Search Results for System analysis - Narrowed by: Closed Access Thesis - Operating systems (Computers)SirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dSystem$002banalysis$0026qf$003dITYPE$002509Material$002bType$0025091$00253ACLS_THESIS$002509Closed$002bAccess$002bThesis$0026qf$003dSUBJECT$002509Subject$002509Operating$002bsystems$002b$002528Computers$002529$002509Operating$002bsystems$002b$002528Computers$002529$0026ps$003d300?dt=list2024-06-14T10:18:22ZIntrusive system calls analysis for intrusion detection systement://SD_ILS/0/SD_ILS:4382822024-06-14T10:18:22Z2024-06-14T10:18:22Zby Pathmenanthan Ramakrishna<br/>Author Pathmenanthan Ramakrishna<br/>Format: Books<br/>Call Number QA76.76.O63 P37 2004 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2004<br/>Thesis (Sarjana Sains (Sains Komputer)) - Universiti Teknologi Malaysia, 2004<br/>Guideline for forensic analysis on windows xp and vista registryent://SD_ILS/0/SD_ILS:2911712024-06-14T10:18:22Z2024-06-14T10:18:22Zby Somayeh Aghanavesi<br/>Author Somayeh Aghanavesi, Norbik Bashah Idris<br/>Format: Books<br/>Call Number QA76.76.O63 S86 2008 raf<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2008<br/><a href="http://eprints.utm.my/9517">Full text thesis via UTM-IR</a><br/>Thesis (Sarjana Sains Komputer (Keselamatan Maklumat)) - Universiti Teknologi Malaysia, 2008<br/>Monitor and terminal emulator for network enabled deviceent://SD_ILS/0/SD_ILS:1670382024-06-14T10:18:22Z2024-06-14T10:18:22Zby Lim, Jin Keat<br/>Author Lim, Jin Keat<br/>Format: Books<br/>Call Number QA76.76 O63 L55 2001<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2001<br/>Project Paper (Bachelor of Engineering (Electrical)) - Universiti Teknologi Malaysia, 2001<br/>