A study on cyber-attack for IIUM network security practices /
A cyber security assault is a continuous exploitation of laptop computer systems, technology-structured businesses and networks. Cyber protection assaults use malicious code to change coding system, good judgment or knowledge, leading to tumultuous penalties that can also compromise knowledge and en...
محفوظ في:
المؤلف الرئيسي: | Alam, Mohammad Jahedul (مؤلف) |
---|---|
التنسيق: | أطروحة |
اللغة: | English |
منشور في: |
Kuala Lumpur :
Kulliyyah of Information and Communication Technology, International Islamic University Malaysia,
2018
|
الموضوعات: | |
الوصول للمادة أونلاين: | Click here to view 1st 24 pages of the thesis. Members can view fulltext at the specified PCs in the library. |
الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
مواد مشابهة
-
Web 2.0 enabled knowledge sharing practices among students of IIUM : an exploration of the determinants /
بواسطة: Usman, Shuaibu Hassan
منشور في: (2014) -
Information security awareness amongst students in IIUM /
بواسطة: Ahmed, Ibrahim Nasreldin Ibrahim
منشور في: (2018) -
Cyber Security Capability Maturity Model using Maqasid al-Shari'ah approach /
بواسطة: Nadwiyah Mohamed Ridza
منشور في: (2020) -
Practice of postgraduate thesis supervision as perceived by KIRKHS students in IIUM /
بواسطة: Ayunita Atan
منشور في: (2013) -
A cloud computing framework for sharing of cloud resources and attacks information amongst cloud networks /
بواسطة: Waqas, Ahmad
منشور في: (2016)