Network security architecture design for Malaysian maritime enforcement agency
| Main Author: | Abdul Hamid, Mahathir |
|---|---|
| Format: | Thesis |
| Published: |
2007
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/8364/ |
Similar Items
Biologically inspired architecture for securing hybrid mobile ad hoc networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Bio Inspired Intrusion Prevention and Self-healing Architecture for Network Security
by: Muna , Elsadig, et al.
by: Muna , Elsadig, et al.
A LANGUAGE TO REPRESENT SECURITY POLICY FOR MULTI-AGENCY HEALTH INFORMATION SYSTEM
by: Intan najua, kamal nasir, et al.
Published: (2008)
by: Intan najua, kamal nasir, et al.
Published: (2008)
Designing a logical security framework for enterprise service oriented architecture (ESOA)
by: Kalantari, Alaeddin
Published: (2009)
by: Kalantari, Alaeddin
Published: (2009)
Network security setting
by: Shah, Asadullah, et al.
Published: (2011)
by: Shah, Asadullah, et al.
Published: (2011)
Factors contributing to job performance at Malaysian Maritime Enforcement Agency (MMEA) / Sahaziera Sahak
by: Sahak, Sahaziera
Published: (2014)
by: Sahak, Sahaziera
Published: (2014)
Strategic Information Systems Planning (SISP) and Strategic Information Security Planning (SISecP) In Malaysian Government Agencies
by: Selamat, Md. Hafiz, et al.
Published: (2006)
by: Selamat, Md. Hafiz, et al.
Published: (2006)
Design of an Autonomic Services Oriented Architecture
by: M.A.C., Bhakti, et al.
Published: (2010)
by: M.A.C., Bhakti, et al.
Published: (2010)
An empirical study on strategic information systems planning practices on Malaysian government agencies.
by: Suhaimi, Mohd Adam, et al.
Published: (2011)
by: Suhaimi, Mohd Adam, et al.
Published: (2011)
Web-based assessment of information systems services quality in Malaysian government agencies
by: M. Masilamani, M. Poobalan
Published: (2005)
by: M. Masilamani, M. Poobalan
Published: (2005)
Research on design and implementation of secure
attribute-based encryption framework for body sensor networks
by: Tan, Yar Ling
Published: (2014)
by: Tan, Yar Ling
Published: (2014)
Integrating security services into active network
by: Mandala, Satria
Published: (2005)
by: Mandala, Satria
Published: (2005)
Anomaly network intrusion detection method in network security based on principle component analysis
by: Chimphlee, Witcha, et al.
Published: (2006)
by: Chimphlee, Witcha, et al.
Published: (2006)
Efficiency Measurement of Malaysia's Maritime Enforcement Agencies Using Data Envelopment Analysis
by: Kasmin, Sutarji
Published: (2003)
by: Kasmin, Sutarji
Published: (2003)
BIOLOGICALLY INSPIRED PROTOCOL FOR SECURING A CLASS OF NETWORKS
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Wireless Networks and Security: Issues, Challenges and Research Trends
by: Khan, Shafiullah, et al.
Published: (2012)
by: Khan, Shafiullah, et al.
Published: (2012)
Architecture and design of web application framework: a preliminary review
by: Samingan, Mohd. Razak, et al.
Published: (2011)
by: Samingan, Mohd. Razak, et al.
Published: (2011)
Biologically Inspired Model for Securing Mobile Ad Hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Biological Inspired Approach in Parallel Immunology System for Network
Security
by: muna, elsadig, et al.
Published: (2010)
by: muna, elsadig, et al.
Published: (2010)
Hybrid Biological Intrusion Prevention and Selfhealing System for Network Security
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Biological Intrusion Prevention and Self-Healing Model for Network Security
by: Muna, Elsadig, et al.
Published: (2010)
by: Muna, Elsadig, et al.
Published: (2010)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Immune Inspired Approach for Securing Wireless Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2009)
Novel Immune-based Framework for Securing Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010)
Study on Wireless Network and Restrictive Approaches to Enhance the Data Security
by: Ponkoodalingam, Kannan, et al.
Published: (2018)
by: Ponkoodalingam, Kannan, et al.
Published: (2018)
Wireless sensor network security: Current status and future trends
by: Pathan, Al-Sakib Khan
Published: (2013)
by: Pathan, Al-Sakib Khan
Published: (2013)
WINPCAP : design and development of covert channel for secure communication
by: Omar, Syaril Nizam
Published: (2007)
by: Omar, Syaril Nizam
Published: (2007)
Software defined networking (SDN) and its security issues
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
by: Abdul Aziz, Normaziah, et al.
Published: (2019)
Biologically Inspired Model for Securing Hybrid Mobile Ad hoc Networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2008)
Enterprise security architecture framework (ESAF) for banking industry / Mahathelge Nicholas Ruwan Dias
by: Mahathelge Nicholas , Ruwan Dias
Published: (2017)
by: Mahathelge Nicholas , Ruwan Dias
Published: (2017)
Information security culture guidelines to improve employee’s security behavior: A review of empirical studies
by: Akhyari, N., et al.
Published: (2018)
by: Akhyari, N., et al.
Published: (2018)
RFID-based vehicle speed monitoring and enforcement system
by: Tan, Kai Xian
Published: (2018)
by: Tan, Kai Xian
Published: (2018)
A secure and sustainable framework to mitigate hazardous activities in online social networks
by: Rahman, Md. Arafatur, et al.
Published: (2020)
by: Rahman, Md. Arafatur, et al.
Published: (2020)
An integrated vision-based architecture for home security system
by: See, J., et al.
Published: (2007)
by: See, J., et al.
Published: (2007)
Network security tools-firewall / Ding Khoon Chong
by: Ding, Khoon Chong
Published: (2005)
by: Ding, Khoon Chong
Published: (2005)
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
by: Akhyari, Nasir
Published: (2019)
by: Akhyari, Nasir
Published: (2019)
Information Security Policy Compliance Behavior Based on Comprehensive Dimensions of Information Security Culture: A Conceptual Framework
by: Nasir, Akhyari, et al.
Published: (2017)
by: Nasir, Akhyari, et al.
Published: (2017)
The Formulation of Comprehensive Information Security Culture Dimensions for Information Security Policy Compliance Study
by: Nasir, Akhyari, et al.
Published: (2018)
by: Nasir, Akhyari, et al.
Published: (2018)
Routing protocol design for secure WSN: Review and open research issues
by: Md Zin, Shazana, et al.
Published: (2014)
by: Md Zin, Shazana, et al.
Published: (2014)
Guideline for privacy and security in Cloud First Security Environment
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
by: Abdul Aziz, Normaziah, et al.
Published: (2017)
Similar Items
-
Biologically inspired architecture for securing hybrid mobile ad hoc networks
by: Yasir Abdelgadir , Mohamed, et al.
Published: (2010) -
Bio Inspired Intrusion Prevention and Self-healing Architecture for Network Security
by: Muna , Elsadig, et al. -
A LANGUAGE TO REPRESENT SECURITY POLICY FOR MULTI-AGENCY HEALTH INFORMATION SYSTEM
by: Intan najua, kamal nasir, et al.
Published: (2008) -
Designing a logical security framework for enterprise service oriented architecture (ESOA)
by: Kalantari, Alaeddin
Published: (2009) -
Network security setting
by: Shah, Asadullah, et al.
Published: (2011)