Vulnerability analysis on the network security by using Nessus
Exploitation by attackers whose have breached the network security of some of the world's most venerable institutions and organization had become increased every year including in Faculty of Infon11ation Technology and Multimedia (FTivIM). Kolej Universiti Teknology Tun Huessein Onn (KUiT...
| Main Author: | Hamid Ali, Firkhan Ali |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2004
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/7646/ http://eprints.uthm.edu.my/7646/1/24p%20FIRKHAN%20ALI%20HAMID%20ALI.pdf |
Similar Items
Enhancement of network security by use machine learning
by: Hasan, Ahmed Raheem
Published: (2019)
by: Hasan, Ahmed Raheem
Published: (2019)
Internet Security In China
by: Jia, Xu
Published: (2005)
by: Jia, Xu
Published: (2005)
Key Management For Multicast Security
by: Daw, Win Aye
Published: (2005)
by: Daw, Win Aye
Published: (2005)
Learning Environment For PDA Security
by: Velu , Vengadeshwaran
Published: (2002)
by: Velu , Vengadeshwaran
Published: (2002)
E-store management using bell-lapadula access control security model
by: Roslan, Saidah Nafisah, et al.
Published: (2018)
by: Roslan, Saidah Nafisah, et al.
Published: (2018)
Smart security system for home (IOT)
by: Abd Oun, Muhamed Obed
Published: (2020)
by: Abd Oun, Muhamed Obed
Published: (2020)
Dynamic duty cycle mechnism for mobility in wirless sensor networks
by: Jasim, Hussein Ali
Published: (2020)
by: Jasim, Hussein Ali
Published: (2020)
Frequency hopping using CDMA to avoid malicious attack in han networks
by: Ridha, Hussein Ali
Published: (2020)
by: Ridha, Hussein Ali
Published: (2020)
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancingm Efficiency and Security of VANET
by: JUBAIR, MOHAMMED AHMED, et al.
Published: (2022)
by: JUBAIR, MOHAMMED AHMED, et al.
Published: (2022)
Solving security staff scheduling by using genetic algorithm
by: Ang, Shin Yin
Published: (2021)
by: Ang, Shin Yin
Published: (2021)
Pattern reconfigurable metamaterial antenna for 5G base station network
by: Esmail, Bashar Ali Farea
Published: (2021)
by: Esmail, Bashar Ali Farea
Published: (2021)
Web Link Classification And Aceessibillity Modelling For Web Security Enhancement
by: Chong, Chee Way
Published: (1999)
by: Chong, Chee Way
Published: (1999)
Web Link Classification And Aceessibillity Modelling For Web Security Enhancement
by: Chong, Chee Way
Published: (1999)
by: Chong, Chee Way
Published: (1999)
Web transcript verification using check digit as secure number
by: Abd Halim, Muhamad Rais, et al.
Published: (2017)
by: Abd Halim, Muhamad Rais, et al.
Published: (2017)
Internet of things security implementation using blockchain for wireless technology
by: Karim, Karim Jabur
Published: (2019)
by: Karim, Karim Jabur
Published: (2019)
Smart home security access system using field programmable gate arrays
by: Saleh, Shukur, et al.
Published: (2018)
by: Saleh, Shukur, et al.
Published: (2018)
JXME Security: Encryption Overhead In End-To-End J2ME-JXTA Systems
by: Mazlan, Rima
Published: (2008)
by: Mazlan, Rima
Published: (2008)
Study On Signature-Based Network Intrusion Detection System For High-Speed Network Using Network Processing Unit (NPU)
by: Salim, Robin
Published: (2007)
by: Salim, Robin
Published: (2007)
Integration of cellular network and wireless LAN
by: Indran, Taruna Kugan, et al.
Published: (2021)
by: Indran, Taruna Kugan, et al.
Published: (2021)
Self-Routing For Optical Burst Switched Networks
by: Mellah, H., et al.
Published: (2005)
by: Mellah, H., et al.
