SafeSearch – Microcomputer based VPN / Mohamad Ridzuan Mohd Alias
In networking, a VPN also known as Virtual Private Network could be described as a private network that uses public network to tunnel the connection from the user end until it reaches the VPN server. VPN allows user to create a secure connection to another network over the internet. VPNs can be used...
| Main Author: | Mohd Alias, Mohamad Ridzuan |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2020
|
| Subjects: | |
| Online Access: | https://ir.uitm.edu.my/id/eprint/32985/ |
Similar Items
Ehancing security and privacy in local area network with TORVPN using : raspberry pi as access point / Mohamad AfiqHakimi Rosli
by: Rosli, Mohamad AfiqHakimi
Published: (2019)
by: Rosli, Mohamad AfiqHakimi
Published: (2019)
A study of campus wireless network technology acceptance among student in UiTM Terengganu, Dungun Campus / Aainaa Abdul Rahim, Nur Izyan Kamaru Zaman and Zaimatul Adawiah Zainuddin
by: Abdul Rahim, Aainaa, et al.
Published: (2012)
by: Abdul Rahim, Aainaa, et al.
Published: (2012)
Tahfiz AI-Muqarrabin school website /Aisyah Fathiah Othman
by: Othman, Aisyah Fathiah
Published: (2012)
by: Othman, Aisyah Fathiah
Published: (2012)
Access control framework in a bring your own device environment
by: Morufu, Olalere
Published: (2016)
by: Morufu, Olalere
Published: (2016)
The validation and application of a new learning environment instrument to evaluate online learning in higher education
by: Chang, Vanessa, et al.
Published: (2001)
by: Chang, Vanessa, et al.
Published: (2001)
Secure software architecture approach for role-based access control using aspect-oriented design
by: Saeed Hazaa, Muneer Abdullah
Published: (2010)
by: Saeed Hazaa, Muneer Abdullah
Published: (2010)
Smart biosecurity door locking system / Nur Nadia Syahirah ‘Asri
by: ‘Asri, Nur Nadia Syahirah
Published: (2017)
by: ‘Asri, Nur Nadia Syahirah
Published: (2017)
A qualitative study of Internet use comparing the experiences of people with physical disabilities and early onset dementia
by: Young, Alexandra L.
Published: (2020)
by: Young, Alexandra L.
Published: (2020)
Chronic disease, geographic location and socioeconomic disadvantage as obstacles to equitable access to e-health
by: Han, J., et al.
Published: (2010)
by: Han, J., et al.
Published: (2010)
Enhanced Medium Access Control Protocol for Resolving Node Misbehavior in Wireless Networks
by: Nordin, Noorsalwati
Published: (2007)
by: Nordin, Noorsalwati
Published: (2007)
An improved binary method for scalar multiplication in elliptic curve cryptography
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
by: Mohamed, Mohamad Afendee, et al.
Published: (2010)
Web-based learning environments for the vision impaired
by: Permvattana, Ruchi, et al.
Published: (2010)
by: Permvattana, Ruchi, et al.
Published: (2010)
XML-based declarative access control
by: Steele, R., et al.
Published: (2005)
by: Steele, R., et al.
Published: (2005)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
Open access books: an international collaboration to explore the practical implications for librarians of increasing access to scholarly research outputs
by: Zhou, Elsie, et al.
Published: (2018)
by: Zhou, Elsie, et al.
Published: (2018)
Modified algorithm for image watermarking using 2D-DCT and elgamal cryptosystem / Nur Azien Yazid, Kamilah Abdullah and Suhaila Abd Halim
by: Yazid, Nur Azien, et al.
Published: (2019)
by: Yazid, Nur Azien, et al.
Published: (2019)
Efficient XML queries and updates encoding scheme in the presence of access control using fractional numbers
by: Nooshabadi, Meghdad Mirabi
Published: (2013)
by: Nooshabadi, Meghdad Mirabi
Published: (2013)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
by: Ismail, Haqi Khalid
Published: (2021)
by: Ismail, Haqi Khalid
Published: (2021)
Toward efficient attribute-based searchable encryption for access control over blockchain
by: Hussein, Al-Abadi Hassan Mansur
Published: (2021)
by: Hussein, Al-Abadi Hassan Mansur
Published: (2021)
Open access to scholarly communications: advantages, policy and advocacy
by: FURNIVAL, Ariadne Chloe
Published: (2010)
by: FURNIVAL, Ariadne Chloe
Published: (2010)
Fair Traffic Scheduling and Shaping Algorithms for Diffserv Networks
by: Mohamed, Mohamed Awad Elshaikh
Published: (2006)
by: Mohamed, Mohamed Awad Elshaikh
Published: (2006)
DRIVER: Building the Network for Accessing Digital Repositories across Europe
by: Feijen, Martin, et al.
