Suggested Topics within your search.
Suggested Topics within your search.
Stock exchanges. Insider trading in securities
16
Investment, capital formation, speculation
15
Intrusion detection systems (Computer security). Computer network security. Hackers
9
Securities. Fixed-income securities
5
Bonds
4
Computer networks. General works. Traffic monitoring
3
Government securities. Industrial securities. Venture capital
3
Investment companies. Investment trusts. Mutual funds
3
Offenses against public safety. Internal security
3
Computer security. Security measures. Data recovery. Disaster recovery
2
Criminology
2
Customer services. Customer relations
2
Human security
2
Malaysia
2
Performance standards
2
Stockbrokers. Security dealers. Investment advisers. Online stockbrokers
2
Terrorism
2
Algorithms
1
Coding theory
1
Conflict of laws
1
Consumer behavior. Consumers' preferences. Consumer research. Including consumer profiling
1
Consumer satisfaction
1
Cryptography. Access control. Computer security
1
Detectors. Sensors. Sensor networks
1
Educational games
1
Finance, Islamic
1
Financial management. Business finance. Corporation finance
1
Foreign investments. Country risk
1
Forensic Medicine. Medical jurisprudence. Legal medicine
1
HG Finance
1
-
1
-
2
-
3Subjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Get fulltext
View Fulltext in UiTM IR
Article -
4by Kamarudin, Nur Khairani, Bismi, Nur Syafiqa, Ahmad Zukri, Nurul Hidayah, Mohd Fuzi, Mohd Faris, Ramle, RashidahSubjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Published 2020
Get fulltext
View Fulltext in UiTM IR
Article -
5by Abd Halim, Iman Hazwam, Abu Hassan, Nur Muhammad Irfan, Razak, Tajul Rosli, Jamaluddin, Muhammad Nabil Fikri, Ismail, Mohammad HafizSubjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Published 2019
Get fulltext
View Fulltext in UiTM IR
Article -
6Subjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Get fulltext
View Fulltext in UiTM IR
Article -
7Subjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Get fulltext
View Fulltext in UiTM IR
Article -
8
-
9by Kamarudin, Nur Khairani, Md Hasani, Nur Nazifa, Ruslan, Rafiza, Ramle, Rashidah, Ahmad Zukri, Nurul Hidayah, Abd Halim, Iman HazwamSubjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Published 2018
Get fulltext
View Fulltext in UiTM IR
Article -
10Subjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Get fulltext
View Fulltext in UiTM IR
Article -
11by Hashim, Muhamad Arif, Abd Halim, Iman Hazwam, Ismail, Mohammad Hafiz, Mohd Noor, Norfaizalfarid, Mohd Fuzi, Mohd Faris, Mohammed, Abdul Hapes, JM. Gining, Ray AdderleySubjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Published 2017
Get fulltext
View Fulltext in UiTM IR
Article -
12Subjects: “...Intrusion detection systems (Computer security). Computer network security. Hackers...”
Get fulltext
View Fulltext in UiTM IR
Article -
13Subjects: “...Computer security. Security measures. Data recovery. Disaster recovery...”
Get fulltext
View Fulltext in UiTM IR
Article -
14Subjects: “...Stockbrokers. Security dealers. Investment advisers. Online stockbrokers...”
Get fulltext
View Fulltext in UiTM IR
Article -
15Subjects: “...Social insurance. Social security. Pension...”
Get fulltext
View Fulltext in UiTM IR
Article -
16Subjects: “...Cryptography. Access control. Computer security...”
Get fulltext
View Fulltext in UiTM IR
Article -
17Subjects: “...Offenses against public safety. Internal security...”
Get fulltext
View Fulltext in UiTM IR
Article -
18
-
19Subjects: “...Computer security. Security measures. Data recovery. Disaster recovery...”
Get fulltext
View Fulltext in UiTM IR
Article -
20