Protecting an Internet Web File using Java
In this paper, we present a proposed method for protecting a file on a website using java language by dealing with the classes of the HTML file. All steps are programmable and we used the features of windows design in protecting files by checking all its attributes, which provide reasonable security...
| Main Authors: | Taha, Imad, Naef, Asaad |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Al Rafidain University College
2004
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/1213/ http://irep.iium.edu.my/1213/2/imad-asaad.pdf |
Similar Items
Protection of the digital holy Quran using IT techniques
by: Alahmad, Mohammad, et al.
Published: (2017)
by: Alahmad, Mohammad, et al.
Published: (2017)
Protection of the texts using Base64 and MD5
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Protection of text using SHA1 and Base64
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Protection of the digital holy Quran using SAB hash function
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013)
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
by: Naji, Ahmed Wathik, et al.
Published: (2009)
by: Naji, Ahmed Wathik, et al.
Published: (2009)
Sending the output to a print file
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Protection of the digital Holy Quran hash digest by using cryptography algorithms
by: Alahmad, Mohammad, et al.
Published: (2013)
by: Alahmad, Mohammad, et al.
Published: (2013)
Protection of integrity and ownership of pdf documents using invisible signature
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Dynamics of watermark position in audio watermarked
files using neural networks
by: Abubakar, Adamu, et al.
Published: (2017)
by: Abubakar, Adamu, et al.
Published: (2017)
Future trends in security issues in internet and web applications
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
by: Pathan, Al-Sakib Khan, et al.
Published: (2012)
JAVA programming lab manual
Published: (2011)
Published: (2011)
Information hiding in multimedia files : a literature review
by: Ali Ja’far, Abdullah Mohammed Abdo, et al.
Published: (2006)
by: Ali Ja’far, Abdullah Mohammed Abdo, et al.
Published: (2006)
The impact of file sharing based on the peer-to-peer technology
by: Raja Shaharuddin, Raja Aida, et al.
Published: (2002)
by: Raja Shaharuddin, Raja Aida, et al.
Published: (2002)
Optimal path planning for urban vehicles using
Internet of Things: a new navigation perspective
by: Alawadhi, Nayef, et al.
Published: (2019)
by: Alawadhi, Nayef, et al.
Published: (2019)
Web-based internet security / Zuriani Karia
by: Zuriani, Karia
Published: (2003)
by: Zuriani, Karia
Published: (2003)
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
by: Zahedeh, Zamanian
Published: (2019)
by: Zahedeh, Zamanian
Published: (2019)
Perbandingan Prestasi Antara Message Passing Interface Java (Mpijava) Dan Java Object Passing Interface (Jopi)
by: M.Azmi, Zafril Rizal, et al.
Published: (2006)
by: M.Azmi, Zafril Rizal, et al.
Published: (2006)
Trusting Cloud Computing for Personal Files
by: Mazlina, Abdul Majid, et al.
Published: (2014)
by: Mazlina, Abdul Majid, et al.
Published: (2014)
The influence of internet and social media on purchasing
decisions in Kuwait
by: Abdulkareem Al-Enezi, Khalid, et al.
Published: (2018)
by: Abdulkareem Al-Enezi, Khalid, et al.
Published: (2018)
Latihan Berasaskan Web Untuk Bahasa Pengaturcaraan Java Menggunakan Teknik Rangkaian Bayesian.
by: Sulaiman, Sarina, et al.
Published: (2007)
by: Sulaiman, Sarina, et al.
Published: (2007)
Visualization of automated plate cutting operation using DXF file
by: Abd. Rahim, Norazura
Published: (2008)
by: Abd. Rahim, Norazura
Published: (2008)
Java tutor / Shanmuganathan Supramaniam
by: Shanmuganathan , Supramaniam
Published: (2005)
by: Shanmuganathan , Supramaniam
Published: (2005)
The influence of internet and social media on
purchasing decisions in Egypt and a comparison
between Egypt and Kuwait
by: Alenezi, Khalid Abdulkareem, et al.
Published: (2017)
by: Alenezi, Khalid Abdulkareem, et al.
