Information security behaviour assessment in software-as-a-service cloud environment
This research aims at assessing the information security behaviour in Software as a Service (SaaS) cloud computing environment. Organisations are still struggling with information security breaches despite various technical protections to secure SaaS applications. This is due to the fact that liuman...
| Main Author: | Abdul Hamid, Hanifah |
|---|---|
| Format: | Thesis |
| Language: | English English |
| Published: |
UTeM
2018
|
| Subjects: | |
| Online Access: | http://eprints.utem.edu.my/id/eprint/23787/ https://plh.utem.edu.my/cgi-bin/koha/opac-detail.pl?biblionumber=112664 TJ211.42.L64 2017 |
| Abstract | Abstract here |
Similar Items
Quality of service (QOS) in software defined networking (SDN) using bandwidth shaping in cloud computing / Mohd Izham Zamri
by: Zamri, Mohd Izham
Published: (2014)
by: Zamri, Mohd Izham
Published: (2014)
Security Risk Issues And Controls For Cloud Computing In Iraqi Government Organisations
by: Al-Zaidi., Qusay Kanaan Kadhim
Published: (2019)
by: Al-Zaidi., Qusay Kanaan Kadhim
Published: (2019)
Simulation of web performance with different IP environment using plone software
by: Ahmad Fairuz, Ahmad
Published: (2014)
by: Ahmad Fairuz, Ahmad
Published: (2014)
The Awareness Of Information Security Breach Among User IT In KPTMBP
by: Othman, Intan Safina
Published: (2016)
by: Othman, Intan Safina
Published: (2016)
Eliciting security requirements for internet of things software application development using semi-formalized model approach
by: Ibrahim, Asma Asdayana
Published: (2022)
by: Ibrahim, Asma Asdayana
Published: (2022)
Investigation on the occurrence of tles associated positive cloud to ground (+CG) lightning in UMP Pekan
by: Chan, Hwee Geem
Published: (2019)
by: Chan, Hwee Geem
Published: (2019)
IoT data encryption algorithm for security
by: Kanaan Ismael, Marwan
Published: (2020)
by: Kanaan Ismael, Marwan
Published: (2020)
136-941 Mhz Lna Design For Software Defined Radio
by: Osman, Anwar Faizd
Published: (2014)
by: Osman, Anwar Faizd
Published: (2014)
Enhanced bandwidth management model using software defined networking
by: Emilia Rosa Jimson
Published: (2019)
by: Emilia Rosa Jimson
Published: (2019)
Enhanced model to minimize future downtime : case study of Malaysia cloud providers towards near-zero downtime
by: Clement, Clarissa Terry
Published: (2015)
by: Clement, Clarissa Terry
Published: (2015)
Cloud Computing For Iraqi Ministry Of Finance
by: Ahmed Dawod, Salman
Published: (2014)
by: Ahmed Dawod, Salman
Published: (2014)
Integrated Security And Privacy Preservation Approach In Mobile Crowd Sensing
by: Pius, Owoh Nsikak
Published: (2020)
by: Pius, Owoh Nsikak
Published: (2020)
Performance of Isolated Digit Speech Recognition in Crowded Environment.
by: Muhamad Arif, Hashim
Published: (2007)
by: Muhamad Arif, Hashim
Published: (2007)
Examining attention cues for learning 3D modelling software: an eye-tracking study on instructional screencast
by: Sharmila Devi Pachiyappan
Published: (2017)
by: Sharmila Devi Pachiyappan
Published: (2017)
Investigating challenges and requirements for fifth deployment in Iraq environment / : mosul case study
by: Mohammed, Mahmood Muayad
Published: (2014)
by: Mohammed, Mahmood Muayad
Published: (2014)
Predictive Mobility Management Using Optimized Delays And Security Enhancements In IEEE 802.11 Infrastructure Networks
by: Biju, Issac
Published: (2008)
by: Biju, Issac
Published: (2008)
Development of security in wireless sensor network using IPv6
by: Jayapal, Vikneswary
Published: (2009)
by: Jayapal, Vikneswary
Published: (2009)
Utility-based non-cooperative power control game in wireless environment / Yousef Ali Mohammed Al-Gumaei
by: Yousef Ali, Mohammed Al-Gumaei
Published: (2017)
by: Yousef Ali, Mohammed Al-Gumaei
Published: (2017)
The effect of dormitory laboratory tools (DLT) on the engineering quality of Chinese engineering students under intelligent learning environment
by: Liu, Cuiliu
Published: (2024)
by: Liu, Cuiliu
Published: (2024)
Cloud Computing Adoption Model For Higher Education : A Comparison Study Between Malaysia And Jordan
by: Mohammad Othman, Morad Yousef
Published: (2016)
by: Mohammad Othman, Morad Yousef
Published: (2016)
An Automated Testing Approach For Pxi Chassis Software Driver
by: Ng , Wai Shyan
Published: (2017)
by: Ng , Wai Shyan
Published: (2017)
The implementation and performance studies of wireless networks for corporate intranet and public information resource center
by: Liew,, Allen Than Ho.
