Network Security: an Introduction to Techniques and Standard
The world has undergone a revolution in information and communication technology due to the increasing demands for information transmission. The internet has been the pinnacle to the worldwide interlocking communication network. The users such goverments and private firms keep enormous amount of inf...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Book |
| Language: | en |
| Published: |
USIM
2022
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1832692741297930240 |
|---|---|
| author | Waidah Ismail Kamaruzzaman Seman Shaharudin Ismail |
| author_facet | Waidah Ismail Kamaruzzaman Seman Shaharudin Ismail |
| author_sort | Waidah Ismail |
| building | USIM Library |
| collection | Institutional Repository |
| content_provider | Universiti Sains Islam Malaysia |
| content_source | USIM Institutional Repository |
| continent | Asia |
| country | Malaysia |
| description | The world has undergone a revolution in information and communication technology due to the increasing demands for information transmission. The internet has been the pinnacle to the worldwide interlocking communication network. The users such goverments and private firms keep enormous amount of information on people, products, commodities, and processes. Clearly, the information needs to be protected from paying eyes. |
| format | Book |
| id | my.usim.ddms-774 |
| institution | Universiti Sains Islam Malaysia |
| language | en |
| publishDate | 2022 |
| publisher | USIM |
| record_format | dspace |
| spelling | my.usim.ddms-7742023-06-11T11:08:46Z Network Security: an Introduction to Techniques and Standard Waidah Ismail Kamaruzzaman Seman Shaharudin Ismail Computer networks--Security measures Computer security The world has undergone a revolution in information and communication technology due to the increasing demands for information transmission. The internet has been the pinnacle to the worldwide interlocking communication network. The users such goverments and private firms keep enormous amount of information on people, products, commodities, and processes. Clearly, the information needs to be protected from paying eyes. 2022-11-27T14:53:15Z 2022-11-27T14:53:15Z 2007 Book 117 p 9832950465 https://ddms.usim.edu.my/handle/123456789/774 en application/pdf USIM |
| spellingShingle | Computer networks--Security measures Computer security Waidah Ismail Kamaruzzaman Seman Shaharudin Ismail Network Security: an Introduction to Techniques and Standard |
| title | Network Security: an Introduction to Techniques and Standard |
| title_full | Network Security: an Introduction to Techniques and Standard |
| title_fullStr | Network Security: an Introduction to Techniques and Standard |
| title_full_unstemmed | Network Security: an Introduction to Techniques and Standard |
| title_short | Network Security: an Introduction to Techniques and Standard |
| title_sort | network security: an introduction to techniques and standard |
| topic | Computer networks--Security measures Computer security |
| url_provider | https://e-imtiyaz.usim.edu.my/ |
