Towards Islamic ethics in professional penetration testing
Frequent technological advances in the field of computing have resulted in a rapid increase in creation of new loopholes in systems. To secure their computing systems, big companies resort to use penetration testing as a solution whereby an external company is hired to evaluate the security of the...
| Main Author: | Habaebi, Mohamed Hadi |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Revelation and Science, IIUM
2013
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/33801/ http://irep.iium.edu.my/33801/1/97-363-1-PB.pdf |
Similar Items
Ethical communication in IT project from an Islamic perspective
by: Nizam, Mohamed, et al.
Published: (2012)
by: Nizam, Mohamed, et al.
Published: (2012)
Information security for professional counseling in organization
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016)
Factors influence novice programmers toward test first approach
by: Yahya, Norzariyah, et al.
Published: (2019)
by: Yahya, Norzariyah, et al.
Published: (2019)
Introducing autonomy in internet of things
by: Ashraf , Qazi Mamoon, et al.
Published: (2015)
by: Ashraf , Qazi Mamoon, et al.
Published: (2015)
Building textual OLAP cubes using real-time intelligent heterogeneous approach
by: Alzeini, Haytham I. M., et al.
Published: (2018)
by: Alzeini, Haytham I. M., et al.
Published: (2018)
Ethical perspective of students in Global Learning Environment
by: Muhammad, AbdulHafeez, et al.
Published: (2013)
by: Muhammad, AbdulHafeez, et al.
Published: (2013)
Ethical based mathematical model to evaluate software engineering
by: Hameed, Shihab A., et al.
Published: (2013)
by: Hameed, Shihab A., et al.
Published: (2013)
Ethical based mathematical model to evaluate software engineering
by: Hameed, Shihab A., et al.
Published: (2012)
by: Hameed, Shihab A., et al.
Published: (2012)
A study to investigate state of ethical Development in E-learning
by: Muhammad, AbdulHafeez, et al.
Published: (2016)
by: Muhammad, AbdulHafeez, et al.
Published: (2016)
Resolving ethical dilemma in technology enhanced education through smart mobile devices
by: Muhammad, AbdulHafeez, et al.
Published: (2015)
by: Muhammad, AbdulHafeez, et al.
Published: (2015)
How IT can enhance professional practice with regards to smart-phones and social networks?
by: Hassan, Nuradin Ibrahim, et al.
Published: (2016)
by: Hassan, Nuradin Ibrahim, et al.
Published: (2016)
Gateway sink placement for sensor node grid distribution in LoRa smart city networks
by: Zainal, Nur Aishah, et al.
Published: (2018)
by: Zainal, Nur Aishah, et al.
Published: (2018)
Selecting respondents for survey questionnaire in Islamic way
by: Shah, Asadullah, et al.
Published: (2017)
by: Shah, Asadullah, et al.
Published: (2017)
Measurable reliability dimensions for Islamic websites
by: Nassr, Rasheed, et al.
Published: (2013)
by: Nassr, Rasheed, et al.
Published: (2013)
Toward managing security cost for healthcare information
by: Hameed, Shihab A., et al.
Published: (2012)
by: Hameed, Shihab A., et al.
Published: (2012)
Consumers' perceptions towards mobile halal application system
by: Abu Bakar, Elistina, et al.
Published: (2014)
by: Abu Bakar, Elistina, et al.
Published: (2014)
Web user' knowledge and their behavior towards security threats and vulnerabilities
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
by: Aldossary, Alia Ahmed, et al.
Published: (2016)
Citizen experience towards humanizing digital government: a case in Malaysia
by: Hussein, Idyawati, et al.
Published: (2017)
by: Hussein, Idyawati, et al.
Published: (2017)
Toward user awareness and acceptance of Sudan E-government: adoption and security perspective
by: Khalifa, Othman Omran, et al.
Published: (2016)
by: Khalifa, Othman Omran, et al.
Published: (2016)
Towards implementing a privacy policy: an observation on existing practices in hospital information system
by: Samsuri, Suhaila, et al.
Published: (2011)
by: Samsuri, Suhaila, et al.
Published: (2011)
A Web 2.0-based collaborative learning to promote the practices of Islam as a way of life
by: Ataie, Fariba, et al.
