Security guidelines of electronic academic assets
As the country moves into the Information Age, the use of Information and Communication Technology (ICT) has become a ubiquitous activity in university departments for academic and administrative purposes. University academic information resources are valuable assets and the security of these asset...
| Main Authors: | Ibrahim, Subariah, Salleh, Mazleena |
|---|---|
| Format: | Conference or Workshop Item |
| Published: |
2002
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/3270/ |
Similar Items
Recommended guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002)
by: Ibrahim, Subariah, et al.
Published: (2002)
Risk analysis of cyber-campus modules (security guidelines of electronic academic assets)
by: Ibrahim, Subariah, et al.
Published: (2003)
by: Ibrahim, Subariah, et al.
Published: (2003)
Risk analysis of cyber-campus modules (security guidelines of electronic academic assets)
by: Ibrahim, Subariah
Published: (2002)
by: Ibrahim, Subariah
Published: (2002)
Electronic Voting System: Preliminary Study
by: Ibrahim, Subariah, et al.
Published: (2000)
by: Ibrahim, Subariah, et al.
Published: (2000)
Secure E-Voting With Blind Signature
by: Ibrahim, Subariah, et al.
Published: (2003)
by: Ibrahim, Subariah, et al.
Published: (2003)
Image encryption algorithm based on chaotic mapping
by: Salleh, Mazleena, et al.
Published: (2003)
by: Salleh, Mazleena, et al.
Published: (2003)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
Steganography : random LSB insertion using discrete logarithm
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018)
by: Akhyari, N., et al.
Published: (2018)
Diffusion analysis of EFN-MDS structure
by: Ibrahim, Subariah
Published: (2006)
by: Ibrahim, Subariah
Published: (2006)
A Novel Protocol For Enhancing The Security Of Electronic Transaction Using Gsm Authentication
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2006)
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2006)
The framework intangible information assets evaluation for adequate managerial control system
by: Ibrahim, Othman, et al.
Published: (2008)
by: Ibrahim, Othman, et al.
Published: (2008)
Comparison of TCP Variants Over Self-Similar Traffic
by: Salleh, Mazleena, et al.
Published: (2005)
by: Salleh, Mazleena, et al.
Published: (2005)
The sign tale of hurst parameter: a revisit
by: Salleh, Mazleena, et al.
Published: (2007)
by: Salleh, Mazleena, et al.
Published: (2007)
The sign tale of hurst parameter : a revisit
by: Salleh, Mazleena, et al.
Published: (2007)
by: Salleh, Mazleena, et al.
Published: (2007)
Performance of transmission control protocol on self-similar traffic.
by: Salleh, Mazleena, et al.
Published: (2005)
by: Salleh, Mazleena, et al.
Published: (2005)
Diffusion analysis of EFN-MDS structure
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
A Review on Biological Inspired Computation in Cryptology
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Modified key size determination models for symmetric ciphers
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Diffusion analysis af a scalable fiestel network
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Symmetric Key Size for Different Level of Information Classification
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
Design and development of a secured electronic fingerprint voting system
by: Foo, Hong Zee
Published: (2021)
by: Foo, Hong Zee
Published: (2021)
A guideline for using web-based AHP system
by: Ayu, Media Anugerah, et al.
Published: (2011)
by: Ayu, Media Anugerah, et al.
Published: (2011)
Guideline for forensic analysis on windows XP and vista registry
by: Aghanvesi, Somayeh
Published: (2008)
by: Aghanvesi, Somayeh
Published: (2008)
Development of IT Asset Management System Application
by: Muhammad Hasif bin Rosli,
Published: (2021)
by: Muhammad Hasif bin Rosli,
Published: (2021)
Managing knowledge assets through Industrial Internship Portal (IIP)
by: M Ariffin , Mazeyanti, et al.
Published: (2009)
by: M Ariffin , Mazeyanti, et al.
Published: (2009)
Smart community: The Malaysian perspective
by: Mohd Yassin, Noraniah, et al.
Published: (2004)
by: Mohd Yassin, Noraniah, et al.
Published: (2004)
Real-Time Object Detection System for Hospital Assets Using YOLOv8
by: Andalusia, Friska, et al.
Published: (2024)
by: Andalusia, Friska, et al.
Published: (2024)
Avalanche Analysis of Extended Feistel Network
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Implementation guidelines of the walk-through and questionnaire techniques in the usability testing of the scrum method
by: Muhammad, A. Khairuddin, et al.
Published: (2006)
by: Muhammad, A. Khairuddin, et al.
Published: (2006)
Semi - automated software requirement specification (SRS) document generator: The guideline to novice system analyst
by: Siti Nur Fathin Najwa, Mustaffa, et al.
Published: (2021)
by: Siti Nur Fathin Najwa, Mustaffa, et al.
Published: (2021)
Security Mechanism for MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Security Mechanism for MANETs
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
Big data security
by: Al-Shawabkeh, Mahmoud M. M.
Published: (2014)
by: Al-Shawabkeh, Mahmoud M. M.
Published: (2014)
Basics of security and cryptography
by: Pathan, Al-Sakib Khan
Published: (2014)
by: Pathan, Al-Sakib Khan
Published: (2014)
Security of present s-box
by: Taha, Imad, et al.
Published: (2012)
by: Taha, Imad, et al.
Published: (2012)
Network security setting
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Security of multimedia in the web
by: Zeki, Akram M.
Published: (2011)
by: Zeki, Akram M.
Published: (2011)
Formalising guidelines for the design of screen layouts
by: D. C. L., Ngo, et al.
Published: (2000)
by: D. C. L., Ngo, et al.
Published: (2000)
New usability guidelines with implementation ways of mobile learning application based on mobile learning usability attributes
by: Hujainah, Fadhl, et al.
Published: (2016)
by: Hujainah, Fadhl, et al.
Published: (2016)
Similar Items
-
Recommended guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002) -
Risk analysis of cyber-campus modules (security guidelines of electronic academic assets)
by: Ibrahim, Subariah, et al.
Published: (2003) -
Risk analysis of cyber-campus modules (security guidelines of electronic academic assets)
by: Ibrahim, Subariah
Published: (2002) -
Electronic Voting System: Preliminary Study
by: Ibrahim, Subariah, et al.
Published: (2000) -
Secure E-Voting With Blind Signature
by: Ibrahim, Subariah, et al.
Published: (2003)