Smart Bike Sharing System for Institute of Higher Learning Using Time-Based One-Time Password Algorithm
| Main Author: | Husna Humaira Abu Backer Sidek (Author) |
|---|---|
| Corporate Author: | Universiti Sultan Zainal Abidin Fakulti of Informatics |
| Format: | Book |
| Language: | English |
| Subjects: |
Similar Items
Computer security
Published: (1986)
Published: (1986)
Computers under attack intruders, worms, and viruses
by: Denning, Peter J. 1942-
Published: (1990)
by: Denning, Peter J. 1942-
Published: (1990)
Personal computer security
by: Tiley, W. Edward
Published: (1996)
by: Tiley, W. Edward
Published: (1996)
Access control, security, and trust a logical approach
by: Chin, Shiu-Kai, et al.
Published: (2011)
by: Chin, Shiu-Kai, et al.
Published: (2011)
Citrix XenApp platinum edition for Windows the official guide
by: Casselman, Brian, et al.
Published: (2009)
by: Casselman, Brian, et al.
Published: (2009)
Remote access essentials
by: Robbins, Margaret
Published: (1996)
by: Robbins, Margaret
Published: (1996)
Cryptology unlocked
by: Wobst, Reinhard, et al.
Published: (2007)
by: Wobst, Reinhard, et al.
Published: (2007)
Access control and identity management
by: Chapple, Mike
Published: (2021)
by: Chapple, Mike
Published: (2021)
Smart antennas for wireless communications IS-95 and third generation CDMA applications
by: Liberti, Joseph C. 1967-, et al.
Published: (1999)
by: Liberti, Joseph C. 1967-, et al.
Published: (1999)
One day at a time
by: Steel, Danielle
Published: (2009)
by: Steel, Danielle
Published: (2009)
Handbook of eID security : concepts, practical experiences, technologies
by: Fumy, Walter, et al.
Published: (2011)
by: Fumy, Walter, et al.
Published: (2011)
Cyrptography in constant parallel time
by: Applebaum, Benny
Published: (2014)
by: Applebaum, Benny
Published: (2014)
Times computer dictionary a guide to computer jargon
by: Wedge, Jon
Published: (1984)
by: Wedge, Jon
Published: (1984)
Secure data management 4th VLDB Workshop, SDM 200, Vienna, Austria, September 23-24, 2007 proceedings
by: Jonker, Willem 1962-, et al.
Published: (2007)
by: Jonker, Willem 1962-, et al.
Published: (2007)
Fast software encryption 14th international workshop, FSE 2007, Luxembourg, Luxembourg, March 26-28, 2007 revised selected papers
by: Biryukov, Alex
Published: (2007)
by: Biryukov, Alex
Published: (2007)
Security protocols 13th international workshop, Cambridge, UK, April 20-22, 2005 : revised selected papers
by: Christianson, Bruce
Published: (2007)
by: Christianson, Bruce
Published: (2007)
Worst-case execution time aware compilation techniques for real-time systems
by: Lokuciejewski, Paul, et al.
Published: (2011)
by: Lokuciejewski, Paul, et al.
Published: (2011)
Implementing NAP and NAC security technologies the complete guide to network access control
by: Hoffman, Daniel (Daniel V.) 1972-
Published: (2008)
by: Hoffman, Daniel (Daniel V.) 1972-
Published: (2008)
Security information and event management (SIEM) implementation
by: Miller, David 1959 November 5-
Published: (2011)
by: Miller, David 1959 November 5-
Published: (2011)
Api authorization by integrating role-based access control in kubernetes
by: Mohd Asyraf Muizzuddin Yunos
by: Mohd Asyraf Muizzuddin Yunos
Open access what you need to know now
by: Crawford, Walt
Published: (2011)
by: Crawford, Walt
Published: (2011)
Complete bike book
by: Sidwells, Chris
Published: (2003)
by: Sidwells, Chris
Published: (2003)
Shared Encounters
by: Willis, Katharine S.
Published: (2010)
by: Willis, Katharine S.
Published: (2010)
Access 2000 client/server solutions
by: Klander, Lars
Published: (2000)
by: Klander, Lars
Published: (2000)
Algorithms sequential, parallel and distributed
by: Berman, Kenneth A., et al.
Published: (2005)
by: Berman, Kenneth A., et al.
Published: (2005)
Windows 2000 Professional in record time
by: Dyson, Peter
Published: (2000)
by: Dyson, Peter
Published: (2000)
LAN times guide to multimedia networking
by: Cox, Nancy
Published: (1995)
by: Cox, Nancy
Published: (1995)
Problem-solving cases in microsoft access and excel
by: Brady, Joseph A., et al.
Published: (2008)
by: Brady, Joseph A., et al.
Published: (2008)
Problem-solving cases in Microsoft Access and Excel
by: Brady, Joseph A., et al.
Published: (2007)
by: Brady, Joseph A., et al.
Published: (2007)
Access 97 developer's handbook
by: Litwin, Paul, et al.
Published: (1997)
by: Litwin, Paul, et al.
Published: (1997)
Computer graphics algorithms
by: Hedrick, Rozella
Published: (2012)
by: Hedrick, Rozella
Published: (2012)
Concurrent and real-time programming in Java
by: Wellings, Andrew J.
Published: (2004)
by: Wellings, Andrew J.
Published: (2004)
Lan Times guide to managing remote connectivity
by: Salamone, Salvatore L.
Published: (1997)
by: Salamone, Salvatore L.
Published: (1997)
Computer security
by: Galley, Shari Mendelson
Published: (1987)
by: Galley, Shari Mendelson
Published: (1987)
Computer security handbook strategies and techniques for preventing data loss or theft
by: Maulton, Rolf T.
Published: (1986)
by: Maulton, Rolf T.
Published: (1986)
Go! with Microsoft Office Access 2003 comprehensive
by: Foster-Turpen, Linda, et al.
Published: (2004)
by: Foster-Turpen, Linda, et al.
Published: (2004)
Modern cryptography theory and practice
by: Mao, Wenbo
Published: (2004)
by: Mao, Wenbo
Published: (2004)
High-level subject access tools and techniques in Internet cataloging
by: Ahronheim, Judith R.
Published: (2002)
by: Ahronheim, Judith R.
Published: (2002)
Building accounting systems using Access 2007
by: Perry, James T., et al.
Published: (2010)
by: Perry, James T., et al.
Published: (2010)
On time! on track! on target! managing your projects successfully with Microsoft Project
by: Biafore, Bonnie
Published: (2006)
by: Biafore, Bonnie
Published: (2006)
Similar Items
-
Computer security
Published: (1986) -
Computers under attack intruders, worms, and viruses
by: Denning, Peter J. 1942-
Published: (1990) -
Personal computer security
by: Tiley, W. Edward
Published: (1996) -
Access control, security, and trust a logical approach
by: Chin, Shiu-Kai, et al.
Published: (2011) -
Citrix XenApp platinum edition for Windows the official guide
by: Casselman, Brian, et al.
Published: (2009)