Published: (2017)
Cyber-attacks detection & protection in Kuwait government
sectors
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2014)
An adaptive wrapper algorithm for file transfer applications to support optimal large file transfers
by: Ghobadi, Alireza, et al.
Published: (2009)
by: Ghobadi, Alireza, et al.
Published: (2009)
Java based automatic curriculum generator for children with Trisomy 21
by: Supriyanto, Eko, et al.
Published: (2007)
by: Supriyanto, Eko, et al.
Published: (2007)
The influence of Internet and social media on purchasing
decisions in Indonesia and a comparison between
Indonesia and Kuwait
by: al-enizi, Khalid, et al.
Published: (2019)
by: al-enizi, Khalid, et al.
Published: (2019)
Basic Understanding on How Chat System Works : A Simple Protocol using Java Language
by: Nahar, H.
Published: (2011)
by: Nahar, H.
Published: (2011)
Throughput-Received Power Relationship for File Transfer Protocol (FTP) Service in Wireless Mesh Network (WMN)
by: Zakaria, Mohd Sharim, et al.
Published: (2010)
by: Zakaria, Mohd Sharim, et al.
Published: (2010)
Performance Optimization of Java Virtual Machine on Dual-Core Technology for Web Services - A Study
by: Mun, Chong Kam, et al.
Published: (2007)
by: Mun, Chong Kam, et al.
Published: (2007)
Development of data persistent framework for modelling entity and entity relationship using DB4O object database
with Java
by: Yap, Ken, Chee Kian
Published: (2013)
by: Yap, Ken, Chee Kian
Published: (2013)
Initial File-Placement In Data Grid Environment Using Game Theory And Fictitious Play
by: Indrayanto, Aloysius
Published: (2008)
by: Indrayanto, Aloysius
Published: (2008)
Using normalize time spent on a Web page for Web personalization
by: Ahmad, Abdul Manan, et al.
Published: (2004)
by: Ahmad, Abdul Manan, et al.
Published: (2004)
Enhancing Match Detection Process Using Chi-Square Equation for Improving Type-3 and Type-4 Clones in Java Applications
by: Noormaizzattul Akmaliza, Abdullah, et al.
Published: (2025)
by: Noormaizzattul Akmaliza, Abdullah, et al.
Published: (2025)
Mobile data service in Java 2 Platform Micro Edition (J2ME): mobile order
by: Muhammed Yusof, Zulkefli, et al.
Published: (2011)
by: Muhammed Yusof, Zulkefli, et al.
Published: (2011)
Identification of characteristic features of Java programming language for application tool on a lower end mobile phone
by: Abd. Ridzab, Faizul Azli, et al.
Published: (2005)
by: Abd. Ridzab, Faizul Azli, et al.
Published: (2005)
Web page recommendation model for web personalization
by: Ahmad, Abdul Manan, et al.
Published: (2004)
by: Ahmad, Abdul Manan, et al.
Published: (2004)
Speech processing in Java-based PC speech commanding application
by: T.C., Nguyen, et al.
Published: (2007)
by: T.C., Nguyen, et al.
Published: (2007)
Implementation of dynamic fuzzy logic control of traffic
light with accident detection and action system using iTraffic simulation
Simulation
by: Alkandari, Abdulrahman, et al.
Published: (2018)
by: Alkandari, Abdulrahman, et al.
Published: (2018)
Multimedia elements and internet
by: J. Badi, Maimona, et al.
Published: (2011)
by: J. Badi, Maimona, et al.
Published: (2011)
Similar Items
-
Protection of the digital holy Quran using IT techniques
by: Alahmad, Mohammad, et al.
Published: (2017) -
Protection of the texts using Base64 and MD5
by: Taha, Imad, et al.
Published: (2012) -
Protection of text using SHA1 and Base64
by: Taha, Imad, et al.
Published: (2012) -
Protection of the digital holy Quran using SAB hash function
by: Alshaikhli, Imad Fakhri Taha, et al.
Published: (2013) -
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
by: Naji, Ahmed Wathik, et al.
Published: (2009)