Security risk of ATM systems, case of study
| Main Authors: | Alharaki, Omarah Omar, Hweidi, Mohammed, Zeki, Akram M., Shah, Asadullah |
|---|---|
| Format: | Book Chapter |
| Language: | English |
| Published: |
IIUM Press
2011
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/20203/ http://irep.iium.edu.my/20203/1/11.pdf |
Similar Items
An overview of ATM systems security
by: Alharaki, Omarah Omar, et al.
Published: (2011)
by: Alharaki, Omarah Omar, et al.
Published: (2011)
Threats and solutions for ATM security systems
by: Alharaki, Omarah Omar, et al.
Published: (2011)
by: Alharaki, Omarah Omar, et al.
Published: (2011)
Online banking information systems acceptance: an empirical examination of system characteristics and web security
by: Chandio, Fida Hussain, et al.
Published: (2017)
by: Chandio, Fida Hussain, et al.
Published: (2017)
Security of multimedia in the web
by: Zeki, Akram M.
Published: (2011)
by: Zeki, Akram M.
Published: (2011)
Network security setting
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
ATM lane simulator / Ching Kim Joo
by: Ching, Kim Joo
Published: (2001)
by: Ching, Kim Joo
Published: (2001)
PC-Based ATM network simulator / Lai Weei Shan
by: Lai, Weei Shan
Published: (2000)
by: Lai, Weei Shan
Published: (2000)
PC-Based ATM Network Simulator / Lai Weei Shan
by: Lai, Weei Shan
Published: (2000)
by: Lai, Weei Shan
Published: (2000)
Risk identification for an information security management system implementation
by: Ramli, Noraza, et al.
Published: (2012)
by: Ramli, Noraza, et al.
Published: (2012)
Image recognition technique of road tax sticker in Malaysia
by: Alharaki, Omarah Omar, et al.
Published: (2012)
by: Alharaki, Omarah Omar, et al.
Published: (2012)
Justification of voice recognition system : case study of the Quran.
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Development of object-oriented components for ATM Network Simulation with emphasis on Congestion Control / Sin Wai Kit
by: Sin, Wai Kit
Published: (2001)
by: Sin, Wai Kit
Published: (2001)
Frequencies determination of characters for Bahasa Melayu:
results of preliminary investigation
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Load balancing and congestion control in ATM using fuzzy logic and spiking neuron network / Tan Jiann Shin
by: Tan, Jiann Shin
Published: (2005)
by: Tan, Jiann Shin
Published: (2005)
Dynamic modelling of a two-stage ATM Tandem Banyan Switch / Tham Hon Loke
by: Tham , Hon Loke
Published: (2002)
by: Tham , Hon Loke
Published: (2002)
Security risk analysis used by Kuwait government sectors
by: Al-Enezi , Khalid Abdulkareem, et al.
Published: (2014)
by: Al-Enezi , Khalid Abdulkareem, et al.
Published: (2014)
Development of objective-oriented components for ATM networks simulation with emphasis on switch architecture /
Tan Boon Pin
by: Tan, Boon Pin
Published: (2001)
by: Tan, Boon Pin
Published: (2001)
Information-based interactive services and support system
by: Amanullah, Md, et al.
Published: (2018)
by: Amanullah, Md, et al.
Published: (2018)
Computer security and ethics awareness among IIUM students: an empirical study
by: Aliyu, Mansur, et al.
Published: (2010)
by: Aliyu, Mansur, et al.
Published: (2010)
The Integration of GPS Navigator Device with Vehicles Tracking System for Rental Cars Firms
by: Alharaki, Omarah Omar, et al.
Published: (2010)
by: Alharaki, Omarah Omar, et al.
Published: (2010)
An enhanced next generation security operation center framework for information system security management
by: Yau, Ti Dun
Published: (2023)
by: Yau, Ti Dun
Published: (2023)
Security based Risk Management based on Multi-Objectives Model using QPSO
by: Noraziah, Ahmad, et al.
Published: (2014)
by: Noraziah, Ahmad, et al.
Published: (2014)
Secure framework for implementing close circuit television (CCTV) system as a crime prevention tool : case study (Malaysia)
by: Achin, Hamidi
Published: (2008)
by: Achin, Hamidi
Published: (2008)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
Improvement of the quality for digital image watermarking based on dual ISB
by: Mohammed, Ghassan N., et al.
Published: (2013)
by: Mohammed, Ghassan N., et al.
Published: (2013)
Digital image watermarking, analysis of current methods
by: Mohammed, Ghassan N., et al.
Published: (2012)
by: Mohammed, Ghassan N., et al.
Published: (2012)
High image quality watermarking model by using genetic algorithm
by: Mohammed, Ghassan N., et al.
Published: (2012)
by: Mohammed, Ghassan N., et al.
Published: (2012)
Analyzing trust and security in computing and communications systems
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
Ethical issues in e-learning.
by: Zeki, Ahmed M., et al.
Published: (2011)
by: Zeki, Ahmed M., et al.
Published: (2011)
User acceptance of ATM and transit applications embedded in Malaysia's national identity smartcard
by: Yeow, Paul H. P., et al.
Published: (2007)
by: Yeow, Paul H. P., et al.
Published: (2007)
Secure E-Voting With Blind Signature
by: Ibrahim, Subariah, et al.
Published: (2003)
by: Ibrahim, Subariah, et al.
Published: (2003)
Virtual learning environment
by: Aleshidi, Hamad A., et al.
Published: (2011)
by: Aleshidi, Hamad A., et al.
Published: (2011)
Multimedia elements and internet
by: J. Badi, Maimona, et al.
Published: (2011)
by: J. Badi, Maimona, et al.
Published: (2011)
Internet banking in Pakistan: finding complexities
by: Akhlaq, Mohammed ather, et al.
Published: (2011)
by: Akhlaq, Mohammed ather, et al.
Published: (2011)
Control panel of an oscilloscope
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Measurement techniques
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Soldering iron practice
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Internal structure of computer systems
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Basic operating system setting
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
WINPCAP : design and development of covert channel for secure communication
by: Omar, Syaril Nizam
Published: (2007)
by: Omar, Syaril Nizam
Published: (2007)
Similar Items
-
An overview of ATM systems security
by: Alharaki, Omarah Omar, et al.
Published: (2011) -
Threats and solutions for ATM security systems
by: Alharaki, Omarah Omar, et al.
Published: (2011) -
Online banking information systems acceptance: an empirical examination of system characteristics and web security
by: Chandio, Fida Hussain, et al.
Published: (2017) -
Security of multimedia in the web
by: Zeki, Akram M.
Published: (2011) -
Network security setting
by: Shah, Asadullah, et al.
Published: (2011)