-
21by Sarkheyli, Azadeh“... failure for instance no specific function which recover/avoid risks/attacks toward IS/IT component...”
Published 2011
Get full text
Thesis -
22by Jama, Jama Mohamed“... of services attacks. The participants of this research are ICT technical staff of Nusajaya ICT department...”
Published 2011
Get full text
Thesis -
23by Mohd. Rasidi, Haryani“... attacked by pests or diseases such as root disease, white root, red root, brown root, leaf disease...”
Published 2011
Get full text
Thesis -
24by Kapi @ Kahbi, Azyan Yusra“... and thus survived from collusion attack compared to previous method....”
Published 2011
Get full text
Thesis -
25by Abdullah Aleidan, Fouziah Saleh“...Distributing digital information electronically is vulnerable to a variety of attacks and attempts...”
Published 2009
Thesis -
26by Omar, Nazrool“... any undesired hazardous events such as malicious code attack or natural disaster that could cause a...”
Published 2008
Get full text
Thesis