Published: (2005)
On the congestion control in Optical Burst Switching networks
by: Abid, A., et al.
Published: (2007)
by: Abid, A., et al.
Published: (2007)
Staged reservation scheme for optical burst switching networks
by: Abid, A., et al.
Published: (2005)
by: Abid, A., et al.
Published: (2005)
Case Study On Astro All Asia Networks PLC
by: Hong, Ng Wai
Published: (2007)
by: Hong, Ng Wai
Published: (2007)
Performance Analysis And Design Of A WDM Ring Network
by: Dambul, Katrina D.
Published: (2007)
by: Dambul, Katrina D.
Published: (2007)
Energy-Efficient Routing Algorithms For Wireless Sensor Network
by: Goh, Hock Guan
Published: (2006)
by: Goh, Hock Guan
Published: (2006)
Enhancement And Implementation Of GSM Networks In Malaysia: An Erricson Study
by: Mahboubi, Omid
Published: (2009)
by: Mahboubi, Omid
Published: (2009)
Ant Colony Optimization Approach To Communications Network Design
by: Bau, Yoon Teck
Published: (2007)
by: Bau, Yoon Teck
Published: (2007)
Selfish Nodes Detection Mechanism In Wireless Mesh Networks
by: Kai, Chong Zan
Published: (2010)
by: Kai, Chong Zan
Published: (2010)
A modified technique in RFID networking planning and optimization
by: Nawawi, Azli
Published: (2015)
by: Nawawi, Azli
Published: (2015)
An improved functional link neural network for data classification
by: Iqbal, Umer
Published: (2018)
by: Iqbal, Umer
Published: (2018)
Optimization of coded signals based on wavelet neural network
by: Ahmed, Mustafa Sami
Published: (2015)
by: Ahmed, Mustafa Sami
Published: (2015)
A case study on the extensibility of network processor based systems
by: Ng,, BK, et al.
Published: (2005)
by: Ng,, BK, et al.
Published: (2005)
Design and performance analysis of subcarrier multiplexing passive optical networks
by: Abdul Rashid, Hairul Azhar
Published: (2006)
by: Abdul Rashid, Hairul Azhar
Published: (2006)
Performance evaluation of World Wide Web over wireless networks
by: Ahmad, Nazrul Muhaimin
Published: (2006)
by: Ahmad, Nazrul Muhaimin
Published: (2006)
Echo Cancellation For Voice Over Internet Protocol (VOIP) Networks
by: Ganesan , Periakaruppan
Published: (2005)
by: Ganesan , Periakaruppan
Published: (2005)
Burst-Switched IP Over DWDM Networks: Design And Analysis
by: Abdelouahab, Abid
Published: (2007)
by: Abdelouahab, Abid
Published: (2007)
Design And Performance Analysis Of A WDM Packet Switching Network
by: Mellah, Hakim
Published: (2008)
by: Mellah, Hakim
Published: (2008)
Optical Burst Switching Network With Nolm As Buffering-Switching Device
by: Roger, Tang Mun Fai
Published: (2007)
by: Roger, Tang Mun Fai
Published: (2007)
Evaluation of quality of service in fourth generation wireless and mobile networks
by: Ghadeer, Sabah Hassan
Published: (2019)
by: Ghadeer, Sabah Hassan
Published: (2019)
Optimization of RFID network planning using MDB-FA method
by: Elewe, Adel Muhsin, et al.
Published: (2017)
by: Elewe, Adel Muhsin, et al.
Published: (2017)
Similar Items
-
Enhancement of network security by use machine learning
by: Hasan, Ahmed Raheem
Published: (2019) -
Internet Security In China
by: Jia, Xu
Published: (2005) -
Key Management For Multicast Security
by: Daw, Win Aye
Published: (2005) -
Learning Environment For PDA Security
by: Velu , Vengadeshwaran
Published: (2002) -
E-store management using bell-lapadula access control security model
by: Roslan, Saidah Nafisah, et al.
Published: (2018)