zeki<br/>Author Akram Mohd. Zeki, Azizah Abdul Manaf, Sayuthi Jaafar, International Conference Information and Communication Technology in Management (2005 : Melaka)<br/>Format: Books<br/>Call Number QA76.9.A25 A37 2005<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2005<br/>The business case for network security : advocacy, governance, and ROIent://SD_ILS/0/SD_ILS:4442242024-04-26T15:29:30Z2024-04-26T15:29:30Zby Paquet, Cathrine<br/>Author Paquet, Cathrine, Saxe, Warren<br/>Format: Books<br/>Call Number TK5105.59 P36 2005<br/>Publisher Cisco Press,<br/>Publication Date 2005<br/>ISBN 9781587201219<br/>Sistem penilaian permarkahan latihan praktik (FSKSM) secara atas talianent://SD_ILS/0/SD_ILS:70712024-04-26T15:29:30Z2024-04-26T15:29:30Zby Farrah Maslina Umar<br/>Author Farrah Maslina Umar<br/>Format: Visual Materials<br/>Call Number MFL 12994<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/>Sistem diagnosis penyakit kulit menggunakan pendekatan berasaskan peraturanent://SD_ILS/0/SD_ILS:82842024-04-26T15:29:30Z2024-04-26T15:29:30Zby Kuang, Yee Ling<br/>Author Kuang, Yee Ling<br/>Format: Visual Materials<br/>Call Number MFL 12984<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2003<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2003<br/>Information security policies, procedures, and standards : guidelines for effective information security managementent://SD_ILS/0/SD_ILS:1679792024-04-26T15:29:30Z2024-04-26T15:29:30Zby Peltier, Thomas R.<br/>Author Peltier, Thomas R.<br/>Format: Books<br/>Call Number QA76.9.A25 P447 2002<br/>Publisher Auerbach Publications,<br/>Publication Date 2002<br/>ISBN 9780849311376<br/>Pembelajaran matematik tingkatan satu : topik mempermudahkan hasil tambah dan hasil tolak integer positif dan negatif secara berkomputerent://SD_ILS/0/SD_ILS:73072024-04-26T15:29:30Z2024-04-26T15:29:30Zby Aidah Misran<br/>Author Aidah Misran<br/>Format: Visual Materials<br/>Call Number MFL 12219<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2002<br/>E-learning : pakej pembelajaran asas grafik berkomputer secara online - bab atribut primitif outputent://SD_ILS/0/SD_ILS:6109982024-04-26T15:29:30Z2024-04-26T15:29:30Zby Mohd. Hafiz Haron<br/>Author Mohd. Hafiz Haron<br/>Format: Computer file<br/>Call Number MFL 11962<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Project Paper (Sarjana Muda Sains Komputer) - Universiti Teknologi Malaysia, 2001<br/>Protecting business information : a manager's guideent://SD_ILS/0/SD_ILS:4674702024-04-26T15:29:30Z2024-04-26T15:29:30Zby Schweitzer, James A.<br/>Author Schweitzer, James A.<br/>Format: Books<br/>Call Number HD38.7 S34 1996<br/>Publisher Butterworth-Heinemann,<br/>Publication Date 1996<br/>ISBN 9780750696586<br/>ANALYZING DATA LEAKAGE IN GEOGRAPHICAL INFORMATION SYSTEM FOR GOVERNMENT SECTORent://SD_ILS/0/SD_ILS:8390932024-04-26T15:29:30Z2024-04-26T15:29:30Zby Mona Liza Ja'afar, 1975-, author<br/>Author Mona Liza Ja'afar, 1975-, author, Mohd. Shahidan Abdullah, Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number CP 034541 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>The Complete book of data anonymization : from planning to implementationent://SD_ILS/0/SD_ILS:8372982024-04-26T15:29:30Z2024-04-26T15:29:30Zby Raghunathan, Balaji author<br/>Author Raghunathan, Balaji author<br/>Format: Books<br/>Call Number QA76.9.A25 R348 2013<br/>ISBN 9781439877302<br/>ANALYZING DATA LEAKAGE IN GEOGRAPHICAL INFORMATION SYSTEM FOR GOVERNMENT SECTORent://SD_ILS/0/SD_ILS:8390922024-04-26T15:29:30Z2024-04-26T15:29:30Zby Mona Liza Ja'afar, 1975-, author<br/>Author Mona Liza Ja'afar, 1975-, author, Mohd. Shahidan Abdullah, Dr., supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number T58.64 M663 2012 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>