Search Results for Security systems - Narrowed by: Mobile communication systems -- Security measures SirsiDynix Enterprise http://portal.utm.my/client/en_AU/main/main/qu$003dSecurity$002bsystems$0026qf$003dSUBJECT$002509Subject$002509Mobile$002bcommunication$002bsystems$002b--$002bSecurity$002bmeasures$002509Mobile$002bcommunication$002bsystems$002b--$002bSecurity$002bmeasures$0026ps$003d300$0026isd$003dtrue?dt=list 2024-06-22T13:24:28Z Mobile communication systems and security ent://SD_ILS/0/SD_ILS:282077 2024-06-22T13:24:28Z 2024-06-22T13:24:28Z by&#160;Rhee, Man Young<br/>Author&#160;Rhee, Man Young<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 R434 2009<br/>Publisher&#160;Wiley,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780470823361<br/> Wireless security essentials : defending mobile systems from data piracy ent://SD_ILS/0/SD_ILS:325916 2024-06-22T13:24:28Z 2024-06-22T13:24:28Z by&#160;Vines, Russell Dean<br/>Author&#160;Vines, Russell Dean<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.5 V56 2002<br/>Publisher&#160;Wiley Publishing,<br/>Publication Date&#160;2002<br/>ISBN&#160;9780471209362<br/> Wireless and mobile device security ent://SD_ILS/0/SD_ILS:839177 2024-06-22T13:24:28Z 2024-06-22T13:24:28Z by&#160;Doherty, Jim, 1968- author<br/>Author&#160;Doherty, Jim, 1968- author<br/>Format:&#160;Books<br/>Call Number&#160;TK5105.78 D64 2016<br/>Publisher&#160;Jones &amp; Bartlett Learning,<br/>Publication Date&#160;2016<br/>ISBN&#160;978128405927&#160;9781284059274<br/> Security implementation approach for the use of bring your own device in government agencies ent://SD_ILS/0/SD_ILS:859463 2024-06-22T13:24:28Z 2024-06-22T13:24:28Z by&#160;Mohamad Roshidi Rozali, 1980-, author<br/>Author&#160;Mohamad Roshidi Rozali, 1980-, author,&#160;Zuraini Ismail, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.85 M64 2015 raf<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> Security implementation approach for the use of bring your own device in government agencies ent://SD_ILS/0/SD_ILS:859464 2024-06-22T13:24:28Z 2024-06-22T13:24:28Z by&#160;Mohamad Roshidi Rozali, 1980-<br/>Author&#160;Mohamad Roshidi Rozali, 1980-,&#160;Zuraini Ismai, author?UNAUTHORIZED,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034749 ra<br/>Publication Date&#160;2015<br/>Thesis (Sarjana Sains (Jaminan Maklumat))-Universiti Teknologi Malaysia, 2015<br/> Security, privacy, trust, and resource management in mobile and wireless communications ent://SD_ILS/0/SD_ILS:841264 2024-06-22T13:24:28Z 2024-06-22T13:24:28Z by&#160;Rawat, Danda B., 1977-, editor<br/>Author&#160;Rawat, Danda B., 1977-, editor,&#160;Bista, Bhed B., 1967-, editor,&#160;Yan, Gongjun, 1976-, editor<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 S435 2014 f<br/>Publisher&#160;Information Science Reference, an imprint of IGI Global,<br/>Publication Date&#160;2014<br/>ISBN&#160;9781466646919<br/> Mobile access safety : beyond BYOD ent://SD_ILS/0/SD_ILS:813432 2024-06-22T13:24:28Z 2024-06-22T13:24:28Z by&#160;Assing, Dominique<br/>Author&#160;Assing, Dominique,&#160;Cale, Stephane<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.85 