Search Results for Production management - Narrowed by: Computer security -- ManagementSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dProduction$002bmanagement$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002b--$002bManagement$002509Computer$002bsecurity$002b--$002bManagement$0026ps$003d300?dt=list2024-04-18T11:29:58ZAnalysing information security threats in healthcare information systems using survival analysis methodent://SD_ILS/0/SD_ILS:7794662024-04-18T11:29:58Z2024-04-18T11:29:58Zby Ganthan Narayana Samy, 1977-<br/>Author Ganthan Narayana Samy, 1977-, Rabiah Ahmad, supervisor, Zuraini Ismail, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number QA76.9.A25 G364 2012 raf<br/>Publication Date 2012<br/>Thesis (Doktor Falsafah (Sains Komputer)) – Universiti Teknologi Malaysia, 2012<br/>Analysing information security threats in healthcare information system using survival analysis methodent://SD_ILS/0/SD_ILS:7794682024-04-18T11:29:58Z2024-04-18T11:29:58Zby Ganthan Narayana Samy, 1977-<br/>Author Ganthan Narayana Samy, 1977-<br/>Format: Books<br/>Call Number CP 028040 ra<br/>Publication Date 2012<br/>Thesis (Doktor Falsafah (Sains Komputer)) – Universiti Teknologi Malaysia, 2012<br/>Information security management : concepts and practiceent://SD_ILS/0/SD_ILS:7363892024-04-18T11:29:58Z2024-04-18T11:29:58Zby Raggad, Bel G.<br/>Author Raggad, Bel G.<br/>Format: Books<br/>Call Number QA76.9.A25 R337 2010<br/>Publisher CRC Press/Taylor & Francis,<br/>Publication Date 2010<br/>ISBN 9781420078541<br/>Managing an information security and privacy awareness and training programent://SD_ILS/0/SD_ILS:1432412024-04-18T11:29:58Z2024-04-18T11:29:58Zby Herold, Rebecca<br/>Author Herold, Rebecca<br/>Format: Books<br/>Call Number QA76.9.A25 H475 2005<br/>Publisher Auerbach Publications,<br/>Publication Date 2005<br/>ISBN 9780849329630<br/>Surviving security : how to integrate people, process, and technologyent://SD_ILS/0/SD_ILS:4141162024-04-18T11:29:58Z2024-04-18T11:29:58Zby Andress, Amanda<br/>Author Andress, Amanda<br/>Format: Books<br/>Call Number QA 76.9 .A25 A 52 2003<br/>Edition 2nd ed.<br/>Publisher Auerbach Publications,<br/>Publication Date 2003<br/>ISBN 9780849320422<br/>ANALYZING THE EFFECTIVENESS OF INFORMATION SECURITY PRACTICES IN IMPLEMENTING ISMS STANDARDent://SD_ILS/0/SD_ILS:8378782024-04-18T11:29:58Z2024-04-18T11:29:58Zby Rohaida Ismail, 1984-, author<br/>Author Rohaida Ismail, 1984-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034149 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>INSIDER THREATS CONCERN MODEL IN A LAW ENFORCEMENT AGENCYent://SD_ILS/0/SD_ILS:8648402024-04-18T11:29:58Z2024-04-18T11:29:58Zby Heng, Yee Lee, 1983-, author<br/>Author Heng, Yee Lee, 1983-, author, Ganthan Narayana Samy, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 H464 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>ANALYZING THE EFFECTIVENESS OF INFORMATION SECURITY PRACTICES IN IMPLEMENTING ISMS STANDARDent://SD_ILS/0/SD_ILS:8378772024-04-18T11:29:58Z2024-04-18T11:29:58Zby Rohaida Ismail, 1984-, author<br/>Author Rohaida Ismail, 1984-, author, Zuraini Ismail, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number QA76.9.A25 R643 2012 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>INSIDER THREATS CONCERN MODEL IN A LAW ENFORCEMENT AGENCYent://SD_ILS/0/SD_ILS:8651022024-04-18T11:29:58Z2024-04-18T11:29:58Zby Heng, Yee Lee, 1983-, author<br/>Author Heng, Yee Lee, 1983-, author, Ganthan Narayana Samy, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 035090 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2016<br/>POLICY GUIDELINES TO IMPROVE DATA GOVERNANCE IN UNIVERSITY COLLEGE OF AGROSCIENCE MALAYSIA : A CASE STUDYent://SD_ILS/0/SD_ILS:8660232024-04-18T11:29:58Z2024-04-18T11:29:58Zby Rohayu A. Wahid, 1979-, author<br/>Author Rohayu A. Wahid, 1979-, author, Norbik Bashah Idris, Prof.Dato'.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number HF5548.37 R64 2016 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/>POLICY GUIDELINES TO IMPROVE DATA GOVERNANCE IN UNIVERSITY COLLEGE OF AGROSCIENCE MALAYSIA : A CASE STUDYent://SD_ILS/0/SD_ILS:8707672024-04-18T11:29:58Z2024-04-18T11:29:58Zby Rohayu A. Wahid, 1979-, author<br/>Author Rohayu A. Wahid, 1979-, author, Norbik Bashah Idris, Prof.Dato'.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 064004 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2016<br/>