Safeguarding your PC
| Format: | Article |
|---|---|
| Language: | English |
| Published: |
The Star
2008
|
| Subjects: | |
| Online Access: | http://dspace.unimap.edu.my/123456789/269 |
Similar Items
Firewalls offer stronger defences
Published: (2008)
Published: (2008)
Vista : In Or Out ?
Published: (2008)
Published: (2008)
Making Windows XP more like Vista
Published: (2008)
Published: (2008)
Free PC check - up
Published: (2008)
Published: (2008)
Komputer forensik
Published: (2010)
Published: (2010)
Move your data with you
Published: (2009)
Published: (2009)
Operating system kernel malware characterization using data-centric approach
by: Mohamad Har, Harmi Armira
Published: (2018)
by: Mohamad Har, Harmi Armira
Published: (2018)
Running Your Programs
by: Halpin, Terry, et al.
Published: (2015)
by: Halpin, Terry, et al.
Published: (2015)
Testing Your Programs
by: Halpin, Terry, et al.
Published: (2015)
by: Halpin, Terry, et al.
Published: (2015)
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
by: Hydara, Isatou
Published: (2024)
by: Hydara, Isatou
Published: (2024)
Improving
Your Program’s
Performance
by: Halpin, Terry, et al.
Published: (2015)
by: Halpin, Terry, et al.
Published: (2015)
Design of a lightweight virtual honeynet based on linux container virtualization
by: Memari, Nogol
Published: (2014)
by: Memari, Nogol
Published: (2014)
Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
by: Mohd Nasir, Rinie Narinie
Published: (2015)
by: Mohd Nasir, Rinie Narinie
Published: (2015)
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)
by: Nehzati, Seyedeh Sheida
Published: (2016)
Sistem pemilihan contoh pengaturcaraan C(S2PC) / Mohd Zulkhairi Bahari
by: Mohd Zulkhairi, Bahari
Published: (2003)
by: Mohd Zulkhairi, Bahari
Published: (2003)
An embedded database design and implementation of a parallel IEEE XTS storage encryption for mobile devices
by: Alomari, Mohammad Ahmed Mohammad
Published: (2017)
by: Alomari, Mohammad Ahmed Mohammad
Published: (2017)
CyberAid: Are your children safe from cyberbullying?
by: Thun, Lee Jia *, et al.
Published: (2021)
by: Thun, Lee Jia *, et al.
Published: (2021)
Building an evidence base for adult safeguarding?: problems with the reliability and validity of adult safeguarding databases
by: Fyson, Rachel
Published: (2015)
by: Fyson, Rachel
Published: (2015)
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
by: Mohamed Yassin, Warusia
Published: (2015)
by: Mohamed Yassin, Warusia
Published: (2015)
Accessing your farm anywhere and anytime
by: Lau, Jonathan Puong Fuang
Published: (2011)
by: Lau, Jonathan Puong Fuang
Published: (2011)
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025)
by: Fallatah, Wesam
Published: (2025)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
by: Mohamed, Amir Mohamed Talib
Published: (2012)
by: Mohamed, Amir Mohamed Talib
Published: (2012)
Kesedaran dan Amalan Keselamatan Komputer dan Internet di Kalangan Pegawai dan Penolong Pegawai Sistem Maklumat di Lima Kementerian Persekutuan di Malaysia
by: Kim, Ching Thoo
Published: (2002)
by: Kim, Ching Thoo
Published: (2002)
Cryptanalysis of El-Gamal AAs cryptosystem
by: Mandangan, Arif
Published: (2011)
by: Mandangan, Arif
Published: (2011)
Fake review annotation model and classification through reviewers' writing style
by: Shojaee, Somayeh
Published: (2019)
by: Shojaee, Somayeh
Published: (2019)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
by: Ismail, Haqi Khalid
Published: (2021)
by: Ismail, Haqi Khalid
Published: (2021)
A comparison of different technique in flow based anomaly detection
by: Salah, Mohammad
Published: (2017)
by: Salah, Mohammad
Published: (2017)
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
by: Abbas, Borkan Ahmed
Published: (2016)
by: Abbas, Borkan Ahmed
Published: (2016)
PiWall as a home traffic controller: enabling parental control and monitoring
by: Abd Razak, Nurul Imanina, et al.
Published: (2024)
by: Abd Razak, Nurul Imanina, et al.
Published: (2024)
Security alert framework using dynamic tweet-based features for phishing detection on twitter
by: Liew, Seow Wooi
Published: (2019)
by: Liew, Seow Wooi
Published: (2019)
A XML based, user-centered privacy model in pervasive
computing systems
by: Dehghantanha, Ali, et al.
Published: (2009)
by: Dehghantanha, Ali, et al.
Published: (2009)
Enhanced cuckoo malware analysis performance using cloud computing
by: Barakat, Osamah Lutf Hamood
Published: (2013)
by: Barakat, Osamah Lutf Hamood
Published: (2013)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
by: Hydara, Isatou
Published: (2015)
by: Hydara, Isatou
Published: (2015)
Scientific forensic framework for smartphones
by: Shahpasand, Maryam
Published: (2015)
by: Shahpasand, Maryam
Published: (2015)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
Proposal of CPU-Free Environment Using PC in Your Pocket Technology
by: Fatin Athirah, Azalan, et al.
Published: (2018)
by: Fatin Athirah, Azalan, et al.
Published: (2018)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
by: Abdu Muthana, Abdulrahman Ahmad
Published: (2008)
A tool for modeling software security requirements using security patterns
by: Maher, Zulfikar Ahmed
Published: (2016)
by: Maher, Zulfikar Ahmed
Published: (2016)
Secure block cipher inspired by the human immune system
by: Ariffin, Suriyani
Published: (2012)
by: Ariffin, Suriyani
Published: (2012)
Similar Items
-
Firewalls offer stronger defences
Published: (2008) -
Vista : In Or Out ?
Published: (2008) -
Making Windows XP more like Vista
Published: (2008) -
Free PC check - up
Published: (2008) -
Komputer forensik
Published: (2010)