Showing 1 - 20 results of 35 for search '"cybersecurity"', query time: 0.06s Refine Results
  1. 1
    Thesis Book
  2. 2
  3. 3
    by Mohammad Bakhtiar Haji Roslan
    Published 2022
    Get full text
    Thesis Book
  4. 4
    by Hii, Lydia Yi Jun
    Published 2022
    Thesis Book
  5. 5
    by Ali, Siti Hajar Aminah
    Published 2015
    ... by cybersecurity field. Another different case of cybersecurity is the Distributed Denial of Services (DDoS...
    Get full text
    Thesis
  6. 6
  7. 7
    by Mohammed, Idi
    Published 2019
    ...The effectiveness of Nigeria Cybersecurity strategy can have serious effect on the Cybersecurity...
    Get full text
    Thesis
  8. 8
  9. 9
    by Noor Suhani, Sulaiman
    Published 2023
    .... Responsibility norms are integrated into the model as a means to assess employees‘ behaviors toward cybersecurity...
    Get full text
    Thesis
  10. 10
    by Mohammed Abali, Aliyu
    Published 2013
    ... security learning and a general support for cybersecurity protection. The project is a case study based...
    Get full text
    Thesis
  11. 11
  12. 12
    by Mohamed, Siti Hajar
    Published 2017
    ... by CyberSecurity Malaysia shows that the computer crimes recorded an increase every year. Since the Malaysian...
    Get full text
    Thesis
  13. 13
    by Tan, Toh Hao
    Published 2021
    ..., Readiness and Cybersecurity. Then, by using the SmartPLS 3.0, these constructs have been given the weightage...
    Get full text
    Thesis
  14. 14
    by Ahmad, Roshdi
    Published 2017
    ... involving 213 respondents who were existing customers of CyberSecurity Malaysia (CSM), the results...
    Get full text
    Thesis
  15. 15
    by Rafsanjani, Ahmad Sahban
    Published 2023
    ...Malicious Uniform Resource Locators (URLs) are one of the major threats in cybersecurity. Cyber...
    Get full text
    Thesis
  16. 16
    Get full text
    Thesis
  17. 17
    by Md Tahir, Mohamad Afizal
    Published 2016
    ... CyberSecurity Malaysia (CSM) to deal and lead in computer forensic evidence. Malaysian Administrative...
    Get full text
    Thesis
  18. 18
    by Mohamed, Kartini
    Published 2017
    ... using a uSign-Mf+ module containing the proposed improvements and sent for evaluation by CyberSecurity...
    Get full text
    Thesis
  19. 19
  20. 20
    by Mohammad, Nur Ameera Natasha
    Published 2022
    ...An insider threat has become one of the most challenging malicious activities in cybersecurity...
    Get full text
    Get full text
    Thesis