Skip to content
MyTheses
  • Feedback
  • 书包: 0 items (满)
  • HOME
  • MYTHESES
  • BLOG
  • AI ASSISTANT
  • INSTITUTION
  • GUIDE & TUTORIAL
  • CONTACT
    • English
    • Français
    • 日本語
    • 中文(简体)
    • 中文(繁體)
    • اللغة العربية
    • हिंदी
高级检索
  • Identify Human Error In Using...
  • 引用
  • 发送短信
  • 打印
  • 导出纪录
    • 导出到 RefWorks
    • 导出到 EndNoteWeb
    • 导出到 EndNote
  • 添加到书包 从书包里删除
  • Permanent link
导出完成 — 

QR Code

Identify Human Error In Using Mobile Device That Lead To Security Threat

Human errors are the most critical issues that contributes to the information security threat. Mobile device are the main devices that can be manipulates by the attacker towards their victims. The attackers nowadays more interested in attacking the mobile devices because of the current trend which...

全面介绍

书目详细资料
主要作者: Abdul Mubin, Norzul Masri
格式: Thesis
语言:英语
英语
出版: 2017
主题:
Q Science (General)
QA76 Computer software
在线阅读:http://eprints.utem.edu.my/id/eprint/20742/1/Identify%20Human%20Error%20In%20Using%20Mobile%20Device%20That%20Lead%20To%20Security%20Threat%20-%20Norzul%20Masri%20Abdul%20Mubin%20-%2024%20Pages.pdf
http://eprints.utem.edu.my/id/eprint/20742/2/Identify%20Human%20Error%20In%20Using%20Mobile%20Device%20That%20Lead%20To%20Security%20Threat.pdf
  • 持有资料
  • 实物特征
  • 相似书籍
  • 职员浏览

因特网

http://eprints.utem.edu.my/id/eprint/20742/1/Identify%20Human%20Error%20In%20Using%20Mobile%20Device%20That%20Lead%20To%20Security%20Threat%20-%20Norzul%20Masri%20Abdul%20Mubin%20-%2024%20Pages.pdf
http://eprints.utem.edu.my/id/eprint/20742/2/Identify%20Human%20Error%20In%20Using%20Mobile%20Device%20That%20Lead%20To%20Security%20Threat.pdf

相似书籍

  • Classroom Management System Via Mobile Devices
    由: Norazlin, Kamaludin
    出版: (2009)
  • A press touch code based secure graphical password scheme for smart devices
    由: Al Noman Ranak, Md Sayfullah
    出版: (2018)
  • Real-Time Data Capturing for Reservoir Spillway Gate Operation Via Mobile Device
    由: Faisal, Zulhumadi
    出版: (2006)
  • A secure method to detect wormhole attack in mobile adhoc network
    由: Ardestani, Parichehr Manouchehri
    出版: (2013)
  • Mobile Computing at Sultanah Bahiyah Library : Mapping Physical Book Rack Location Using Handheld Devices
    由: Ahmad Nurzid, Rosli
    出版: (2004)

检索选项

  • 检索历史
  • 高级检索

查找更多

  • 浏览目录
  • 按字母顺序浏览
  • 探索频道
  • 课程储备
  • 新项目

需要帮助?

  • 检索技巧
  • 咨询台
  • 常见问题