Physical security measures framework for Marib power plant (Yemen)
| Main Author: | Mohammed Al-Aghbari, Anas Mustafa |
|---|---|
| Format: | Thesis |
| Published: |
2013
|
| Subjects: |
Similar Items
Physical security measures framework for Marib power plant
by: Mohammed Al-Aghbari, Anas Mustafa
Published: (2013)
by: Mohammed Al-Aghbari, Anas Mustafa
Published: (2013)
Information security awareness framework for enhancing security privacy among twitter users
by: Saeed Hussein, Abbas Yaslam
Published: (2017)
by: Saeed Hussein, Abbas Yaslam
Published: (2017)
Information security curriculum framework at undergraduate level
by: Sanusi Arifin, Ab. Arif
Published: (2009)
by: Sanusi Arifin, Ab. Arif
Published: (2009)
An enhanced next generation security operation center framework for information system security management
by: Yau, Ti Dun
Published: (2023)
by: Yau, Ti Dun
Published: (2023)
Privacy-preserved security-conscious framework to enhance web service composition
by: Movahednejad, Homa
Published: (2016)
by: Movahednejad, Homa
Published: (2016)
Model based framework for measuring service level agreement performance in service oriented architecture
by: Ahmad Al-Sakkaf, Alawi Abdullah
Published: (2013)
by: Ahmad Al-Sakkaf, Alawi Abdullah
Published: (2013)
ICT service quality measurement framework for Malaysian universities context
by: Nor, Rozi Nor Haizan
Published: (2013)
by: Nor, Rozi Nor Haizan
Published: (2013)
Designing a logical security framework for enterprise service oriented architecture (ESOA)
by: Kalantari, Alaeddin
Published: (2009)
by: Kalantari, Alaeddin
Published: (2009)
Implementing Additional Security Measure on ATM Through Biometric
by: Azeez, Hayder Hussein
Published: (2011)
by: Azeez, Hayder Hussein
Published: (2011)
A conceptual framework of information security database audit and assessment in university based organization
by: Ul Hasan, Muneeb
Published: (2018)
by: Ul Hasan, Muneeb
Published: (2018)
Secure framework for implementing close circuit television (CCTV) system as a crime prevention tool : case study (Malaysia)
by: Achin, Hamidi
Published: (2008)
by: Achin, Hamidi
Published: (2008)
Control priorization model for improving information security risk assessment
by: Al-Safwani, Nadher Mohammed Ahmed
Published: (2014)
by: Al-Safwani, Nadher Mohammed Ahmed
Published: (2014)
Development of metamodel for information security risk management
by: Mohammed Ba Muqabel, Mohammed Salem
Published: (2013)
by: Mohammed Ba Muqabel, Mohammed Salem
Published: (2013)
Efficient Queue And Gsi Security
Management Framework For Mobile
Desktop Grid
by: Sarwar, Muhammad Imran
Published: (2008)
by: Sarwar, Muhammad Imran
Published: (2008)
The implementation framework for automated model transformation in model driven development
by: Khalefa, Mustafa S.
Published: (2009)
by: Khalefa, Mustafa S.
Published: (2009)
Development of computer ethical framework for information security (educational context)
by: Namayander, Meysam
Published: (2009)
by: Namayander, Meysam
Published: (2009)
Secure-Spin with hashing to support mobility and security in wireless sensor network
by: Amri, Mohammad Hossein
Published: (2013)
by: Amri, Mohammad Hossein
Published: (2013)
Information security compliance assessment using information security maturity model
by: Zadeh, HassanHossein
Published: (2014)
by: Zadeh, HassanHossein
Published: (2014)
Integrated Framework For Secure Distributed Management Of
Duplicated Ipv6 Address Detection
by: Ul Rehman, Shafiq
Published: (2017)
by: Ul Rehman, Shafiq
Published: (2017)
Triple scheme based on image steganography to improve imperceptibility and security
by: Hashim, Mohammed Mahdi
Published: (2022)
by: Hashim, Mohammed Mahdi
Published: (2022)
IT supported project based learning framework
by: Mohammed Hamouda, Mohammed Elgasim
Published: (2010)
by: Mohammed Hamouda, Mohammed Elgasim
Published: (2010)
Factors influencing security measures in IT outsourcing
by: Zainal, Mohd. Zairusham
Published: (2014)
by: Zainal, Mohd. Zairusham
Published: (2014)
Assessing cloud computing security level of awareness among IT and non IT students in UTM
by: Mohammed, Alwuhayd Muteb
Published: (2014)
by: Mohammed, Alwuhayd Muteb
Published: (2014)
Measurement metrics for measuring success of business intelligence system
by: Sangar, Amin Babazadeh
Published: (2014)
by: Sangar, Amin Babazadeh
Published: (2014)
Using TAM to study the user acceptance of it in the Yemeni public sector (Ministry of Social Affairs and Labour-Yemen)
by: Saeed Wahdain, Esmat Abdulmajid
Published: (2014)
by: Saeed Wahdain, Esmat Abdulmajid
Published: (2014)
I-Personal Financial Organizer (I-Pfo): A Cyber Security Framework For I-Pfo.
