Membershipreboot & thinktecture : The New Paradigms To Authentication & Authorization
| Main Author: | Nur Fatihah Mat Ali (Author) |
|---|---|
| Corporate Author: | Universiti Sultan Zainal Abidin Fakulti of Informatics |
| Format: | Book |
| Language: | English |
| Published: |
2019
|
| Subjects: |
Similar Items
Validation of user credentials in social network by using django backend authentication
by: Nur Izzati Sholehah Azlan
Published: (2019)
by: Nur Izzati Sholehah Azlan
Published: (2019)
Api authorization by integrating role-based access control in kubernetes
by: Mohd Asyraf Muizzuddin Yunos
by: Mohd Asyraf Muizzuddin Yunos
Spam detection using machine learning based binary classifier
by: Nor Syaidatul Amirah Abdul Hamid
Published: (2019)
by: Nor Syaidatul Amirah Abdul Hamid
Published: (2019)
Network security : an introduction to techniques & standard
by: Kamaruzzaman Seman, et al.
Published: (2007)
by: Kamaruzzaman Seman, et al.
Published: (2007)
Network Analysis Automation Openstack
by: Nurul Jannah Mohamad Yusoff
Published: (2019)
by: Nurul Jannah Mohamad Yusoff
Published: (2019)
Effect of different conditions of citric acid and acetic decontamination against escherichia coli in pegaga
by: Nurul Fatihah Ngah
Published: (2018)
by: Nurul Fatihah Ngah
Published: (2018)
Perception of former tobacco participant in Setiu,Terengganu towards new crops
by: Nurul Syahida Mohd Nasir
Published: (2012)
by: Nurul Syahida Mohd Nasir
Published: (2012)
Detection, isolation and antimicrobial testing of listeria monocytogenes in chicken from wet market
by: Norhadirah Mohd Noor
Published: (2018)
by: Norhadirah Mohd Noor
Published: (2018)
The detection, isolation and antimicrobial testing of listeria monocyttogenes in chicken from retail supermarket
by: Aisyah Amirah
Published: (2018)
by: Aisyah Amirah
Published: (2018)
Computational network science : an algorithmic approach
by: Hexmoor, Henry
Published: (2015)
by: Hexmoor, Henry
Published: (2015)
Web commerce security design and development
by: Nahari, Hadi, et al.
Published: (2011)
by: Nahari, Hadi, et al.
Published: (2011)
Improving transplanting success of banana plantnet by formulating new soil mixture in polybag
by: Ili Aisyah Kadir Mohideen
Published: (2012)
by: Ili Aisyah Kadir Mohideen
Published: (2012)
Kesesuian aplikasi struktur pembelajaan koperatif dalam pengajaran pendidikan islam tingkatan 2 berbanding pembelajaran konvensional di Sekolah Menengah Kebangsaan Agama Durian Guling, Marang
by: Nur Sabrina Joehan
Published: (2013)
by: Nur Sabrina Joehan
Published: (2013)
Stem and leaf developmental anatomy of Dioscorea Alata L.
by: Nur Diyana Jamaluddin
Published: (2012)
by: Nur Diyana Jamaluddin
Published: (2012)
Antibiotic Resistance Profiles of Clinical Staphylococcus Aureus Isolates From Terengganu
by: Fatin Naquiah Mat Ali
Published: (2014)
by: Fatin Naquiah Mat Ali
Published: (2014)
Privacy, intrusion detection, and response : technologies for protecting networks
by: Kabiri, Peyman , 1968-
Published: (2012)
by: Kabiri, Peyman , 1968-
Published: (2012)
Network security : the complete reference
by: Bragg, Roberta, et al.
Published: (2004)
by: Bragg, Roberta, et al.
Published: (2004)
Fundamentals of network security
by: Maiwald, Eric
Published: (2004)
by: Maiwald, Eric
Published: (2004)
Computer security and penetration testing
by: Basta, Alfred, et al.