A87 2013<br/>Publisher&#160;ISTE ; Wiley,<br/>Publication Date&#160;2013<br/>ISBN&#160;9781848214354<br/> Mobile device security : a comprehensive guide to securing your information in a moving world ent://SD_ILS/0/SD_ILS:640492 2024-06-22T13:24:28Z 2024-06-22T13:24:28Z by&#160;Fried, Stephen, 1962-<br/>Author&#160;Fried, Stephen, 1962-<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 F75 2010<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2010<br/>ISBN&#160;9781439820162<br/> An approach to enhance security awareness on the use of mobile devices ent://SD_ILS/0/SD_ILS:840550 2024-06-22T13:24:28Z 2024-06-22T13:24:28Z by&#160;Sabeeh, Ahmed A.<br/>Author&#160;Sabeeh, Ahmed A.,&#160;Maslin Masrom, supervisor,&#160;Fakulti Sains Komputer dan Sistem Maklumat<br/>Format:&#160;Books<br/>Call Number&#160;HF5548.37 S23 2010 raf<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> An approach to enhance security awareness on the use of mobile devices ent://SD_ILS/0/SD_ILS:840552 2024-06-22T13:24:28Z 2024-06-22T13:24:28Z by&#160;Sabeeh, Ahmed A.<br/>Author&#160;Sabeeh, Ahmed A.<br/>Format:&#160;Books<br/>Call Number&#160;CP 033984 ra<br/>Publication Date&#160;2010<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2010<br/> Wireless and mobile networks security : security basics, security in on-the-shelf and emerging technologies ent://SD_ILS/0/SD_ILS:640486 2024-06-22T13:24:28Z 2024-06-22T13:24:28Z by&#160;Chaouchi, Hakima<br/>Author&#160;Chaouchi, Hakima,&#160;Laurent-Maknavicius, Maryline<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 W5745 2009<br/>Publisher&#160;ISTE/John Wiley &amp; Sons,<br/>Publication Date&#160;2009<br/>ISBN&#160;9781848211179<br/> Security of mobile communications ent://SD_ILS/0/SD_ILS:330057 2024-06-22T13:24:28Z 2024-06-22T13:24:28Z by&#160;Boudriga, Noureddine<br/>Author&#160;Boudriga, Noureddine<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.85 B68 2009<br/>Publisher&#160;Auerbach Publications,<br/>Publication Date&#160;2009<br/>ISBN&#160;9780849379413<br/> Forensic analysis on mobile phone ent://SD_ILS/0/SD_ILS:772856 2024-06-22T13:24:28Z 2024-06-22T13:24:28Z by&#160;Lee, Chuw Fan<br/>Author&#160;Lee, Chuw Fan<br/>Format:&#160;Books<br/>Call Number&#160;CP 026601 ra<br/>Publication Date&#160;2008<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/> Forensic analysis on mobile phone ent://SD_ILS/0/SD_ILS:291069 2024-06-22T13:24:28Z 2024-06-22T13:24:28Z by&#160;Lee, Chuw Fan<br/>Author&#160;Lee, Chuw Fan,&#160;Azizah Abdul Manaf,&#160;Universiti Teknologi Malaysia. Center for Advanced Software Engineering<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.85 L43 2008<br/>Publication Date&#160;2008<br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/> Wireless communications security ent://SD_ILS/0/SD_ILS:477616 2024-06-22T13:24:28Z 2024-06-22T13:24:28Z by&#160;Imai, Hideki, 1943-<br/>Author&#160;Imai, Hideki, 1943-,&#160;Rahman, Mohammad Ghulam,&#160;Kobara, Kazukuni<br/>Format:&#160;Books<br/>Call Number&#160;TK5103.2 I42 2006<br/>Publisher&#160;Artech House,<br/>Publication Date&#160;2006<br/>ISBN&#160;9781580535205<br/> Security for mobility ent://SD_ILS/0/SD_ILS:395548 2024-06-22T13:24:28Z 2024-06-22T13:24:28Z by&#160;Mitchell, Chris J.