Home | Site Map | Search | Contacts
About Us
News
Events
Services
Resources
Report Incidents
Incident Statistics
Security FAQS
Training
Vacancies
Links

Search NISER
NISER > Resources
Resources section features all papers written for certification examinations, seminars and conferences.
PAPERS AUTHORS
An Overview Of Disk Imaging Tool In Computer Forensics Madihah Mohd. Saudi
An Overview of SecureIIS Are We Really Secured Now? Zul Azhan Suhaimi
Cyber Threats: Myths or Reality? Zahri Yunos and Ahmad Nasir Mohd Zin
Home PC Security Sharifah Roziah
Insecurity of Inputs to CGI Program Suhairi Mohd Jawi @ Said
Rootkit: Attacker undercover tools Saliman Manap
Securing e-mail Sharipah Setapa
Securing IP Routing and Remote Access on Cisco Routers Mohammed Shafri Hatta
Smart Card- An Alternative to Password Authentication Ahmad Ismadi Yazid B. Sukaimi
The Common Criteria ISO/IEC 15408 The Insight, Some Thoughts, Questions and Issues Ariffuddin Aizuddin
The Regulatory Environment in Information Security Husin Jazri
Trusted Computer Systems: Understanding and Issues Ahmad Ubaidah Omar
Understanding the Various Types of Denial of Service Attack Raja Azrina Raja Othman



Disclaimers and copyright information
Last Update October 1, 2003