Published: (2007)
by: Feijen, Martin, et al.
Published: (2007)
Public resource or private sanctuary?: access patterns and narratives from the woodland of North East Derbyshire
by: Lisewski-Hobson, Vivyan
Published: (2019)
by: Lisewski-Hobson, Vivyan
Published: (2019)
Development of automated neighborhood pattern sensitive faults syndrome generator for static random access memory
by: Rusli, Julie Roslita
Published: (2011)
by: Rusli, Julie Roslita
Published: (2011)
March-based diagnosis algorithm for static random-access memory stuck-at faults and transition faults
by: Mat Isa, Masnita
Published: (2012)
by: Mat Isa, Masnita
Published: (2012)
Personal identification by Keystroke Pattern for login security
by: Abdullah, Norhayati
Published: (2001)
by: Abdullah, Norhayati
Published: (2001)
The Right to Roam: A review of policy and management of public access to land
by: Hughes, Michael, et al.
Published: (2011)
by: Hughes, Michael, et al.
Published: (2011)
A competencies framework of visual impairments for enabling shared understanding in design
by: Reyes Cruz, Aurea Gisela
Published: (2023)
by: Reyes Cruz, Aurea Gisela
Published: (2023)
Performance analysis of dual diversity cognitive AD HOC routing protocol [D2CARP] for cognitive radio AD HOC network in term of scalability / Nur Farah Hanani Mohd Zaim
by: Mohd Zaim, Nur Farah Hanani
Published: (2019)
by: Mohd Zaim, Nur Farah Hanani
Published: (2019)
Awareness of internet banking / Wan Mohamad Nidtzar Wan Mohd Nadziham
by: Wan Mohd Nadziham, Wan Mohamad Nidtzar
Published: (2018)
by: Wan Mohd Nadziham, Wan Mohamad Nidtzar
Published: (2018)
Grid-based multi-touch gesture to enhance two-factor authentication graphical password for mobile phones
by: Zabidi, Nur Syabila
Published: (2021)
by: Zabidi, Nur Syabila
Published: (2021)
An investigation of query-by-drawing image search on mobile devices
by: Zhang, Min
Published: (2016)
by: Zhang, Min
Published: (2016)
Current issues in research communications:
open access and the research economy - 1st report to JISC, March 2010
by: Hubbard, Bill
Published: (2010)
by: Hubbard, Bill
Published: (2010)
Current issues in research communications: open access and institutional benefit - 2nd report to JISC, July 2010
by: Hubbard, Bill, et al.
Published: (2010)
by: Hubbard, Bill, et al.
Published: (2010)
Current issues in research communications: adding value and sharing research - 3rd report to JISC, December 2010
by: Hubbard, Bill, et al.
Published: (2010)
by: Hubbard, Bill, et al.
Published: (2010)
Disability, development and financial exclusion: a study of the socio-economic barriers to accessing microfinance encountered by people with physical disabilities in Kampala, Uganda
by: Hewitt, Joseph
Published: (2018)
by: Hewitt, Joseph
Published: (2018)
2.46 ghz helical antenna design for wimax and wifi application / Dayang Suhaida Awang Damit, Samihah Abdullah and Rohaiza Baharudin
by: Awang Damit, Dayang Suhaida, et al.
Published: (2013)
by: Awang Damit, Dayang Suhaida, et al.
Published: (2013)
The Copyright Amendment (Access Reform) Bill 2021 And Open Access: A Comparative Legal Perspective
by: Koutras, Nikos
Published: (2023)
by: Koutras, Nikos
Published: (2023)
Humanities researchers and open access: Opportunities for Curtin University
by: Quigley, Niamh
Published: (2021)
by: Quigley, Niamh
Published: (2021)
Using New Accessibility Tools to Guide Policy Innovation
by: Curtis, Carey, et al.
Published: (2013)
by: Curtis, Carey, et al.
Published: (2013)
Similar Items
-
Ehancing security and privacy in local area network with TORVPN using : raspberry pi as access point / Mohamad AfiqHakimi Rosli
by: Rosli, Mohamad AfiqHakimi
Published: (2019) -
A study of campus wireless network technology acceptance among student in UiTM Terengganu, Dungun Campus / Aainaa Abdul Rahim, Nur Izyan Kamaru Zaman and Zaimatul Adawiah Zainuddin
by: Abdul Rahim, Aainaa, et al.
Published: (2012) -
Tahfiz AI-Muqarrabin school website /Aisyah Fathiah Othman
by: Othman, Aisyah Fathiah
Published: (2012) -
Access control framework in a bring your own device environment
by: Morufu, Olalere
Published: (2016) -
The validation and application of a new learning environment instrument to evaluate online learning in higher education
by: Chang, Vanessa, et al.
Published: (2001)