Development of Security Identification and Monitoring System for Web Application
Security is an essential entity to any software application. The most famous threat to any software application is unauthorized updating and deleting of the application and data. Characteristics of a software application that could contribute to the degree of security concerns are accessibility,...
| Main Author: | Dani, Norizawati |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
1999
|
| Subjects: | |
| Online Access: | http://psasir.upm.edu.my/id/eprint/10229/ http://psasir.upm.edu.my/id/eprint/10229/1/FK_1999_4_A.pdf |
Similar Items
Internet - Based Security and Monitoring System
by: Suliman, Isameldin Mohammed
Published: (1998)
by: Suliman, Isameldin Mohammed
Published: (1998)
Bandwidth Performance Analysis of a Remote Monitoring Surveillance System
by: Syed Nor Azlan, Syarifah Ezdiani
Published: (2006)
by: Syed Nor Azlan, Syarifah Ezdiani
Published: (2006)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004)
by: H. Belgassem, Seddeq
Published: (2004)
Water security and sustainable tourism as antecedents of local community’s quality of life in Mabul Island, Malaysia
by: Khairuddin, Fatin Nornajla
Published: (2019)
by: Khairuddin, Fatin Nornajla
Published: (2019)
Design and Development of a Wireless Radio Frequency Identification Reader Communication System at UHF Band
by: Razalli, Mohammad Shahrazel
Published: (2006)
by: Razalli, Mohammad Shahrazel
Published: (2006)
Two level security approaches for secure XML database centric web services against xpath injections
by: Asmawi, Aziah
Published: (2016)
by: Asmawi, Aziah
Published: (2016)
A tool for modeling software security requirements using security patterns
by: Maher, Zulfikar Ahmed
Published: (2016)
by: Maher, Zulfikar Ahmed
Published: (2016)
A study on security of mosque / Nor Hasnida Ab Halim
by: Ab Halim, Nor Hasnida
Published: (2013)
by: Ab Halim, Nor Hasnida
Published: (2013)
Incorporation Of Certification Revocation And Time Concept Into A Trust Model For Information Security System
by: Azimzadeh, Fatemeh
Published: (2007)
by: Azimzadeh, Fatemeh
Published: (2007)
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013)
by: Hui, K., et al.
Published: (2013)
Security testing of web applications for detecting and removing second-order SQL injection vulnerabilities
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
by: Draib, Najla'a Ateeq Mohammed
Published: (2022)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
by: Mohamed, Amir Mohamed Talib
Published: (2012)
by: Mohamed, Amir Mohamed Talib
Published: (2012)
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025)
by: Fallatah, Wesam
Published: (2025)
An Integrated Firewall System Model In A Multiclient-Server Environment
by: Al-Kazwini, Hussein A. Taqi
Published: (2005)
by: Al-Kazwini, Hussein A. Taqi
Published: (2005)
Improving security requirements adequacy: an interval type 2 fuzzy logic security assessment system
by: Hibshi, Hanan, et al.
Published: (2016)
by: Hibshi, Hanan, et al.
Published: (2016)
Utilization of the dynamic laser scanning technology for monitoring, locating and classification of the city trees.
by: Al-Hader, Mahmoud, et al.
Published: (2011)
by: Al-Hader, Mahmoud, et al.
Published: (2011)
Zero distortion-based steganography for handwritten signature
by: Iranmanesh, Vahab
Published: (2018)
by: Iranmanesh, Vahab
Published: (2018)
Secure authentication for sensitive digital systems in mobile devices
by: Hussein, Khalid Waleed
Published: (2016)
by: Hussein, Khalid Waleed
Published: (2016)
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
by: Mohammed Alaidaros, Hashem
Published: (2007)
by: Mohammed Alaidaros, Hashem
Published: (2007)
Improving
Performance
in
Securities
Settlement
Systems
Using
Multithreaded
Transactions
by: Ramos, Jesus S
Published: (2009)
by: Ramos, Jesus S
Published: (2009)
The development of a measurement system for water-energy-food (WEF) security Nexus in Malaysia: wellbeing, sectoral balance and sustainable development
by: Tan, Andrew Huey Ping
Published: (2018)
by: Tan, Andrew Huey Ping
Published: (2018)
Evaluation of virtual private network employing secure on demand IP based connection (SeDIC) / Mohamed Sulaiman Sultan Suhaibuddeen
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010)
by: Sultan Suhaibuddeen, Mohamed Sulaiman
Published: (2010)
Implementation of data security system in Tabung Haji and SOCSO
by: Ahmad, Jasmin Ilyani
Published: (2003)
by: Ahmad, Jasmin Ilyani
Published: (2003)
Security assessment of FTMSK web server / Md Nazri Hashim
by: Hashim, Md Nazri
Published: (2005)
by: Hashim, Md Nazri
Published: (2005)
An Intelligent System Approach to the Dynamic Hybrid Robot Control
by: Md. Yeasin, Md. Mahmud Hasan
Published: (1996)
by: Md. Yeasin, Md. Mahmud Hasan
Published: (1996)
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
by: Hydara, Isatou
Published: (2024)
by: Hydara, Isatou
Published: (2024)
Participation of the Village Development and Security Committee Members in Community Development Programmes in Kuching, Sarawak
by: Mohd Hassan, Munirah
Published: (1997)
by: Mohd Hassan, Munirah
Published: (1997)
Effects of Croping System and Fertilizer on Sweet Corn and Vegetable Soybean Intercrop
by: Mohamoud, Abdulkadir Iman Sh.
