-
41
-
42by Rasheed, Mohammad M.“... instead of anomaly-based technology. Signature-based technology can only detect known attacks...”
Published 2012
Get full text
Get full text
Thesis -
43by Amirulikhsan, Zolkafli“... communication in spreading their ideologies and attack plans by hiding malicious materials in digital images via...”
Published 2008
Get full text
Get full text
Thesis -
44by Thamarakshan, Shalima“... of bullying are divided into six forms, namely work-related bullying, personal attacks, social isolation...”
Published 2015
Get full text
Get full text
Thesis -
45by Rosanatrah, Hj. Ramli“... failure) no electrical supply and virus and malicious attacks. Disaster Recovery Planning is becoming a...”
Published 2010
Get full text
Get full text
Thesis -
46by Norashikin, Baharom“... found that noncompliance behavior compliance is also caused by past pest attack which required the use...”
Published 2019
Get full text
Get full text
Get full text
Thesis -
47by Adebola, Babatunde Dorcas“... incidents and social engineering attacks. A questionnaire survey was designed to obtain data on information...”
Published 2014
Get full text
Get full text
Thesis -
48by Muhamad Saifulbakri, Yusoof“... the terrorist attack in Lahad Datu, the disappearance of MH370, MAF outdated and dysfunctional logistics...”
Published 2021
Get full text
Get full text
Get full text
Thesis -
49
-
50
-
51by Suraya, Wen“..., fight, attack, march, picket, protest, silent protest, hunger strike, sit-in, vigil and dispute...”
Published 2014
Get full text
Get full text
Thesis -
52by Syed Abdul Haris, Syed Mustapa“... attacks in Lahad Datu Sabah showed the weakness of the national defense system and the ability of the ATM...”
Published 2021
Get full text
Get full text
Thesis -
53by Md. Nasrudin, Md. Akhir“... disallows for preventive measures or even a counter attack. Although the Japanese Diet itself made a...”
Published 2004
Get full text
Get full text
Thesis -
54
-
55
-
56
-
57
-
58
-
59
-
60