Showing 101 - 120 results of 441 for search '((cheers OR bee) OR ((checkers OR hackers) OR checked))', query time: 0.18s Refine Results
  1. 101
  2. 102

    Practical fuzzing on open-source projects by Ng, Chun Kai

    Published 2022
    “…Hackers exploiting software vulnerabilities found in all software programs, resulting in unfavorable outcomes, which is a major concern in software security. …”
    Get full text
    Final Year Project (FYP)
  3. 103

    100 UMPSA athletes to compete in 10 events at the 2024 SUKUM Championship by Siti Nur Azwin, Zulkapri

    Published 2024
    “…PEKAN, 6 August 2024 – The enthusiastic cheers of “UMPSA! Minda Juara!” echoed as 100 athletes, comprising 65 men and 35 women from Universiti Malaysia Pahang Al-Sultan Abdullah (UMPSA), prepared to represent their university in the upcoming 2024 SUKUM Championship.…”
    Get full text
    Newspaper
  4. 104
  5. 105

    A model of information security and competition by de Cornière, A, Taylor, G

    Published 2024
    “…Larger firms constitute more valuable targets to hackers, thereby creating negative network effects. …”
    Journal article
  6. 106
  7. 107

    Contribution of problems and exercises at end chapters plus book interactive online exercises MCQ In: Cryptography and Network Security: Principles and Practice, Global Edition, 8t... by Stallings, Wiliam

    Published 2024
    “…In an age of viruses and hackers, electronic eavesdropping, and electronic fraud on a global scale, security is paramount. …”
    Book
  8. 108
  9. 109
  10. 110

    Enhancing security in generic e-Commerce systems by Mak, Foo Keong.

    Published 2010
    “…One of the most common security features found in today e-Commerce application is the Secure Socket Layer (SSL) connection and even with SSL alone, it may not be sufficient to withstand hackers’ attacks. It may cause great losses to the store owner if their online store is broken into. …”
    Get full text
    Final Year Project (FYP)
  11. 111

    Design and implementation of energy management system for smart building management system by Liu, Xiao Chuan

    Published 2015
    “…Moreover, the data transmission in the system is realized by ZigBee wireless technology and it’s very expensive. …”
    Get full text
    Final Year Project (FYP)
  12. 112

    "Fly with me" by Enver, Joelle Tyea

    Published 2013
    “…This animation short explores the unlikely friendship between a baby Tyrannosaurus Rex and a bumble bee. Two very different creatures in nature, yet, something beautiful blossoms between them when the bumblebee saves the T-Rex from impending doom which the bumble bee indirectly causes.…”
    Get full text
    Final Year Project (FYP)
  13. 113
  14. 114
  15. 115

    Development of an industrial SCADA firewall prototype using single board computer - part 2 by Teo, Joycelyn Li Ting

    Published 2019
    “…Threats such as the rise in hackers, cyber espionage and increased influence of radical activists’ groups cannot be undermined. …”
    Get full text
    Final Year Project (FYP)
  16. 116

    Encrypted smartphone with advanced encryption standard 256 by Tan, Alvin Chee Munn.

    Published 2011
    “…However, in this digital age, mobile users cannot take the confidentiality of data transfer for granted because of the presence of hackers and the threats that exist. In today’s market, various encryption suites are available for mobile users to send their SMS “safely” and offer different ways of encryption and decryption such as symmetry cryptography and asymmetric cryptography. …”
    Get full text
    Final Year Project (FYP)
  17. 117

    Smart-contract privacy preservation mechanism by Siraj, Muhammed, Ninggal, Mohd. Izuan Hafez, Udzir, Nur Izura, Abdullah, Muhammad Daniel Hafiz, Asmawi, Aziah

    Published 2023
    “…Sensitive records stored in the cloud such as healthcare records, private conversation and credit card information are targets of hackers and privacy abuse. Current information and record management systems have difficulties achieving privacy protection of such sensitive records in a secure, transparent, decentralized and trustless environment. …”
    Get full text
    Article
  18. 118

    Mill before Liberalism (parts I and II) by Ghosh, P

    Published 2023
    Journal article
  19. 119
  20. 120

    Location Selection for Beekeeping in Optimizing Honey Production using Linear Programming Model (S/O 14038) by Abdul Rahman, Syariza, Benjamin, Aida Mauziah, Omar, Mohd Faizal

    Published 2020
    “…Meliponiculture is an activity of raising stingless bees to obtain bee products, mainly honey. Honey production by bees varies depending on various factors which also affect its amount and quality. …”
    Get full text
    Monograph