Recommended guidelines of electronic academic assets
As the country moves into the Information Age, government agencies including universities are revolutionizing the way they operate. Computer system has become a part of their staff office equipment and most of the information kept is in the electronic form. To make this information useful, it must b...
| Main Authors: | Ibrahim, Subariah, Salleh, Mazleena |
|---|---|
| Format: | Monograph |
| Language: | English |
| Published: |
UTM
2002
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/3276/ http://eprints.utm.my/3276/1/guidelines_academic_asset.pdf |
Similar Items
Security guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002)
by: Ibrahim, Subariah, et al.
Published: (2002)
Risk analysis of cyber-campus modules (security guidelines of electronic academic assets)
by: Ibrahim, Subariah, et al.
Published: (2003)
by: Ibrahim, Subariah, et al.
Published: (2003)
Electronic Voting System: Preliminary Study
by: Ibrahim, Subariah, et al.
Published: (2000)
by: Ibrahim, Subariah, et al.
Published: (2000)
Risk analysis of cyber-campus modules (security guidelines of electronic academic assets)
by: Ibrahim, Subariah
Published: (2002)
by: Ibrahim, Subariah
Published: (2002)
Image encryption algorithm based on chaotic mapping
by: Salleh, Mazleena, et al.
Published: (2003)
by: Salleh, Mazleena, et al.
Published: (2003)
Secure E-Voting With Blind Signature
by: Ibrahim, Subariah, et al.
Published: (2003)
by: Ibrahim, Subariah, et al.
Published: (2003)
Steganography : random LSB insertion using discrete logarithm
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
by: Mohamed Amin, Muhalim, et al.
Published: (2003)
Contextual personalized recommendation technique for academic event selection / Parukutty Raman
by: Parukutty , Raman
Published: (2018)
by: Parukutty , Raman
Published: (2018)
Diffusion analysis of EFN-MDS structure
by: Ibrahim, Subariah
Published: (2006)
by: Ibrahim, Subariah
Published: (2006)
Content-based recommender system for an academic social network / Vala Ali Rohani
by: Vala Ali, Rohani
Published: (2014)
by: Vala Ali, Rohani
Published: (2014)
Eco-design based on collaborative filtering recommender system
by: Al-Bashiri, Hael, et al.
Published: (2018)
by: Al-Bashiri, Hael, et al.
Published: (2018)
Product Recommendation System (Targeted Recommendation using Deep Learning in Computer Vision)
by: Sharvinteraan, C. Mogan
Published: (2023)
by: Sharvinteraan, C. Mogan
Published: (2023)
Collaborative Filtering Recommender System: Overview and Challenges
by: Al-Bashiri, Hael, et al.
Published: (2017)
by: Al-Bashiri, Hael, et al.
Published: (2017)
Web page recommendation model for web personalization
by: Ahmad, Abdul Manan, et al.
Published: (2004)
by: Ahmad, Abdul Manan, et al.
Published: (2004)
The framework intangible information assets evaluation for adequate managerial control system
by: Ibrahim, Othman, et al.
Published: (2008)
by: Ibrahim, Othman, et al.
Published: (2008)
Comparison of TCP Variants Over Self-Similar Traffic
by: Salleh, Mazleena, et al.
Published: (2005)
by: Salleh, Mazleena, et al.
Published: (2005)
The sign tale of hurst parameter: a revisit
by: Salleh, Mazleena, et al.
Published: (2007)
by: Salleh, Mazleena, et al.
Published: (2007)
Performance of transmission control protocol on self-similar traffic.
by: Salleh, Mazleena, et al.
Published: (2005)
by: Salleh, Mazleena, et al.
Published: (2005)
The sign tale of hurst parameter : a revisit
by: Salleh, Mazleena, et al.
Published: (2007)
by: Salleh, Mazleena, et al.
Published: (2007)
Diffusion analysis of EFN-MDS structure
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
A Review on Biological Inspired Computation in Cryptology
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Symmetric Key Size for Different Level of Information Classification
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
Modified key size determination models for symmetric ciphers
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Diffusion analysis af a scalable fiestel network
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
A guideline for using web-based AHP system
by: Ayu, Media Anugerah, et al.
Published: (2011)
by: Ayu, Media Anugerah, et al.
Published: (2011)
Guideline for forensic analysis on windows XP and vista registry
by: Aghanvesi, Somayeh
Published: (2008)
by: Aghanvesi, Somayeh
Published: (2008)
Development of IT Asset Management System Application
by: Muhammad Hasif bin Rosli,
Published: (2021)
by: Muhammad Hasif bin Rosli,
Published: (2021)
Managing knowledge assets through Industrial Internship Portal (IIP)
by: M Ariffin , Mazeyanti, et al.
Published: (2009)
by: M Ariffin , Mazeyanti, et al.
Published: (2009)
Collaborative and content based filtering personalized recommender system for book / Hossein Arabi
by: Hossein, Arabi
Published: (2018)
by: Hossein, Arabi
Published: (2018)
Recommendation of experts in community question answering using tag relationship / Anitha Anandhan
by: Anitha , Anandhan
Published: (2021)
by: Anitha , Anandhan
Published: (2021)
Smart community: The Malaysian perspective
by: Mohd Yassin, Noraniah, et al.
Published: (2004)
by: Mohd Yassin, Noraniah, et al.
Published: (2004)
Real-Time Object Detection System for Hospital Assets Using YOLOv8
by: Andalusia, Friska, et al.
Published: (2024)
by: Andalusia, Friska, et al.
Published: (2024)
Avalanche Analysis of Extended Feistel Network
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Implementation guidelines of the walk-through and questionnaire techniques in the usability testing of the scrum method
by: Muhammad, A. Khairuddin, et al.
Published: (2006)
by: Muhammad, A. Khairuddin, et al.
Published: (2006)
A recommender of physical games for learning programming and computational thinking / Mohammad Ahsan Habib
by: Mohammad Ahsan , Habib
Published: (2019)
by: Mohammad Ahsan , Habib
Published: (2019)
Movie Recommendation System Based on Sentiment Analysis on Movie Reviews
by: Astried, ., et al.
Published: (2022)
by: Astried, ., et al.
Published: (2022)
A Developed Collaborative Filtering Similarity Method to Improve the Accuracy of Recommendations under Data Sparsity
by: Al-Bashiri, Hael, et al.
Published: (2018)
by: Al-Bashiri, Hael, et al.
Published: (2018)
A contextual bayesian user experience model for scholarly recommender systems / Zohreh Dehghani Champiri
by: Zohreh Dehghani , Champiri
Published: (2019)
by: Zohreh Dehghani , Champiri
Published: (2019)
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018)
by: Akhyari, N., et al.
Published: (2018)
Similar Items
-
Security guidelines of electronic academic assets
by: Ibrahim, Subariah, et al.
Published: (2002) -
Risk analysis of cyber-campus modules (security guidelines of electronic academic assets)
by: Ibrahim, Subariah, et al.
Published: (2003) -
Electronic Voting System: Preliminary Study
by: Ibrahim, Subariah, et al.
Published: (2000) -
Risk analysis of cyber-campus modules (security guidelines of electronic academic assets)
by: Ibrahim, Subariah
Published: (2002) -
Image encryption algorithm based on chaotic mapping
by: Salleh, Mazleena, et al.
Published: (2003)