Search Results for Technology -- Research -- Malaysia - Narrowed by: Computer securitySirsiDynix Enterprisehttp://portal.utm.my/client/en_AU/main/main/qu$003dTechnology$002b--$002bResearch$002b--$002bMalaysia$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsecurity$002509Computer$002bsecurity$0026ic$003dtrue$0026ps$003d300?dt=list2024-06-09T13:54:13ZDatabase encrytion schemes : a comparative studyent://SD_ILS/0/SD_ILS:3515112024-06-09T13:54:13Z2024-06-09T13:54:13Zby Zailani Mohamed Sidek, Assoc.Prof.Dr.<br/>Author Zailani Mohamed Sidek, Assoc.Prof.Dr., Norbik Bashah Idris, Harihodin Selamat, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.9.A25 Z34 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>Security of mobile agents in distributed environmentent://SD_ILS/0/SD_ILS:3214752024-06-09T13:54:13Z2024-06-09T13:54:13Zby Afzan Zaidi<br/>Author Afzan Zaidi, Mazleena Salleh, Abdul Hanan Abdullah, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number QA76.76.I58 A394 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>DoS attacks detection using intrusion detection system and system callsent://SD_ILS/0/SD_ILS:3214622024-06-09T13:54:13Z2024-06-09T13:54:13Zby Mohd. Aizaini Maarof<br/>Author Mohd. Aizaini Maarof, Pathmenanthan Ramakrishna, Conference on Information Technology Research and Applications (2002 : UNITAR, Kuala Lumpur)<br/>Format: Books<br/>Call Number TK5105.59 M346 2002<br/>Publisher Universiti Teknologi Malaysia,<br/>Publication Date 2002<br/>