Resources section features all papers written for certification examinations, seminars and conferences. |
|
PAPERS |
AUTHORS |
|
An Overview Of Disk Imaging Tool In Computer Forensics
|
Madihah Mohd. Saudi |
|
An Overview of SecureIIS Are We Really Secured Now?
|
Zul Azhan Suhaimi |
|
Cyber Threats: Myths or Reality?
|
Zahri Yunos and Ahmad Nasir Mohd Zin |
|
Home PC Security
|
Sharifah Roziah |
|
Insecurity of Inputs to CGI Program
|
Suhairi Mohd Jawi @ Said |
|
Rootkit: Attacker undercover tools
|
Saliman Manap |
|
Securing e-mail
|
Sharipah Setapa |
|
Securing IP Routing and Remote Access on Cisco Routers
|
Mohammed Shafri Hatta |
|
Smart Card- An Alternative to Password Authentication
|
Ahmad Ismadi Yazid B. Sukaimi |
|
The Common Criteria ISO/IEC 15408 The Insight, Some Thoughts, Questions and Issues
|
Ariffuddin Aizuddin |
|
The Regulatory Environment in Information Security
|
Husin Jazri |
|
Trusted Computer Systems: Understanding and Issues
|
Ahmad Ubaidah Omar |
|
Understanding the Various Types of Denial of Service Attack
|
Raja Azrina Raja Othman |