Suggested Topics within your search.
Suggested Topics within your search.
-
1
-
2
-
3
-
4
-
5
-
6Published 2001Subjects: “…Computer security…”
-
7
-
8
-
9
-
10by Sultan Suhaibuddeen, Mohamed SulaimanSubjects: “…Intrusion detection systems (Computer security). Computer network security. Hackers…”
Published 2010
Get full text
Get full text
-
11by Rosli, Mohamad AfiqHakimiSubjects: “…Intrusion detection systems (Computer security). Computer network security. Hackers…”
Published 2019
Get full text
Get full text
-
12by Mat Yunos, Aziz KasmirSubjects: “…Intrusion detection systems (Computer security). Computer network security. Hackers…”
Published 2006
Get full text
Get full text
-
13by Hashim, Md NazriSubjects: “…Intrusion detection systems (Computer security). Computer network security. Hackers…”
Published 2005
Get full text
Get full text
-
14by Baharom Alam Shah, Ahmad HafidzSubjects: “…Computers and civilization. Social aspects of computers. Hackers…”
Published 2005
Get full text
Get full text
-
15by Ahmad Zukri, Nurul Hidayah, Kamarudin, Nur Khairani, Izraf Ishak, Mohd Enif, Md Rashid, Nor AimuniSubjects: “…Computers and civilization. Social aspects of computers. Hackers…”
Published 2018
Get full text
Get full text
Get full text
-
16Subjects: “…QA76 Computer software…”
Get full text
Get full text
Get full text
Get full text
Get full text
-
17by Limun, Najib“…” or “back door” has been installed on a computer, the hacker has ensured that he will have unfettered access…”
Published 2005
Get full text
Get full text
-
18
-
19Subjects: “…QA75 Electronic computers. Computer science…”
Get full text
Get full text
Get full text
Get full text
-
20by Mohanaad, Shakir, Asmidar, Abu Bakar, Younus, Yousoff, Mostafa, Al-Emran, Maytham, HammoodSubjects: “…QA76 Computer software…”
Published 2016
Get full text
Get full text
Get full text
Get full text