Search Results - Preventive Security Force

Refine Results
  1. 1
  2. 2

    Maritime Supply Chain Security in the Indo-Pacific Region: Threats and Policy Implications for National Security and Resilience by Nguyen, Hong-Oanh, Van Balen, Michael, Ingram, Aaron, Hurd, Stephen, Chheetri, Prem, Thai, Vinh, Warren, Matthew, Booi, Kam, Oloruntoba, Richard

    Published 2022
    “…The fourth study proposes a national security-resilience framework for maritime supply chains, recapitulates security threats and advances strategies to enhance preparation and prevention, recovery from and adaptation to supply chain disruptions in the Indo-Pacific region. …”
    Get full text
  3. 3

    Cost Estimation Model for Secure Software Development by Sia Abdullah, Nur Atiqah

    Published 2011
    “…Most of the commerce websites are forced to add on security coding to prevent them from web criminal. …”
    Get full text
    Get full text
  4. 4

    External conflicts and Malaysia's National Security: the case of Daesh by El-Muhammady, Ahmad

    Published 2017
    “…Given the nature of the threats, thepaper argues Malaysia needs to take proactive measures to prevent terrorism threatsfromgrowing inside. Five recommendations areputf orward to mitigate the threats namely, allocation of significant investment in military and security expenditure, crafting National Counterterrorism Strategy, creating Cyber Force unit attached to Ministry of Defence, countering extremist ideology initiatives and being more active asf acilitator or mediator in regional conflicts.…”
    Get full text
    Get full text
  5. 5
  6. 6

    Security Enhancement of Route Optimization in Mobile IPv6 Networks by Zare Anari, Abbas Mehdizadeh

    Published 2008
    “…Several methods were proposed to secure route optimization. Return routability was adopted by Internet Engineering Task Force (IETF) with its security protocol based on RFC 3775. …”
    Get full text
    Get full text
  7. 7
  8. 8

    An implementation on domain name system security extensions framework for the support of IPv6 environment by Mantoro, Teddy, Norhanipah, Saiful Azhar, Bidin, Ahmad Fakhrurrazi

    Published 2011
    “…Domain Name System Security Extensions (DNSSEC) is a suite of Internet Engineering Task Force (IETF) specifications for securing the information provided by the Domain Name System (DNS). …”
    Get full text
    Get full text
  9. 9

    Alternative protective garment design specifications for the special operation unit of the Royal Malaysian Police Force / Muhamad Firdaus Ramli by Ramli, Muhamad Firdaus

    Published 2016
    “…In this study, the problem toward artistic exploration was required to enhance the safety protection for the security forces personnel. A research undertaking was conducted on the empirical elaboration of alternative design specifications towards the improvisation of protective garment designs…”
    Get full text
  10. 10

    The military dimension of Turkey-Qatar relations and its security impacts / Badereddin Adnan Bader Seyam by Badereddin Adnan , Bader Seyam

    Published 2019
    “…The impact of this cooperation is examined in the regional security and on the relationship between Turkey and Qatar and other Arabian Gulf countries. …”
    Get full text
    Get full text
  11. 11

    The continued existence of preventive detention law in Malaysia: whether terrorism is a justification / Musalmi Kholid, Sendra Mathew Masir and Stella Augustine Druce by Kholid, Musalmi, Masir, Sendra Mathew, Druce, Stella Augustine

    Published 2005
    “…This research is a study on the preventive detention law in Malaysia, namely the Internal Security Act (ISA) 1960 in relation to terrorism and issues revolving around it. …”
    Get full text
  12. 12
  13. 13

    A review on structured scheme representation on data security application by Mohd Salleh, Siti Norussaadah, Din, Roshidi, Zakaria, Nur Haryani, Mustapha, Aida

    Published 2018
    “…Therefore, data security is a significant area in covering the issue of security, which refers to protect the data from unwanted forces and prevent unauthorized access to a communication. …”
    Get full text
  14. 14
  15. 15

    Accounting information system security a survey of e-commerce companies in Malaysia by Raja Mohd Ali, Raja Haslinda, Mat Saat, Rafeah, Mohd Lazim, Marlina

    Published 2004
    “…The reliance on information and rapidly changing technology in Malaysia has forced organizations especially in e-commerce industry to implement comprehensive information security programs and procedures to protect their information assets. …”
    Get full text
  16. 16
  17. 17
  18. 18

    State-minority contestations in post-colonial Sri Lanka / Mansoor Mohamed Fazil by Mansoor , Mohamed Fazil

    Published 2018
    “…The strong leadership that assumed the presidency of the state, the strengthening of security forces, and subsequent implementation of sophisticated security strategies, as well as factions among elites of the social force and the global war on terrorism, are major factors that contributed to the defeat of the LTTE in 2009. …”
    Get full text
    Get full text
    Get full text
  19. 19

    Weakest bus frequency identification of power system via TFDI by Al Mentefik, Athraa Iessa Shaaban, Abdul Wahab, Noor Izzri, Mariun, Norman

    Published 2017
    “…One of the concerns in power system preventive control and security assessment is to find the point where the voltage and frequency collapse and when the system forces a severe disturbance. …”
    Get full text
    Get full text
  20. 20

    International Law Issues Arising out of Israel’s Military Attack Against Lebanon in 2006 by Eishan Jan, Mohammad Naqib

    Published 2007
    “…The question to be determined here is whether the 2006 military use of force by Israel against Lebanon falls within the ambit of general prohibition of the use of force or within anyone of the two exceptions? …”
    Get full text
    Get full text