Published: (2019)
by: Ataie, Fariba, et al.
Published: (2019)
Prevalence of mobile usage among university students: a case study of International Islamic University Malaysia
by: Qadri, Mehran, et al.
Published: (2015)
by: Qadri, Mehran, et al.
Published: (2015)
Innovative Web2.0 based collaborative learning and study circle model: integrating Islamic Revealed Knowledge and Human Science
by: Shah, Asadullah
Published: (2014)
by: Shah, Asadullah
Published: (2014)
Simplified channel authentication algorithm for secure quantum key distribution
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014)
by: Elwadeya, Mohamed Youssef Khalaf, et al.
Published: (2014)
Parameters used in gateway selection schemes for Internet connected MANETs: a review
by: Mahmood, Zainab S., et al.
Published: (2015)
by: Mahmood, Zainab S., et al.
Published: (2015)
A Q-Switched thulium-doped fiber laser with a graphene thin film-based saturable absorber
by: Saidin, Norraida, et al.
Published: (2013)
by: Saidin, Norraida, et al.
Published: (2013)
New estimates of single photon parameters for satellite-based QKD
by: Ali, Sellami, et al.
Published: (2009)
by: Ali, Sellami, et al.
Published: (2009)
Fiber and free-space practical decoy state QKD for both BB84
and SARG04 protocols
by: Ali, Sellami, et al.
Published: (2010)
by: Ali, Sellami, et al.
Published: (2010)
A novel scheme of binding update no sense drop BCE in LMA
by: Geaiger, Mohamed, et al.
Published: (2014)
by: Geaiger, Mohamed, et al.
Published: (2014)
Mobile security and privacy in smartphone technology
by: Ibrahim, Mohamed, et al.
Published: (2015)
by: Ibrahim, Mohamed, et al.
Published: (2015)
Wireless energy harvesting for portable devices using split ring resonator
by: Zainal ‘Abidin, Balqis Mohamed, et al.
Published: (2015)
by: Zainal ‘Abidin, Balqis Mohamed, et al.
Published: (2015)
Video viewing and streaming enhancement
by: Khalifa, Othman Omran, et al.
Published: (2014)
by: Khalifa, Othman Omran, et al.
Published: (2014)
Edward Snowden disclosures turn the fears of surveillance into reality: the impact and transformation in information security
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
by: Mohamed Mahmoud, Fatimetou Zahra, et al.
Published: (2016)
Space Debris Low Earth Orbit (LEO)
by: Ahmed Mohamed, Fatima, et al.
Published: (2015)
by: Ahmed Mohamed, Fatima, et al.
Published: (2015)
System and Method for Quantum Key Distribution
by: Sellami , Ali, et al.
Published: (2012)
by: Sellami , Ali, et al.
Published: (2012)
Improvement of secure communication with continuous variable entanglement of squeezed coherent states via heterodyne detection
by: Becir, A, et al.
Published: (2010)
by: Becir, A, et al.
Published: (2010)
A linear atomic quantum coupler
by: El-Orany, Faisal A.A, et al.
Published: (2010)
by: El-Orany, Faisal A.A, et al.
Published: (2010)
Critical socio-technical issues surrounding mobile computing
by: Mohamed, Norshidah, et al.
Published: (2016)
by: Mohamed, Norshidah, et al.
Published: (2016)
Big data and its impact on IT consultancy
by: Mohamed, Habab, et al.
Published: (2016)
by: Mohamed, Habab, et al.
Published: (2016)
Node status detection and information diffusion in router network using scale-free network
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
by: Mahesar, Abdul Waheed, et al.
Published: (2014)
Similar Items
-
Ethical communication in IT project from an Islamic perspective
by: Nizam, Mohamed, et al.
Published: (2012) -
Information security for professional counseling in organization
by: Mohamed, Abdikadir Yusuf, et al.
Published: (2016) -
Factors influence novice programmers toward test first approach
by: Yahya, Norzariyah, et al.
Published: (2019) -
Introducing autonomy in internet of things
by: Ashraf , Qazi Mamoon, et al.
Published: (2015) -
Building textual OLAP cubes using real-time intelligent heterogeneous approach
by: Alzeini, Haytham I. M., et al.
Published: (2018)