Search Results - open secure software (selection OR electron)

Search alternatives:

Refine Results
  1. 1

    Electronic automatic door / Siti Nurshaline Mohd Saadon and Muhammad Hafizi Zakaria by Mohd Saadon, Siti Nurshaline, Zakaria, Muhammad Hafizi

    Published 2015
    “…Nowadays, lock has evolved into the security device that embedded with the microcontroller which is usually named electronic lock. …”
    Get full text
    Get full text
    Student Project
  2. 2
  3. 3

    DESIGN OF DOOR SECURITY SYSTEM USING LABVIEW BASED APPROACH by MOHAMAD RAZIF B MOHD SOHAIMI

    Published 2015
    “…The security door system is to control the door access from open and close. …”
    Book
  4. 4
  5. 5
  6. 6
  7. 7

    Securenet VPN application by Lim, Xiao Ze

    Published 2024
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8
  9. 9

    A cryptographic-biometric mechanism for enhancing SET authentication by Awadelkarim, Awad M., Md Johar, Md Gapar

    Published 2005
    “…Secure Electronic Transaction (SET) is an open encryption and security specification designed to protect credit card transactions on the Internet. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10
  11. 11
  12. 12

    Cost Estimation Model for Secure Software Development by Sia Abdullah, Nur Atiqah

    Published 2011
    “…Engineering security in software is now a high priority objective in many IS application especially for the banking and electronic commerce. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Analysis and design of intrusion detection system implementation / Chia Fook Keong by Chia, Fook Keong

    Published 2003
    “…The IDS chosen was Snort, which is a free, open source, lightweight, multi-platform and customizable software. …”
    Get full text
    Get full text
    Thesis
  16. 16

    CATALOGUE-BASED GUIDELINE FOR MISUSE CASE by Muhammad Asyraf, Khairuddin, Abdul Azim, Abd Ghani, Hazura, Zulzalil, Sa’adah, Hassan

    Published 2022
    “…The process of identifying the misuse case and threats is open for the analyst's interpretation. Lack of knowledge in security threats also can make it worse. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Rekabentuk Dan Sintesis Suatu Cip Inkripsi Menggunakan Algoritma Blowfish by Md. Nasiri, Siti Zarina

    Published 2001
    “…The founding of cryptography as an obscuring method in ensuring the security of any information, has opened a new era in cyberspace information security. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20