Information technology security
The objective of this book is to introduce student in preparing a secure computing environment in theory and practical by using secure software, hardware and network. The task in the lab project will involve the managing setup process, PGP application, preventive tools, anti-virus and other securit...
| Main Authors: | Selamat, Siti Rahayu, Yusof, Robiah, Abdollah, Mohd Faizal, Bahaman, Nazrulazhar |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Pearson-Prentice Hall
2006
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/263/ http://eprints.utem.edu.my/id/eprint/263/1/IT_sec-Pearson.pdf |
Similar Items
BITS 3423-Information technology security
by: Selamat, Siti Rahayu, et al.
Published: (2006)
by: Selamat, Siti Rahayu, et al.
Published: (2006)
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Assessing Malacca wireless security implementation in government and private sector companies in – A case study
by: Othman, Mohd Fairuz Iskandar, et al.
Published: (2008)
by: Othman, Mohd Fairuz Iskandar, et al.
Published: (2008)
Blockchain technology can improve food supply chain security
by: Mimi Rabita, Abdul Wahit, et al.
Published: (2020)
by: Mimi Rabita, Abdul Wahit, et al.
Published: (2020)
Alert Correlation Technique Analysis For Diverse Log
by: Yusof, R., et al.
Published: (2008)
by: Yusof, R., et al.
Published: (2008)
In-Service Teachers' Views Toward Technology And Teaching And Their Perceived Competence Toward Information Technology (It)
by: Sa'ari, Juanna Risah, et al.
Published: (2005)
by: Sa'ari, Juanna Risah, et al.
Published: (2005)
IN-service teachers' views toward technology and teaching and their perceived competence toward information technology (IT)
by: Sa'ari, Juanna Risah, et al.
Published: (2005)
by: Sa'ari, Juanna Risah, et al.
Published: (2005)
Integrating Strategic Information Security with Strategic Information Systems Planning (SISP)
by: Selamat, Md. Hafiz, et al.
Published: (2006)
by: Selamat, Md. Hafiz, et al.
Published: (2006)
Statistical Approach for Validating Static Threshold in Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Enhanced Alert Correlation Framework for Heterogeneous Log
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Threshold verification using Statistical Approach for Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Security issues with health care information technology
by: Mahmoud, Ahmed Mohamed, et al.
Published: (2015)
by: Mahmoud, Ahmed Mohamed, et al.
Published: (2015)
A Novel Approach on Teaching Network Security for ICT Courses
by: Md Khambari, M. N., et al.
Published: (2009)
by: Md Khambari, M. N., et al.
Published: (2009)
An Improved Traditional Worm Attack Pattern
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
Information systems security management maturity model
for electronic commerce small medium industries and
enterprises (smi/e) using technology, organization and
environment framework / Azah Anir Binti Norman
by: Norman, Azah Anir
Published: (2014)
by: Norman, Azah Anir
Published: (2014)
An analysis of information security awareness within home and work environments
by: Talib, Shuhaili, et al.
Published: (2010)
by: Talib, Shuhaili, et al.
Published: (2010)
Network Administration & Management
by: Yusof, R., et al.
Published: (2007)
by: Yusof, R., et al.
Published: (2007)
Green information technology and green information systems: Science mapping of present and future trends
by: Mohd Nazim, Mat Nawi, et al.
Published: (2024)
by: Mohd Nazim, Mat Nawi, et al.
Published: (2024)
A New Generic Taxonomy on Hybrid Malware Detection Technique
by: Yusof, R., et al.
Published: (2009)
by: Yusof, R., et al.
Published: (2009)
New Multi-step Worm Attack Model
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
Advanced Trace Pattern For Computer Intrusion Discovery
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
A New Malware Attack Pattern Generalization
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Traceability in Digital Forensic Investigation
Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
Scenario Based Worm Trace Pattern Identification Technique
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
Information Security Analysis and Solution using LSB Steganography and
AES Cryptographic Algorithm
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
Host Based Detection Approach using Time Based
Module for Fast Attack Detection Behavior
by: Abdollah, M. F., et al.
Published: (2011)
by: Abdollah, M. F., et al.
Published: (2011)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Threshold verification using statistical approach for fast attack detection
by: Abdollah, Mohd Faizal, et al.
Published: (2009)
by: Abdollah, Mohd Faizal, et al.
Published: (2009)
Strategic Information Systems Planning (SISP) and Strategic Information Security Planning (SISecP) In Malaysian Government Agencies
by: Selamat, Md. Hafiz, et al.
Published: (2006)
by: Selamat, Md. Hafiz, et al.
Published: (2006)
The Significance of Main Constructs of Theory of Planned Behavior in Recent Information Security Policy Compliance Behavior Study: A Comparison among Top Three Behavioral Theories
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
The Impact Of Information And Communication Technology (ICT) In Users' Interaction Between The Academic Staffs - Scientists/Engineers In Malaysia
by: A. Wahab, Ahmadfauzi
Published: (2004)
by: A. Wahab, Ahmadfauzi
Published: (2004)
Information security and mutual trust as determining factors for information technology outsourcing success
by: Shittu, Abdul Jaleel Kehinde, et al.
Published: (2012)
by: Shittu, Abdul Jaleel Kehinde, et al.
Published: (2012)
A secure quantum telephone system
by: Said, Ressa Suhardiman, et al.
Published: (2009)
by: Said, Ressa Suhardiman, et al.
Published: (2009)
Tailgating/Piggybacking detection security system
by: Chan, Tjun Wern
Published: (2013)
by: Chan, Tjun Wern
Published: (2013)
The relationship between information systems resources and information security / Norizan Anwar, Prof Madya Dr. Mohamad Noorman Masrek and Yanty Rahayu Rambli
by: Anwar, Norizan, et al.
Published: (2012)
by: Anwar, Norizan, et al.
Published: (2012)
Critical security challenges in cloud computing environment: An appraisal
by: Mir, Mohammad Shuaib, et al.
Published: (2017)
by: Mir, Mohammad Shuaib, et al.
Published: (2017)
Biosensor technology
by: M. M., Yusoff, et al.
Published: (2011)
by: M. M., Yusoff, et al.
Published: (2011)
Persuasive technology for improving information security awareness and behavior: literature review
by: Bawazir, Mohammed Abdullah, et al.
Published: (2016)
by: Bawazir, Mohammed Abdullah, et al.
Published: (2016)
Persuasive technology contributions toward enhance information security awareness in an organization
by: Qudaih, Hani A., et al.
Published: (2014)
by: Qudaih, Hani A., et al.
Published: (2014)
Similar Items
-
BITS 3423-Information technology security
by: Selamat, Siti Rahayu, et al.
Published: (2006) -
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010) -
Assessing Malacca wireless security implementation in government and private sector companies in – A case study
by: Othman, Mohd Fairuz Iskandar, et al.
Published: (2008) -
Blockchain technology can improve food supply chain security
by: Mimi Rabita, Abdul Wahit, et al.
Published: (2020) -
Alert Correlation Technique Analysis For Diverse Log
by: Yusof, R., et al.
Published: (2008)