Search Results for Security systems - Narrowed by: Mobile communication systems -- Security measuresSirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dSecurity$002bsystems$0026qf$003dSUBJECT$002509Subject$002509Mobile$002bcommunication$002bsystems$002b--$002bSecurity$002bmeasures$002509Mobile$002bcommunication$002bsystems$002b--$002bSecurity$002bmeasures$0026ps$003d300$0026isd$003dtrue?dt=list2024-06-22T13:24:28ZMobile communication systems and securityent://SD_ILS/0/SD_ILS:2820772024-06-22T13:24:28Z2024-06-22T13:24:28Zby Rhee, Man Young<br/>Author Rhee, Man Young<br/>Format: Books<br/>Call Number TK5103.2 R434 2009<br/>Publisher Wiley,<br/>Publication Date 2009<br/>ISBN 9780470823361<br/>Wireless security essentials : defending mobile systems from data piracyent://SD_ILS/0/SD_ILS:3259162024-06-22T13:24:28Z2024-06-22T13:24:28Zby Vines, Russell Dean<br/>Author Vines, Russell Dean<br/>Format: Books<br/>Call Number TK5102.5 V56 2002<br/>Publisher Wiley Publishing,<br/>Publication Date 2002<br/>ISBN 9780471209362<br/>Wireless and mobile device securityent://SD_ILS/0/SD_ILS:8391772024-06-22T13:24:28Z2024-06-22T13:24:28Zby Doherty, Jim, 1968- author<br/>Author Doherty, Jim, 1968- author<br/>Format: Books<br/>Call Number TK5105.78 D64 2016<br/>Publisher Jones & Bartlett Learning,<br/>Publication Date 2016<br/>ISBN 978128405927 9781284059274<br/>Security implementation approach for the use of bring your own device in government agenciesent://SD_ILS/0/SD_ILS:8594632024-06-22T13:24:28Z2024-06-22T13:24:28Zby Mohamad Roshidi Rozali, 1980-, author<br/>Author Mohamad Roshidi Rozali, 1980-, author, Zuraini Ismail, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number TK5102.85 M64 2015 raf<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>Security implementation approach for the use of bring your own device in government agenciesent://SD_ILS/0/SD_ILS:8594642024-06-22T13:24:28Z2024-06-22T13:24:28Zby Mohamad Roshidi Rozali, 1980-<br/>Author Mohamad Roshidi Rozali, 1980-, Zuraini Ismai, author?UNAUTHORIZED, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034749 ra<br/>Publication Date 2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/>Security, privacy, trust, and resource management in mobile and wireless communicationsent://SD_ILS/0/SD_ILS:8412642024-06-22T13:24:28Z2024-06-22T13:24:28Zby Rawat, Danda B., 1977-, editor<br/>Author Rawat, Danda B., 1977-, editor, Bista, Bhed B., 1967-, editor, Yan, Gongjun, 1976-, editor<br/>Format: Books<br/>Call Number TK5103.2 S435 2014 f<br/>Publisher Information Science Reference, an imprint of IGI Global,<br/>Publication Date 2014<br/>ISBN 9781466646919<br/>Mobile access safety : beyond BYODent://SD_ILS/0/SD_ILS:8134322024-06-22T13:24:28Z2024-06-22T13:24:28Zby Assing, Dominique<br/>Author Assing, Dominique, Cale, Stephane<br/>Format: Books<br/>Call Number TK5102.85 A87 2013<br/>Publisher ISTE ; Wiley,<br/>Publication Date 2013<br/>ISBN 9781848214354<br/>Mobile device security : a comprehensive guide to securing your information in a moving worldent://SD_ILS/0/SD_ILS:6404922024-06-22T13:24:28Z2024-06-22T13:24:28Zby Fried, Stephen, 1962-<br/>Author Fried, Stephen, 1962-<br/>Format: Books<br/>Call Number HF5548.37 F75 2010<br/>Publisher Auerbach Publications,<br/>Publication Date 2010<br/>ISBN 9781439820162<br/>An approach to enhance security awareness on the use of mobile devicesent://SD_ILS/0/SD_ILS:8405502024-06-22T13:24:28Z2024-06-22T13:24:28Zby Sabeeh, Ahmed A.<br/>Author Sabeeh, Ahmed A., Maslin Masrom, supervisor, Fakulti Sains Komputer dan Sistem Maklumat<br/>Format: Books<br/>Call Number HF5548.37 S23 2010 raf<br/>Publication Date 2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>An approach to enhance security awareness on the use of mobile devicesent://SD_ILS/0/SD_ILS:8405522024-06-22T13:24:28Z2024-06-22T13:24:28Zby Sabeeh, Ahmed A.<br/>Author Sabeeh, Ahmed A.