Applying Minimum Spanning Tree Alogrithm (STA) for Intelligent Commuter Application in Real-Time Environment by So Chao Chye. 2. Application of Cia Confidentiality, Integrity, Authentication, concepts in A Solutions for Insecure Linux Box by Chew Chin Wong.
Main Author: | SO CHAO CHYE |
---|---|
Other Authors: | CHEW CHIN WONG |
Format: | Book |
Published: |
Nilai:
INTI College Malaysia,
August 2001.
|
Series: | A dissertation submitted in partial fulfilment of the requirement of an Honours Degree in Software Engineering at Conventry University under the management and supervision of School of Computing and IT, INTI College Malaysia
|
Subjects: |
Similar Items
-
Insecurity
by: LYNN
Published: (1997) -
L.A. confidential
by: ELLROY
Published: (2000) -
Confidential information law in Malaysia : cases and commentaries
by: JURIAH ABDUL JALIL
Published: (2003) -
So long : stories, 1987-1992
by: BERLIN
Published: (1993) -
So I am glad
by: KENNEDY
Published: (1996)