Published: (2006)
by: Mohamoud, Abdulkadir Iman Sh.
Published: (2006)
Design and Development of an Integrated Chemical Accident System for Monitoring Risk Potential of Hazard Installation
by: El-Harbawi, Mohanad M-A.
Published: (2006)
by: El-Harbawi, Mohanad M-A.
Published: (2006)
Dynamic of Nutrients in a Recirculating Aquaponic System Using Red Tilapia (Oreochromis Sp.) and Lettuce (Lactuca Sativa Varlongifolia)
by: Rafiee, Gholamreza
Published: (2003)
by: Rafiee, Gholamreza
Published: (2003)
Menspesifikasi Metrik Reka Bentuk Dengan Menggunakan Nahu Atribut
by: Zulzalil, Hazura
Published: (1998)
by: Zulzalil, Hazura
Published: (1998)
Blockchain based security framework for device authentication and data communication in decentralized IoT network
by: Alahmed, Mahmoud Tayseer
Published: (2023)
by: Alahmed, Mahmoud Tayseer
Published: (2023)
Isolation, Identification and In-Vitro Fermentation Activity of Cellulolytic Bacteria from the Gut of Termites
by: Ramin, Mohammad
Published: (2008)
by: Ramin, Mohammad
Published: (2008)
Channel Modeling and Direction-of-Arrival Estimation in Mobile Multiple-Antenna Communication Systems
by: Ravari, Arastoo Rostami
Published: (2005)
by: Ravari, Arastoo Rostami
Published: (2005)
A Web-Based Dynamic and Interactive Distance Learning System
by: Low, Wai Yan
Published: (1999)
by: Low, Wai Yan
Published: (1999)
Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems
by: Subramaniam, Jeevan Rao
Published: (2006)
by: Subramaniam, Jeevan Rao
Published: (2006)
The Securities Industry in Malaysia: Special Reference to KLSE and the Regulatory Functions of the Securities Commission
by: Yong, Soon Ching
Published: (1997)
by: Yong, Soon Ching
Published: (1997)
Development of a Single Degree of Freedom Haptic System Handle
by: Kwa, Chin Kok
Published: (2004)
by: Kwa, Chin Kok
Published: (2004)
A study on the factors effecting yield spread of 10 years Malaysian Government Securities / Mohd Amin Abdullah
by: Abdullah, Mohd Amin
Published: (2011)
by: Abdullah, Mohd Amin
Published: (2011)
Secure block cipher inspired by the human immune system
by: Ariffin, Suriyani
Published: (2012)
by: Ariffin, Suriyani
Published: (2012)
Similar Items
-
Internet - Based Security and Monitoring System
by: Suliman, Isameldin Mohammed
Published: (1998) -
Bandwidth Performance Analysis of a Remote Monitoring Surveillance System
by: Syed Nor Azlan, Syarifah Ezdiani
Published: (2006) -
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
by: H. Belgassem, Seddeq
Published: (2004) -
Water security and sustainable tourism as antecedents of local community’s quality of life in Mabul Island, Malaysia
by: Khairuddin, Fatin Nornajla
Published: (2019) -
Design and Development of a Wireless Radio Frequency Identification Reader Communication System at UHF Band
by: Razalli, Mohammad Shahrazel
Published: (2006)