Network Security: an Introduction to Techniques and Standard

The world has undergone a revolution in information and communication technology due to the increasing demands for information transmission. The internet has been the pinnacle to the worldwide interlocking communication network. The users such goverments and private firms keep enormous amount of inf...

Full description

Saved in:
Bibliographic Details
Main Authors: Waidah Ismail, Kamaruzzaman Seman, Shaharudin Ismail
Format: Book
Language:en
Published: USIM 2022
Subjects:
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832692741297930240
author Waidah Ismail
Kamaruzzaman Seman
Shaharudin Ismail
author_facet Waidah Ismail
Kamaruzzaman Seman
Shaharudin Ismail
author_sort Waidah Ismail
building USIM Library
collection Institutional Repository
content_provider Universiti Sains Islam Malaysia
content_source USIM Institutional Repository
continent Asia
country Malaysia
description The world has undergone a revolution in information and communication technology due to the increasing demands for information transmission. The internet has been the pinnacle to the worldwide interlocking communication network. The users such goverments and private firms keep enormous amount of information on people, products, commodities, and processes. Clearly, the information needs to be protected from paying eyes.
format Book
id my.usim.ddms-774
institution Universiti Sains Islam Malaysia
language en
publishDate 2022
publisher USIM
record_format dspace
spelling my.usim.ddms-7742023-06-11T11:08:46Z Network Security: an Introduction to Techniques and Standard Waidah Ismail Kamaruzzaman Seman Shaharudin Ismail Computer networks--Security measures Computer security The world has undergone a revolution in information and communication technology due to the increasing demands for information transmission. The internet has been the pinnacle to the worldwide interlocking communication network. The users such goverments and private firms keep enormous amount of information on people, products, commodities, and processes. Clearly, the information needs to be protected from paying eyes. 2022-11-27T14:53:15Z 2022-11-27T14:53:15Z 2007 Book 117 p 9832950465 https://ddms.usim.edu.my/handle/123456789/774 en application/pdf USIM
spellingShingle Computer networks--Security measures
Computer security
Waidah Ismail
Kamaruzzaman Seman
Shaharudin Ismail
Network Security: an Introduction to Techniques and Standard
title Network Security: an Introduction to Techniques and Standard
title_full Network Security: an Introduction to Techniques and Standard
title_fullStr Network Security: an Introduction to Techniques and Standard
title_full_unstemmed Network Security: an Introduction to Techniques and Standard
title_short Network Security: an Introduction to Techniques and Standard
title_sort network security: an introduction to techniques and standard
topic Computer networks--Security measures
Computer security
url_provider https://e-imtiyaz.usim.edu.my/