by: Annie Ng, Ai Bee
Published: (2010)
by: Annie Ng, Ai Bee
Published: (2010)
Integrating security services into active network
by: Mandala, Satria
Published: (2005)
by: Mandala, Satria
Published: (2005)
A dimension-based information security culture model for information security policy compliance behavior in Malaysian public universities
by: Akhyari, Nasir
Published: (2019)
by: Akhyari, Nasir
Published: (2019)
An analysis on security awareness of social networks users
by: Darvishi, Mahdi
Published: (2013)
by: Darvishi, Mahdi
Published: (2013)
A network security management approach for WLAN
by: Janbeglou , Maziar
Published: (2010)
by: Janbeglou , Maziar
Published: (2010)
Awareness and acceptance analysis of information security policy
by: Muda, Mohd. Zuki
Published: (2010)
by: Muda, Mohd. Zuki
Published: (2010)
Simulation of physical forces for wet clothing
by: Abdullah, Omar Salim
Published: (2013)
by: Abdullah, Omar Salim
Published: (2013)
Regression testing framework for test cases generation and prioritization
by: Osman, Eglal Mohammed Khalifa
Published: (2022)
by: Osman, Eglal Mohammed Khalifa
Published: (2022)
Improving information system security by evaluating human factors
by: Soltanmohammadi, Saeed
Published: (2013)
by: Soltanmohammadi, Saeed
Published: (2013)
Enabling security for service discovery in pervasive computing environments
by: Sharifi, Mahdi
Published: (2009)
by: Sharifi, Mahdi
Published: (2009)
WINPCAP : design and development of covert channel for secure communication
by: Omar, Syaril Nizam
Published: (2007)
by: Omar, Syaril Nizam
Published: (2007)
Detecting plaintext recovery attack in secure shell (SSH)
by: Ahmad Baidowi, Zaid Mujaiyid Putra
Published: (2010)
by: Ahmad Baidowi, Zaid Mujaiyid Putra
Published: (2010)
Employees' awareness towards IT security measures implemented in their organization : selected financial institution
by: Krishnakutty, Premala Nair
Published: (2016)
by: Krishnakutty, Premala Nair
Published: (2016)
Physics based modeling and simulation of collision response
by: Abdul Rab, Abdul Rab
Published: (2004)
by: Abdul Rab, Abdul Rab
Published: (2004)
Towards a power consumption estimation model for routers over TCP and UDP protocols
by: Mohammed, Ali Qusay
Published: (2015)
by: Mohammed, Ali Qusay
Published: (2015)
Similar Items
-
Physical security measures framework for Marib power plant
by: Mohammed Al-Aghbari, Anas Mustafa
Published: (2013) -
Information security awareness framework for enhancing security privacy among twitter users
by: Saeed Hussein, Abbas Yaslam
Published: (2017) -
Information security curriculum framework at undergraduate level
by: Sanusi Arifin, Ab. Arif
Published: (2009) -
An enhanced next generation security operation center framework for information system security management
by: Yau, Ti Dun
Published: (2023) -
Privacy-preserved security-conscious framework to enhance web service composition
by: Movahednejad, Homa
Published: (2016)