The Awareness Of Information Security Breach Among User IT In KPTMBP
Recently, network security has become a major concern in cyber world. Thus, the need in cyber security is higher in order to make our data safety and privacy. The usages of internet are widely used in internet banking, online shopping, data storage, global positioning system, media and many other so...
| Main Author: | Othman, Intan Safina |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
UTeM
2016
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/18838/ https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=101690 HF5351.M34 2016 |
| Abstract | Abstract here |
Similar Items
Information security behaviour assessment in software-as-a-service cloud environment
by: Abdul Hamid, Hanifah
Published: (2018)
by: Abdul Hamid, Hanifah
Published: (2018)
Design And Analysis Of Auto Security Door Locking System
by: Lim, Si Qing
Published: (2016)
by: Lim, Si Qing
Published: (2016)
An Automated Approach To Elicit And Validate Security Requirements Of Mobile Application
by: Yusop, Noorrezam
Published: (2018)
by: Yusop, Noorrezam
Published: (2018)
Design and Modelling of an Energy Aware Dynamic Management for Wireless Sensor Node with Dual Harvesters
by: Abdal-Kadhim., Ali Mohammed
Published: (2020)
by: Abdal-Kadhim., Ali Mohammed
Published: (2020)
Security Risk Issues And Controls For Cloud Computing In Iraqi Government Organisations
by: Al-Zaidi., Qusay Kanaan Kadhim
Published: (2019)
by: Al-Zaidi., Qusay Kanaan Kadhim
Published: (2019)
An Efficient Energy Aware Adaptive System-On-Chip Architecture For Real-Time Video Analytics
by: Ahmed, Hisham Ahmed Ali
Published: (2016)
by: Ahmed, Hisham Ahmed Ali
Published: (2016)
Multiple Road Users Detection And Tracking System In Urban Mixed Traffic Scenes
by: Chan, Zhen Yu
Published: (2020)
by: Chan, Zhen Yu
Published: (2020)
IoT data encryption algorithm for security
by: Kanaan Ismael, Marwan
Published: (2020)
by: Kanaan Ismael, Marwan
Published: (2020)
Trustworthiness verification method for social media information
by: Khairuddin Yap, Mohamad Nazri
Published: (2022)
by: Khairuddin Yap, Mohamad Nazri
Published: (2022)
Eliciting security requirements for internet of things software application development using semi-formalized model approach
by: Ibrahim, Asma Asdayana
Published: (2022)
by: Ibrahim, Asma Asdayana
Published: (2022)
Modelling and usability evaluation of collaborative awareness in synchronous distributed groupware for home modification
by: Lim, Tek Yong
Published: (2008)
by: Lim, Tek Yong
Published: (2008)
Integrated Security And Privacy Preservation Approach In Mobile Crowd Sensing
by: Pius, Owoh Nsikak
Published: (2020)
by: Pius, Owoh Nsikak
Published: (2020)
Preventing Spam Blogs Using Content Analysis and User Behaviour Model
by: Mohammad Hafiz, Ismail
Published: (2007)
by: Mohammad Hafiz, Ismail
Published: (2007)
A multicriteria aware optimal routing approach for enhancing quality of service in device to device communication / Valmik Tilwari
by: Valmik , Tilwari
Published: (2020)
by: Valmik , Tilwari
Published: (2020)
The analysis on functionality of composite solder oxidize copper lead frame interconnect in microelectronic packaging
by: Ahmad, Intan Fatihah
Published: (2022)
by: Ahmad, Intan Fatihah
Published: (2022)
Performance analysis of reactive routing protocol based on less-flooding AODV and route stability aware in mobile ad-hoc networks
by: Roswan Ismail
Published: (2019)
by: Roswan Ismail
Published: (2019)
Predictive Mobility Management Using Optimized Delays And Security Enhancements In IEEE 802.11 Infrastructure Networks
by: Biju, Issac
Published: (2008)
by: Biju, Issac
Published: (2008)
Development of security in wireless sensor network using IPv6
by: Jayapal, Vikneswary
Published: (2009)
by: Jayapal, Vikneswary
Published: (2009)
The implementation and performance studies of wireless networks for corporate intranet and public information resource center
by: Liew,, Allen Than Ho.
Published: (2000)
by: Liew,, Allen Than Ho.