<br/>Author&#160;Mitchell, Chris J.,&#160;Institution of Electrical Engineers<br/>Format:&#160;Books<br/>Call Number&#160;TK6570.M6 S42 2004<br/>Publisher&#160;Institution of Electrical Engineers,.<br/>Publication Date&#160;2004<br/>ISBN&#160;9780863413377<br/> UMTS security ent://SD_ILS/0/SD_ILS:394229 2024-06-22T13:24:28Z 2024-06-22T13:24:28Z by&#160;Niemi, Valtteri<br/>Author&#160;Niemi, Valtteri,&#160;Nyberg, Kaisa, 1948-<br/>Format:&#160;Books<br/>Call Number&#160;QA76.9.A25 N53 2003<br/>Publisher&#160;John Wiley &amp; Sons,<br/>Publication Date&#160;2003<br/>ISBN&#160;9780470847947<br/> ENHANCEMENT SECURITY AGAINST SNIFFING ATTACK IN AD HOC NETWORK ent://SD_ILS/0/SD_ILS:840716 2024-06-22T13:24:28Z 2024-06-22T13:24:28Z by&#160;Sanam Ghorbani Lyastani, 1984-, author<br/>Author&#160;Sanam Ghorbani Lyastani, 1984-, author,&#160;Teddy Mantoro, Assoc.Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.85 S26 2013 raf<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> ENHANCEMENT SECURITY AGAINST SNIFFING ATTACK IN AD HOC NETWORK ent://SD_ILS/0/SD_ILS:840717 2024-06-22T13:24:28Z 2024-06-22T13:24:28Z by&#160;Sanam Ghorbani Lyastani, 1984-, author<br/>Author&#160;Sanam Ghorbani Lyastani, 1984-, author,&#160;Teddy Mantoro, Assoc.Prof.Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034040 ra<br/>Thesis&#160;Sarjana Sains Komputer (Keselamatan Maklumat)<br/> A MOBILE SECURITY AWARENESS MANAGEMENT MODEL IN AIRLINES COMPANIES ent://SD_ILS/0/SD_ILS:843899 2024-06-22T13:24:28Z 2024-06-22T13:24:28Z by&#160;Suriati Abdul Manaf, 1976-, author<br/>Author&#160;Suriati Abdul Manaf, 1976-, author,&#160;Yusnaidi Md. Yusof, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.85 S87 2014 raf<br/>Thesis&#160;Sarjana Sains (Jaminan Maklumat)<br/> A MOBILE SECURITY AWARENESS MANAGEMENT MODEL IN AIRLINES COMPANIES ent://SD_ILS/0/SD_ILS:843900 2024-06-22T13:24:28Z 2024-06-22T13:24:28Z by&#160;Suriati Abdul Manaf, 1976-, author<br/>Author&#160;Suriati Abdul Manaf, 1976-, author,&#160;Yusnaidi Md Yusof, supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 034505 ra<br/>Thesis&#160;Sarjana Sains (Jaminan Maklumat)<br/> SUCCESS MODEL FOR BYOD IMPLEMENTATION CONSIDERING HUMAN AND SECURITY PERSPECTIVES IN MALAYSIA GOVERNMENT ENVIRONMENT ent://SD_ILS/0/SD_ILS:871269 2024-06-22T13:24:28Z 2024-06-22T13:24:28Z by&#160;Haslinda Mat Akhir, 1979-, author<br/>Author&#160;Haslinda Mat Akhir, 1979-, author,&#160;Nurazean Maarop, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;TK5102.85 H37 2017 raf<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/> SUCCESS MODEL FOR BYOD IMPLEMENTATION CONSIDERING HUMAN AND SECURITY PERSPECTIVES IN MALAYSIA GOVERNMENT ENVIRONMENT ent://SD_ILS/0/SD_ILS:871980 2024-06-22T13:24:28Z 2024-06-22T13:24:28Z by&#160;Haslinda Mat Akhir, 1979-, author<br/>Author&#160;Haslinda Mat Akhir, 1979-, author,&#160;Nurazean Maarop, Dr., supervisor,&#160;Sekolah Informatiks Termaju<br/>Format:&#160;Books<br/>Call Number&#160;CP 064073 ra<br/>Thesis (Sarjana Sains (Jaminan Maklumat)) - Universiti Teknologi Malaysia, 2017<br/>