BITS 3423-Information technology security
The objectives of this module is to introduce student in preparing a secure computing environment by using secure software, hardware and network. The task will involve the managing setup process, PGP application, preventive tools,anti-virus and other security tools. These tools will help student in...
| Main Authors: | Selamat, Siti Rahayu, Yusof, Robiah, Abdollah, Mohd Faizal, Bahaman, Nazrulazhar |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Jawatankuasa Penerbitan FTMK
2006
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/267/ http://eprints.utem.edu.my/id/eprint/267/1/IT_sec_module.pdf |
Similar Items
Information technology security
by: Selamat, Siti Rahayu, et al.
Published: (2006)
by: Selamat, Siti Rahayu, et al.
Published: (2006)
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Assessing Malacca wireless security implementation in government and private sector companies in – A case study
by: Othman, Mohd Fairuz Iskandar, et al.
Published: (2008)
by: Othman, Mohd Fairuz Iskandar, et al.
Published: (2008)
Project Management-BITP3223, BITs3323, BITM3113
by: Zakaria, Mohd Hafiz, et al.
Published: (2006)
by: Zakaria, Mohd Hafiz, et al.
Published: (2006)
Improving the security of LBlock lightweight algorithm using bit permutation
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
Blockchain technology can improve food supply chain security
by: Mimi Rabita, Abdul Wahit, et al.
Published: (2020)
by: Mimi Rabita, Abdul Wahit, et al.
Published: (2020)
Alert Correlation Technique Analysis For Diverse Log
by: Yusof, R., et al.
Published: (2008)
by: Yusof, R., et al.
Published: (2008)
Design and development of drill bit sharpening jig for bench grinder
by: Ali Zulfakar, Khairudin
Published: (2016)
by: Ali Zulfakar, Khairudin
Published: (2016)
An Efficient Image Compression Using Bit Allocation based on Psychovisual Threshold
by: Ernawan, Ferda, et al.
Published: (2016)
by: Ernawan, Ferda, et al.
Published: (2016)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
Implementation of a logistic map to calculate the bits required for digital image steganography using the least significant bit (LSB) method
by: Al Maki, Wikky Fawwaz, et al.
Published: (2023)
by: Al Maki, Wikky Fawwaz, et al.
Published: (2023)
In-Service Teachers' Views Toward Technology And Teaching And Their Perceived Competence Toward Information Technology (It)
by: Sa'ari, Juanna Risah, et al.
Published: (2005)
by: Sa'ari, Juanna Risah, et al.
Published: (2005)
IN-service teachers' views toward technology and teaching and their perceived competence toward information technology (IT)
by: Sa'ari, Juanna Risah, et al.
Published: (2005)
by: Sa'ari, Juanna Risah, et al.
Published: (2005)
Integrating Strategic Information Security with Strategic Information Systems Planning (SISP)
by: Selamat, Md. Hafiz, et al.
Published: (2006)
by: Selamat, Md. Hafiz, et al.
Published: (2006)
Statistical Approach for Validating Static Threshold in Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Enhanced Alert Correlation Framework for Heterogeneous Log
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Threshold Verification Technique for Network
Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Threshold verification using Statistical Approach for Fast Attack Detection
by: Abdollah, M. F., et al.
Published: (2009)
by: Abdollah, M. F., et al.
Published: (2009)
Security issues with health care information technology
by: Mahmoud, Ahmed Mohamed, et al.
Published: (2015)
by: Mahmoud, Ahmed Mohamed, et al.
Published: (2015)
A Novel Approach on Teaching Network Security for ICT Courses
by: Md Khambari, M. N., et al.
Published: (2009)
by: Md Khambari, M. N., et al.
Published: (2009)
An Improved Traditional Worm Attack Pattern
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
Information systems security management maturity model
for electronic commerce small medium industries and
enterprises (smi/e) using technology, organization and
environment framework / Azah Anir Binti Norman
by: Norman, Azah Anir
Published: (2014)
by: Norman, Azah Anir
Published: (2014)
An analysis of information security awareness within home and work environments
by: Talib, Shuhaili, et al.
Published: (2010)
by: Talib, Shuhaili, et al.
Published: (2010)
Network Administration & Management
by: Yusof, R., et al.
Published: (2007)
by: Yusof, R., et al.
Published: (2007)
Green information technology and green information systems: Science mapping of present and future trends
by: Mohd Nazim, Mat Nawi, et al.
Published: (2024)
by: Mohd Nazim, Mat Nawi, et al.
Published: (2024)
A New Generic Taxonomy on Hybrid Malware Detection Technique
by: Yusof, R., et al.
Published: (2009)
by: Yusof, R., et al.
Published: (2009)
New Multi-step Worm Attack Model
by: Yusof, R., et al.
Published: (2010)
by: Yusof, R., et al.
Published: (2010)
Advanced Trace Pattern For Computer Intrusion Discovery
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
A New Malware Attack Pattern Generalization
by: Yusof, R., et al.
Published: (2011)
by: Yusof, R., et al.
Published: (2011)
Traceability in Digital Forensic Investigation
Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
Scenario Based Worm Trace Pattern Identification Technique
by: Selamat, S. R., et al.
Published: (2010)
by: Selamat, S. R., et al.
Published: (2010)
Information Security Analysis and Solution using LSB Steganography and
AES Cryptographic Algorithm
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
by: Nurul Adha, Oktarini Saputri, et al.
Published: (2023)
Host Based Detection Approach using Time Based
Module for Fast Attack Detection Behavior
by: Abdollah, M. F., et al.
Published: (2011)
by: Abdollah, M. F., et al.
Published: (2011)
Time Based Intrusion Detection on Fast Attack for
Network Intrusion Detection System
by: Abdollah, M. F., et al.
Published: (2010)
by: Abdollah, M. F., et al.
Published: (2010)
Threshold verification using statistical approach for fast attack detection
by: Abdollah, Mohd Faizal, et al.
Published: (2009)
by: Abdollah, Mohd Faizal, et al.
Published: (2009)
Strategic Information Systems Planning (SISP) and Strategic Information Security Planning (SISecP) In Malaysian Government Agencies
by: Selamat, Md. Hafiz, et al.
Published: (2006)
by: Selamat, Md. Hafiz, et al.
Published: (2006)
The Significance of Main Constructs of Theory of Planned Behavior in Recent Information Security Policy Compliance Behavior Study: A Comparison among Top Three Behavioral Theories
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
The Impact Of Information And Communication Technology (ICT) In Users' Interaction Between The Academic Staffs - Scientists/Engineers In Malaysia
by: A. Wahab, Ahmadfauzi
Published: (2004)
by: A. Wahab, Ahmadfauzi
Published: (2004)
Increasing the hiding capacity of low-bit encoding audio steganography using a novel embedding technique
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
by: Olanweraju, Rashidah Funke, et al.
Published: (2013)
A compact bit string accessibility map for secure XML query processing
by: Mirabi, Meghdad, et al.
Published: (2012)
by: Mirabi, Meghdad, et al.
Published: (2012)
Similar Items
-
Information technology security
by: Selamat, Siti Rahayu, et al.
Published: (2006) -
Collaborative Security Mechanism in Detecting Intrusion Activity
by: Abdollah, M. F., et al.
Published: (2010) -
Assessing Malacca wireless security implementation in government and private sector companies in – A case study
by: Othman, Mohd Fairuz Iskandar, et al.
Published: (2008) -
Project Management-BITP3223, BITs3323, BITM3113
by: Zakaria, Mohd Hafiz, et al.
Published: (2006) -
Improving the security of LBlock lightweight algorithm using bit permutation
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)