Search Results - open secure software (selection OR electron)
Search alternatives:
- secure software »
-
1
Electronic automatic door / Siti Nurshaline Mohd Saadon and Muhammad Hafizi Zakaria
Published 2015“…Nowadays, lock has evolved into the security device that embedded with the microcontroller which is usually named electronic lock. …”
Get full text
Get full text
Student Project -
2
Magnetic security automation sensor locks
Published 2013Get full text
Get full text
Student Project -
3
DESIGN OF DOOR SECURITY SYSTEM USING LABVIEW BASED APPROACH
Published 2015“…The security door system is to control the door access from open and close. …”
Book -
4
-
5
-
6
-
7
Securenet VPN application
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Biometric multimodal security simulation on schedule Ii controlled drug
Published 2020Get full text
Get full text
Article -
9
A cryptographic-biometric mechanism for enhancing SET authentication
Published 2005“…Secure Electronic Transaction (SET) is an open encryption and security specification designed to protect credit card transactions on the Internet. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Security in wireless sensor networks: issues and challenges
Published 2006Get full text
Get full text
Get full text
Book Chapter -
11
أثر نظم المعلومات المحاسبية الإلكترونية على جودة القوائم المالية في البنوك التجارية في ليبيا
Published 2024thesis::doctoral thesis -
12
Cost Estimation Model for Secure Software Development
Published 2011“…Engineering security in software is now a high priority objective in many IS application especially for the banking and electronic commerce. …”
Get full text
Get full text
Thesis -
13
Assessing Malacca wireless security implementation in government and private sector companies in – A case study
Published 2008Get full text
Get full text
Conference or Workshop Item -
14
Assessing wireless security implementation in government and private sector companies in Malacca-a case study
Published 2008Get full text
Get full text
Conference or Workshop Item -
15
Analysis and design of intrusion detection system implementation / Chia Fook Keong
Published 2003“…The IDS chosen was Snort, which is a free, open source, lightweight, multi-platform and customizable software. …”
Get full text
Get full text
Thesis -
16
CATALOGUE-BASED GUIDELINE FOR MISUSE CASE
Published 2022“…The process of identifying the misuse case and threats is open for the analyst's interpretation. Lack of knowledge in security threats also can make it worse. …”
Get full text
Get full text
Get full text
Article -
17
Rekabentuk Dan Sintesis Suatu Cip Inkripsi Menggunakan Algoritma Blowfish
Published 2001“…The founding of cryptography as an obscuring method in ensuring the security of any information, has opened a new era in cyberspace information security. …”
Get full text
Get full text
Thesis -
18
-
19
Development of a canny house security via IoT
Published 2024Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017Get full text
Get full text
Conference or Workshop Item