Published: (2000)
by: Liew,, Allen Than Ho.
Published: (2000)
Preventing Spam Blogs Using Content Analysis and User Behaviour Model
by: Mohammad Hafiz, Ismail
Published: (2007)
by: Mohammad Hafiz, Ismail
Published: (2007)
Implementation Of Low Power Active Security
by: Krishnasamy, Raj Kumar
Published: (2017)
by: Krishnasamy, Raj Kumar
Published: (2017)
Mobile Services in E-Government (M-Government): Mobile Traffic Infraction System.
by: Althunibat, Ahmad Abdallah Ishtaian
Published: (2007)
by: Althunibat, Ahmad Abdallah Ishtaian
Published: (2007)
Full Reference Objective Video Quality Assessment with Temporal Consideration
by: Loh, Woei Tan
Published: (2018)
by: Loh, Woei Tan
Published: (2018)
On-Line Mobile Staff Directory Service: Implementation For The College of Arts and Sciences (CAS) - UUM.
by: Marian, Abdullah Mohammad Salman
Published: (2008)
by: Marian, Abdullah Mohammad Salman
Published: (2008)
Development of quality assessment methods for wood images / Heshalini Rajagopal @ Ramasamy
by: Heshalini , Rajagopal @ Ramasamy
Published: (2021)
by: Heshalini , Rajagopal @ Ramasamy
Published: (2021)
Design Of Multi-Modulation Baseband Modulator And Demodulator For Software Defined Radio
by: Chye, Yin Hui
Published: (2011)
by: Chye, Yin Hui
Published: (2011)
Independent And Dependent Job Scheduling Algorithms Based On Weighting Model For Grid Environment
by: M. Al-Najjar, Hazem
Published: (2018)
by: M. Al-Najjar, Hazem
Published: (2018)
Measurements and analyses of transmission control protocol's performance for dynamic link adaptation of general packet radio service
by: Muzalina, Zakaria
Published: (2009)
by: Muzalina, Zakaria
Published: (2009)
Computational intelligence based power system security assessment and improvement under multicontigencies conditions
by: Nor Rul Hasma, Abdullah
Published: (2012)
by: Nor Rul Hasma, Abdullah
Published: (2012)
Design And Analysis Of Auto Security Door Locking System
by: Lim, Si Qing
Published: (2016)
by: Lim, Si Qing
Published: (2016)
Prevention And Detection Mechanism For Security In Passive Rfid System
by: Khor, Jing Huey
Published: (2013)
by: Khor, Jing Huey
Published: (2013)
Web-based English Competency Assessment and Placement System For Faculty Communication and Modern Languages.
by: Salem, Amer Salem Ali
Published: (2007)
by: Salem, Amer Salem Ali
Published: (2007)
Comparison of different power system resilience assessment methods / Sam Chan Jian How
by: Sam Chan, Jian How
Published: (2020)
by: Sam Chan, Jian How
Published: (2020)
Assessment and analysis of voltage stability indices in power system network / Lee Liang Yoong
by: Lee, Liang Yoong
Published: (2019)
by: Lee, Liang Yoong
Published: (2019)
A multicriteria aware optimal routing approach for enhancing quality of service in device to device communication / Valmik Tilwari
by: Valmik , Tilwari
Published: (2020)
by: Valmik , Tilwari
Published: (2020)
Design and implementation home security system and monitoring by using wireless sensor networks WSN/internet of thing IOT
by: Qasim Alsaid Noor, Hamzah Hadi
Published: (2018)
by: Qasim Alsaid Noor, Hamzah Hadi
Published: (2018)
Rate based congestion control scheme for ABR service in ATM networks :|ba three-factor congestion detection approach
by: Tiong, Anderson Ing Heng.
Published: (2000)
by: Tiong, Anderson Ing Heng.
Published: (2000)
Similar Items
-
Quality of service (QOS) in software defined networking (SDN) using bandwidth shaping in cloud computing / Mohd Izham Zamri
by: Zamri, Mohd Izham
Published: (2014) -
Security Risk Issues And Controls For Cloud Computing In Iraqi Government Organisations
by: Al-Zaidi., Qusay Kanaan Kadhim
Published: (2019) -
Simulation of web performance with different IP environment using plone software
by: Ahmad Fairuz, Ahmad
Published: (2014) -
The Awareness Of Information Security Breach Among User IT In KPTMBP
by: Othman, Intan Safina
Published: (2016) -
Eliciting security requirements for internet of things software application development using semi-formalized model approach
by: Ibrahim, Asma Asdayana
Published: (2022)
