PESAT application Personal Security Administrator Tool / Law Yong Jin
The thesis report is written to describe the development of PESAT application in depth. It contains from the project objective, definition, scope from the beginning; extends to literature review, study on existing application, software process model, and application development tool, functional and...
| Main Author: | Law , Yong Jin |
|---|---|
| Format: | Thesis |
| Published: |
2004
|
| Subjects: | |
| Online Access: | http://studentsrepo.um.edu.my/11373/ http://studentsrepo.um.edu.my/11373/1/law_yong_jin.pdf |
Similar Items
Lecturing materials generating tools (LMaGTool): Tools to support notes generating task / Law Yong Sein
by: Law , Yong Sein
Published: (2002)
by: Law , Yong Sein
Published: (2002)
Internet information server scanner : scanning on URL vulnerabilities / Tan Yu Jin.
by: Tan, Yu Jin
Published: (2002)
by: Tan, Yu Jin
Published: (2002)
Virtual Multimedia E-tour system / Yong Teik Hwa
by: Yong , Teik Hwa
Published: (2002)
by: Yong , Teik Hwa
Published: (2002)
Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong
by: Chong, Chun Yong
Published: (2016)
by: Chong, Chun Yong
Published: (2016)
Electronic marketing / Choo Sin Yong
by: Choo, Sin Yong
Published: (2001)
by: Choo, Sin Yong
Published: (2001)
Network security tools-firewall / Ding Khoon Chong
by: Ding, Khoon Chong
Published: (2005)
by: Ding, Khoon Chong
Published: (2005)
Sistem diagnosis penyakit tanaman padi (pakar padi) / Tee Jin Gee
by: Tee, Jin Gee
Published: (2000)
by: Tee, Jin Gee
Published: (2000)
School student administration system
by: Mohd Ridhuan, Hussain
Published: (2013)
by: Mohd Ridhuan, Hussain
Published: (2013)
Toolchain development and queue system enhanced security coprocessor for FPGA-based internet of things (IoT) processor
by: See, Jin Chuan
Published: (2019)
by: See, Jin Chuan
Published: (2019)
Application of ECO-CBR Tool for Sustainability Product Design
by: Awanis, Romli, et al.
Published: (2016)
by: Awanis, Romli, et al.
Published: (2016)
Mobile application for concrete strength measurement tools by exploiting heat imaging information
by: Nur Farhana Nabila, Zulkifli
Published: (2019)
by: Nur Farhana Nabila, Zulkifli
Published: (2019)
Healthy lifestyle application
by: Chuah, Pei Jin
Published: (2018)
by: Chuah, Pei Jin
Published: (2018)
Smart home security
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
by: Mohammad Syafi Azim, Mohd Razam
Published: (2019)
Reducing Risks and Enhancing Security and Privacy in IoT-based Health Monitoring Application using Blockchain Technology
by: Chitra, Batumalai, et al.
Published: (2022)
by: Chitra, Batumalai, et al.
Published: (2022)
Model driven security frameworks for addressing security problems of Service Oriented Architecture
by: Saleem, M. Q., et al.
Published: (2010)
by: Saleem, M. Q., et al.
Published: (2010)
Securing e-learning environment: A study of security awareness and behavior of user
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
Data Protection Laws
by: Alginahi, Hiba, et al.
Published: (2019)
by: Alginahi, Hiba, et al.
Published: (2019)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
Inculcating secure coding for beginners
by: A. Aziz, Normaziah, et al.
Published: (2017)
by: A. Aziz, Normaziah, et al.
Published: (2017)
Enhancement of multicast network security
by: Ali, Sellami, et al.
Published: (2013)
by: Ali, Sellami, et al.
Published: (2013)
Using SAW, WPM, TOPSIS, AHP for selection of academic administrator roles in public university in Malaysia
by: Yau’Mee Hayati, Mohamed Yusof, et al.
Published: (2020)
by: Yau’Mee Hayati, Mohamed Yusof, et al.
Published: (2020)
A secure audio steganography approach
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Postprocessing algorithm for security features extraction
by: Rozita, Mohd Yusof, et al.
Published: (2012)
by: Rozita, Mohd Yusof, et al.
Published: (2012)
Multibiometric systems and template security survey
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
IPTV network security: threats and countermeasures
by: M. S. A., Noman Ranak, et al.
Published: (2018)
by: M. S. A., Noman Ranak, et al.
Published: (2018)
A review on cloud computing security
by: Teo, Marry, et al.
Published: (2018)
by: Teo, Marry, et al.
Published: (2018)
An online tool for Metagenomics analysis
by: Phong, Cheralyn Jia Ern
Published: (2018)
by: Phong, Cheralyn Jia Ern
Published: (2018)
Online personal tutoring system
by: Kanagesswary, Shanmuganathan
Published: (2013)
by: Kanagesswary, Shanmuganathan
Published: (2013)
Security of NFC payment on mobile payment application
by: Wong, Wen Teng
Published: (2018)
by: Wong, Wen Teng
Published: (2018)
Web-based internet security / Zuriani Karia
by: Zuriani, Karia
Published: (2003)
by: Zuriani, Karia
Published: (2003)
A Survey of UML Tools
by: Weng, Jie Thong, et al.
Published: (2015)
by: Weng, Jie Thong, et al.
Published: (2015)
Green IT/IS assessment tool for enterprises
by: Mazlina, Abdul Majid, et al.
Published: (2018)
by: Mazlina, Abdul Majid, et al.
Published: (2018)
Blockchain technology for security issues and challenges in IoT
by: Kumar, Nallapaneni Manoj, et al.
Published: (2018)
by: Kumar, Nallapaneni Manoj, et al.
Published: (2018)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Next generation security operation center framework
by: Mohamad Fadli, Zolkipli, et al.
Published: (2018)
by: Mohamad Fadli, Zolkipli, et al.
Published: (2018)
Green information technology adoption towards a sustainability policy agenda for government-based institutions: an administrative perspective
by: Anthony Jnr, Bokolo, et al.
Published: (2018)
by: Anthony Jnr, Bokolo, et al.
Published: (2018)
Requirements management tools / Ameran Jaffar
by: Ameran, Jaffar
Published: (2004)
by: Ameran, Jaffar
Published: (2004)
A Survey of Petri Net Tools
by: Thong, Weng Jie, et al.
Published: (2015)
by: Thong, Weng Jie, et al.
Published: (2015)
Interactive online tool for methylation studies
by: Cheah, Zhao Qin
Published: (2018)
by: Cheah, Zhao Qin
Published: (2018)
Personal Health Records Mobile App
by: Leong, Xian Jun
Published: (2020)
by: Leong, Xian Jun
Published: (2020)
Similar Items
-
Lecturing materials generating tools (LMaGTool): Tools to support notes generating task / Law Yong Sein
by: Law , Yong Sein
Published: (2002) -
Internet information server scanner : scanning on URL vulnerabilities / Tan Yu Jin.
by: Tan, Yu Jin
Published: (2002) -
Virtual Multimedia E-tour system / Yong Teik Hwa
by: Yong , Teik Hwa
Published: (2002) -
Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong
by: Chong, Chun Yong
Published: (2016) -
Electronic marketing / Choo Sin Yong
by: Choo, Sin Yong
Published: (2001)