Network Administration & Management
The objective of this module is to expose the student to network administration and management environment by using variety tools and network devices. The task will involve the setup configuration of the network. These tools will help student in understanding and applying the network administratio...
| Main Authors: | Yusof, R., Abdollah, M. F., Sahib, S. |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Venton Publishing
2007
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/264/ http://eprints.utem.edu.my/id/eprint/264/1/NAM.pdf |
Similar Items
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Feature Selection for Detecting Fast Attack in Network Intrusion Detection
by: Abdollah, M. F., et al.
Published: (2008)
by: Abdollah, M. F., et al.
Published: (2008)
Alert Correlation Technique Analysis For Diverse Log
by: Yusof, R., et al.
Published: (2008)
by: Yusof, R., et al.
Published: (2008)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Enhanced Alert Correlation Framework for Heterogeneous Log
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Threshold verification using Statistical Approach for Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
An Improved Traditional Worm Attack Pattern
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
A New Generic Taxonomy on Hybrid Malware Detection Technique
by: Yusof, R., et al.
Published: (2009)
by: Yusof, R., et al.
Published: (2009)
New Multi-step Worm Attack Model
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
A New Malware Attack Pattern Generalization
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Recognizing P2P Botnets Characteristic Through TCP Distinctive Behaviour
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
by: Abdullah, Raihana Syahirah, et al.
Published: (2011)
Scenario Based Worm Trace Pattern Identification Technique
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
Advanced Trace Pattern For Computer Intrusion Discovery
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
Traceability in Digital Forensic Investigation
Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
Host Based Detection Approach using Time Based
Module for Fast Attack Detection Behavior
by: Abdollah, M. F., et al.
Published: (2011)
by: Abdollah, M. F., et al.
Published: (2011)
Network Administration System for Bring Your Own Device (BYOD) Over Software Defined Networking
by: Gooi, Hao Ming
Published: (2017)
by: Gooi, Hao Ming
Published: (2017)
Statistical Approach for Validating Static Threshold in Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
A Novel Approach on Teaching Network Security for ICT Courses
by: Md Khambari, M. N., et al.
Published: (2009)
by: Md Khambari, M. N., et al.
Published: (2009)
Intrusion Alert Correlation Technique Analysis for Heterogeneous Log
by: Yusof, R., et al.
Published: (2008)
by: Yusof, R., et al.
Published: (2008)
Mapping Process of Digital Forensic Investigation Framework
by: Selamat, S. R., et al.
Published: (2008)
by: Selamat, S. R., et al.
Published: (2008)
Generic Taxonomy of Social Engineering Attack
by: Mohd Foozy, F, et al.
Published: (2011)
by: Mohd Foozy, F, et al.
Published: (2011)
Network Analysis and Design
by: Yusof, R.
Published: (2007)
by: Yusof, R.
Published: (2007)
Network management in distributed systems
by: Abawajy, Jemal H., et al.
Published: (2010)
by: Abawajy, Jemal H., et al.
Published: (2010)
Improving IEEE 802.11 to Support Quality of Service in Wireless Networks
by: Md Khambari, M. N., et al.
Published: (2007)
by: Md Khambari, M. N., et al.
Published: (2007)
Achieving Stable Throughput to Support QoS in IEEE 802.11 Wireless Networks
by: Md Khambari, M. N., et al.
Published: (2009)
by: Md Khambari, M. N., et al.
Published: (2009)
DIFS Modifications to Support QoS in IEEE 802.11g DCF Ad-hoc Networks
by: Md Khambari, M. N., et al.
Published: (2009)
by: Md Khambari, M. N., et al.
Published: (2009)
Improving IEEE 802.11g Mac to Support Quality of Service for Multimedia Applications in Wireless Networks
by: Md Khambari, M. N., et al.
Published: (2009)
by: Md Khambari, M. N., et al.
Published: (2009)
Information technology security
by: Selamat, Siti Rahayu, et al.
Published: (2006)
by: Selamat, Siti Rahayu, et al.
Published: (2006)
BITS 3423-Information technology security
by: Selamat, Siti Rahayu, et al.
Published: (2006)
by: Selamat, Siti Rahayu, et al.
Published: (2006)
Software Project Management
by: Zakaria, Mohd Hafiz, et al.
Published: (2007)
by: Zakaria, Mohd Hafiz, et al.
Published: (2007)
Behavioral Analysis on IPv4 Malware in both IPv4 and IPv6 Network Environment
by: M., Zulkiflee, et al.
Published: (2011)
by: M., Zulkiflee, et al.
Published: (2011)
Quality Management in Local Authorities Administration in Sarawak
by: Ahi, Sarok
Published: (2012)
by: Ahi, Sarok
Published: (2012)
Virtual Machine based Autonomous Web Server
by: Mas’ud, M. Z., et al.
Published: (2011)
by: Mas’ud, M. Z., et al.
Published: (2011)
Project Management-BITP3223, BITs3323, BITM3113
by: Zakaria, Mohd Hafiz, et al.
Published: (2006)
by: Zakaria, Mohd Hafiz, et al.
Published: (2006)
Police administration
by: Mohd Adnan, Normala
Published: (2008)
by: Mohd Adnan, Normala
Published: (2008)
Intelligent Energy Management Scheme for Home Area Networks Using Fair Emergency Demand Response Programs (FEDRP)
by: Muhammad, Ali, et al.
Published: (2013)
by: Muhammad, Ali, et al.
Published: (2013)
Eight-Chain and Full-Network Models and Their Modified Versions for Rubber Hyperelasticity: A Comparative Study
by: Hossain, Mokarram, et al.
Published: (2015)
by: Hossain, Mokarram, et al.
Published: (2015)
Project management
by: Salam, Sazilah, et al.
Published: (2009)
by: Salam, Sazilah, et al.
Published: (2009)
Tracing Technique for Blaster Attack
by: Selamat, S. R., et al.
Published: (2009)
by: Selamat, S. R., et al.
Published: (2009)
Similar Items
-
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009) -
Feature Selection for Detecting Fast Attack in Network Intrusion Detection
by: Abdollah, M. F., et al.
Published: (2008) -
Alert Correlation Technique Analysis For Diverse Log
by: Yusof, R., et al.
Published: (2008) -
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010) -
Enhanced Alert Correlation Framework for Heterogeneous Log
by: Yusof, R., et al.
Published: (2011)