Published: (2000)
Implementation Of Low Power Active Security
by: Krishnasamy, Raj Kumar
Published: (2017)
by: Krishnasamy, Raj Kumar
Published: (2017)
A Fundamental Study Of Surface Discharge Characteristics On Pressboard Immersed In Ester Oil For Power Transformer Application
by: Othman, Nur Amirah
Published: (2017)
by: Othman, Nur Amirah
Published: (2017)
Enhanced location and positioning in wimax networks with virtual mimo base station
by: Othman, Muhammad Hakim
Published: (2015)
by: Othman, Muhammad Hakim
Published: (2015)
Prevention And Detection Mechanism For Security In Passive Rfid System
by: Khor, Jing Huey
Published: (2013)
by: Khor, Jing Huey
Published: (2013)
Cloud Computing Adoption Model For Higher Education : A Comparison Study Between Malaysia And Jordan
by: Mohammad Othman, Morad Yousef
Published: (2016)
by: Mohammad Othman, Morad Yousef
Published: (2016)
Multibeam array antenna for base station in the fifth-generation mobile communication system / Intan Izafina Idrus
by: Intan Izafina , Idrus
Published: (2020)
by: Intan Izafina , Idrus
Published: (2020)
Pembangunan dan perkembangan penyiaran radio digital di Malaysia: Kajian kes penyiaran radio di Radio Televisyen Malaysia (RTM)
by: Intan Soliha Ibrahim
Published: (2011)
by: Intan Soliha Ibrahim
Published: (2011)
Design and implementation home security system and monitoring by using wireless sensor networks WSN/internet of thing IOT
by: Qasim Alsaid Noor, Hamzah Hadi
Published: (2018)
by: Qasim Alsaid Noor, Hamzah Hadi
Published: (2018)
The comparison study among optimization techniques in optimizing a distribution system state estimation
by: Hazim Imad, Hazim
Published: (2017)
by: Hazim Imad, Hazim
Published: (2017)
The Readiness Level On Conducting Penetration Testing Among Network Admin In Kolej Poly Tech Mara
by: Ibrahim, Mimi Dalina
Published: (2016)
by: Ibrahim, Mimi Dalina
Published: (2016)
Self-paced speech rehabilitation among children with down syndrome using malay automatic voice recognition (AVR)
by: Lau, Kum Hoe
Published: (2015)
by: Lau, Kum Hoe
Published: (2015)
Enhanced Beacon Scheduling for Cluster Tree Topology in Wireless Personal Area Network
by: Dyg Khayrunsalihaty Bariyyah, Bt Abang Othman
Published: (2019)
by: Dyg Khayrunsalihaty Bariyyah, Bt Abang Othman
Published: (2019)
Parallel-Pipelined-Memory (P2m) Of Blowfish Fpga-Based Radio System With Improved Power-Throughput For Secure Zigbee Transmission
by: Ahmad, Rafidah
Published: (2020)
by: Ahmad, Rafidah
Published: (2020)
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
by: Lim , Yen Ruen
Published: (2017)
by: Lim , Yen Ruen
Published: (2017)
Modified hysteresis current controller of half bridge bidirectional DC-DC converter using chassis dynamometer for electric vehicle
by: Nurul Azwa, Othman
Published: (2017)
by: Nurul Azwa, Othman
Published: (2017)
Computational intelligence based power system security assessment and improvement under multicontigencies conditions
by: Nor Rul Hasma, Abdullah
Published: (2012)
by: Nor Rul Hasma, Abdullah
Published: (2012)
Factors associated with the utilization of the internet among undergraduates in a local University in Malaysia
by: Fauzia, Mohd Noor
Published: (1998)
by: Fauzia, Mohd Noor
Published: (1998)
Joint optimization of resources allocation for quality of service aware next-generation heterogeneous cellular networks / Hayder Faeq Rasool Alhashimi
by: Hayder Faeq Rasool , Alhashimi
Published: (2025)
by: Hayder Faeq Rasool , Alhashimi
Published: (2025)
The development of a tracking algorithm for ambulance detection using squaring of RGB and HSV color processing techniques
by: Mohammad Syawaludin Syafiq, Hassan
Published: (2016)
by: Mohammad Syawaludin Syafiq, Hassan
Published: (2016)
WO3-loaded TIO2 nanotubes via electrochemical anodization technique for efficient photocatalytic removal of mercury
/ Lee Wai Hong
by: Lee, Wai Hong
Published: (2016)
by: Lee, Wai Hong
Published: (2016)
A feedforward control for grid-connected inverter under unbalanced and distorted conditions / Alireza Shayesteh Fard
by: Alireza, Shayesteh Fard
Published: (2016)
by: Alireza, Shayesteh Fard
Published: (2016)
Similar Items
-
Information security behaviour assessment in software-as-a-service cloud environment
by: Abdul Hamid, Hanifah
Published: (2018) -
Design And Analysis Of Auto Security Door Locking System
by: Lim, Si Qing
Published: (2016) -
An Automated Approach To Elicit And Validate Security Requirements Of Mobile Application
by: Yusop, Noorrezam
Published: (2018) -
Design and Modelling of an Energy Aware Dynamic Management for Wireless Sensor Node with Dual Harvesters
by: Abdal-Kadhim., Ali Mohammed
Published: (2020) -
Security Risk Issues And Controls For Cloud Computing In Iraqi Government Organisations
by: Al-Zaidi., Qusay Kanaan Kadhim
Published: (2019)
