Showing 21 - 26 results of 26 for search '"Attacker"', query time: 0.02s Refine Results
  1. 21
    by Sarkheyli, Azadeh
    Published 2011
    ... failure for instance no specific function which recover/avoid risks/attacks toward IS/IT component...
    Get full text
    Thesis
  2. 22
    by Jama, Jama Mohamed
    Published 2011
    ... of services attacks. The participants of this research are ICT technical staff of Nusajaya ICT department...
    Get full text
    Thesis
  3. 23
    by Mohd. Rasidi, Haryani
    Published 2011
    ... attacked by pests or diseases such as root disease, white root, red root, brown root, leaf disease...
    Get full text
    Thesis
  4. 24
    by Kapi @ Kahbi, Azyan Yusra
    Published 2011
    ... and thus survived from collusion attack compared to previous method....
    Get full text
    Thesis
  5. 25
    ...Distributing digital information electronically is vulnerable to a variety of attacks and attempts...
    Thesis
  6. 26
    by Omar, Nazrool
    Published 2008
    ... any undesired hazardous events such as malicious code attack or natural disaster that could cause a...
    Get full text
    Thesis