Published: (2008)
by: Basta, Alfred, et al.
Published: (2008)
Adaptive security management architecture
by: Tiller, James S.
Published: (2011)
by: Tiller, James S.
Published: (2011)
Guide to network defense and countermeasures
by: Holden, Greg
Published: (2003)
by: Holden, Greg
Published: (2003)
Network attacks and defenses a hands-on approach
by: Trabelsi, Zouheir
Published: (2013)
by: Trabelsi, Zouheir
Published: (2013)
Network security current status and future directions
by: Douligeris, C. (Christos), et al.
Published: (2007)
by: Douligeris, C. (Christos), et al.
Published: (2007)
Network security fundamentals project manual
by: Reese, Rachelle, et al.
Published: (2007)
by: Reese, Rachelle, et al.
Published: (2007)
Network security
by: Shaffer, Steven L.
Published: (1994)
by: Shaffer, Steven L.
Published: (1994)
Exploiting online games cheating massively distributed systems
by: Hoglund, Greg, et al.
Published: (2008)
by: Hoglund, Greg, et al.
Published: (2008)
Guide to tactical perimeter defense becoming a security network specialist
by: Weaver, Randy 1948-, et al.
Published: (2008)
by: Weaver, Randy 1948-, et al.
Published: (2008)
Alpha-amylase inhibition of methanolic extract six varieties of Ficus deltoidea JACK
by: Munirah Mat Desa
Published: (2012)
by: Munirah Mat Desa
Published: (2012)
Securing the clicks network security in the age of social media
by: Bahadur, Gary, et al.
Published: (2012)
by: Bahadur, Gary, et al.
Published: (2012)
Allelopathic effects of rice (Oryza sativa L.) and weedy rice (Oryza spp.)
by: Nur Durrah Che Deraman
Published: (2012)
by: Nur Durrah Che Deraman
Published: (2012)
Effect of citronella grass oil (Cymbopogon nardus) and neem (Azadirachta indica) extracts on major chilli insect pests
by: Nur Fairuz Mohd. Room
Published: (2012)
by: Nur Fairuz Mohd. Room
Published: (2012)
An evaluation of GPSR routing protocol to measure the performance of the network
by: Nur Syafiqah Mohamad
Published: (2019)
by: Nur Syafiqah Mohamad
Published: (2019)
Eco-physiological study on rehabilitation of dioscorea hispida dennst. collated from Pulau Redang in three new habitats
by: Wan Mohd Rifdi Bin Wan Talib
Published: (2012)
by: Wan Mohd Rifdi Bin Wan Talib
Published: (2012)
Database security
by: Basta, Alfred, et al.
Published: (2012)
by: Basta, Alfred, et al.
Published: (2012)
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
24 deadly sins of software security programming flaws and how to fix them
by: Howard, Michael 1965-, et al.
Published: (2010)
by: Howard, Michael 1965-, et al.
Published: (2010)
Network security essentials applications and standards
by: Stallings, William
Published: (2017)
by: Stallings, William
Published: (2017)
Introduction to security and network forensics
by: Buchanan, William J. 1926-2005
Published: (2011)
by: Buchanan, William J. 1926-2005
Published: (2011)
Computer and cyber security principles, algorithm, applications, and perspectives
Understanding security issues
by: Donaldson, Scott E., et al.
by: Donaldson, Scott E., et al.
Similar Items
-
Validation of user credentials in social network by using django backend authentication
by: Nur Izzati Sholehah Azlan
Published: (2019) -
Api authorization by integrating role-based access control in kubernetes
by: Mohd Asyraf Muizzuddin Yunos -
Spam detection using machine learning based binary classifier
by: Nor Syaidatul Amirah Abdul Hamid
Published: (2019) -
Network security : an introduction to techniques & standard
by: Kamaruzzaman Seman, et al.
Published: (2007) -
Network Analysis Automation Openstack
by: Nurul Jannah Mohamad Yusoff
Published: (2019)