<br/>Format: Books<br/>Call Number CP 033984 ra<br/>Publication Date 2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/>Wireless and mobile networks security : security basics, security in on-the-shelf and emerging technologiesent://SD_ILS/0/SD_ILS:6404862024-06-22T13:24:28Z2024-06-22T13:24:28Zby Chaouchi, Hakima<br/>Author Chaouchi, Hakima, Laurent-Maknavicius, Maryline<br/>Format: Books<br/>Call Number TK5103.2 W5745 2009<br/>Publisher ISTE/John Wiley & Sons,<br/>Publication Date 2009<br/>ISBN 9781848211179<br/>Security of mobile communicationsent://SD_ILS/0/SD_ILS:3300572024-06-22T13:24:28Z2024-06-22T13:24:28Zby Boudriga, Noureddine<br/>Author Boudriga, Noureddine<br/>Format: Books<br/>Call Number TK5102.85 B68 2009<br/>Publisher Auerbach Publications,<br/>Publication Date 2009<br/>ISBN 9780849379413<br/>Forensic analysis on mobile phoneent://SD_ILS/0/SD_ILS:7728562024-06-22T13:24:28Z2024-06-22T13:24:28Zby Lee, Chuw Fan<br/>Author Lee, Chuw Fan<br/>Format: Books<br/>Call Number CP 026601 ra<br/>Publication Date 2008<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/>Forensic analysis on mobile phoneent://SD_ILS/0/SD_ILS:2910692024-06-22T13:24:28Z2024-06-22T13:24:28Zby Lee, Chuw Fan<br/>Author Lee, Chuw Fan, Azizah Abdul Manaf, Universiti Teknologi Malaysia. Center for Advanced Software Engineering<br/>Format: Books<br/>Call Number TK5102.85 L43 2008<br/>Publication Date 2008<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/>Wireless communications securityent://SD_ILS/0/SD_ILS:4776162024-06-22T13:24:28Z2024-06-22T13:24:28Zby Imai, Hideki, 1943-<br/>Author Imai, Hideki, 1943-, Rahman, Mohammad Ghulam, Kobara, Kazukuni<br/>Format: Books<br/>Call Number TK5103.2 I42 2006<br/>Publisher Artech House,<br/>Publication Date 2006<br/>ISBN 9781580535205<br/>Security for mobilityent://SD_ILS/0/SD_ILS:3955482024-06-22T13:24:28Z2024-06-22T13:24:28Zby Mitchell, Chris J.<br/>Author Mitchell, Chris J., Institution of Electrical Engineers<br/>Format: Books<br/>Call Number TK6570.M6 S42 2004<br/>Publisher Institution of Electrical Engineers,.<br/>Publication Date 2004<br/>ISBN 9780863413377<br/>UMTS securityent://SD_ILS/0/SD_ILS:3942292024-06-22T13:24:28Z2024-06-22T13:24:28Zby Niemi, Valtteri<br/>Author Niemi, Valtteri, Nyberg, Kaisa, 1948-<br/>Format: Books<br/>Call Number QA76.9.A25 N53 2003<br/>Publisher John Wiley & Sons,<br/>Publication Date 2003<br/>ISBN 9780470847947<br/>ENHANCEMENT SECURITY AGAINST SNIFFING ATTACK IN AD HOC NETWORKent://SD_ILS/0/SD_ILS:8407162024-06-22T13:24:28Z2024-06-22T13:24:28Zby Sanam Ghorbani Lyastani, 1984-, author<br/>Author Sanam Ghorbani Lyastani, 1984-, author, Teddy Mantoro, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number TK5102.85 S26 2013 raf<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>ENHANCEMENT SECURITY AGAINST SNIFFING ATTACK IN AD HOC NETWORKent://SD_ILS/0/SD_ILS:8407172024-06-22T13:24:28Z2024-06-22T13:24:28Zby Sanam Ghorbani Lyastani, 1984-, author<br/>Author Sanam Ghorbani Lyastani, 1984-, author, Teddy Mantoro, Assoc.Prof.Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034040 ra<br/>Thesis Sarjana Sains Komputer (Keselamatan Maklumat)<br/>A MOBILE SECURITY AWARENESS MANAGEMENT MODEL IN AIRLINES COMPANIESent://SD_ILS/0/SD_ILS:8438992024-06-22T13:24:28Z2024-06-22T13:24:28Zby Suriati Abdul Manaf, 1976-, author<br/>Author Suriati Abdul Manaf, 1976-, author, Yusnaidi Md. Yusof, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number TK5102.85 S87 2014 raf<br/>Thesis Sarjana Sains (Jaminan Maklumat)<br/>A MOBILE SECURITY AWARENESS MANAGEMENT MODEL IN AIRLINES COMPANIESent://SD_ILS/0/SD_ILS:8439002024-06-22T13:24:28Z2024-06-22T13:24:28Zby Suriati Abdul Manaf, 1976-, author<br/>Author Suriati Abdul Manaf, 1976-, author, Yusnaidi Md Yusof, supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 034505 ra<br/>Thesis Sarjana Sains (Jaminan Maklumat)<br/>SUCCESS MODEL FOR BYOD IMPLEMENTATION CONSIDERING HUMAN AND SECURITY PERSPECTIVES IN MALAYSIA GOVERNMENT ENVIRONMENTent://SD_ILS/0/SD_ILS:8712692024-06-22T13:24:28Z2024-06-22T13:24:28Zby Haslinda Mat Akhir, 1979-, author<br/>Author Haslinda Mat Akhir, 1979-, author, Nurazean Maarop, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number TK5102.85 H37 2017 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/>SUCCESS MODEL FOR BYOD IMPLEMENTATION CONSIDERING HUMAN AND SECURITY PERSPECTIVES IN MALAYSIA GOVERNMENT ENVIRONMENTent://SD_ILS/0/SD_ILS:8719802024-06-22T13:24:28Z2024-06-22T13:24:28Zby Haslinda Mat Akhir, 1979-, author<br/>Author Haslinda Mat Akhir, 1979-, author, Nurazean Maarop, Dr., supervisor, Sekolah Informatiks Termaju<br/>Format: Books<br/>Call Number CP 064073 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/>