Swiss German University Library

  • Home
  • Information
  • News
  • Help
  • Librarian
  • Member Area
  • Select Language :
    Arabic Bengali Brazilian Portuguese English Espanol German Indonesian Japanese Malay Persian Russian Thai Turkish Urdu

Search by :

ALL Author Subject ISBN/ISSN Advanced Search

Last search:

{{tmpObj[k].text}}
1 2 3 Next Last Page
cover
Security assessment framework for web application in low security awareness e…
Anthony, RandyLim, Charles

Many web applications in indonesia are built not based on security in mind. Most of them do not have awareness about security and it reflected on their work as the developer of the web application.…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
259
Availability1
Add to basket
View DetailCite
cover
Design and implementation of short messaging service (sms) based time table o…
Adrian, FerdhiLim, Charles

Nowadays, the development of mobile phone has increased and popular in the world. Because of that, everybody have mobile phone for their activity. With the mobile phone we can do the activity where…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
342
Availability1
Add to basket
View DetailCite
cover
Design and implementation of a smart card system in Swiss German University
Hendrawan, KevinLim, Charles

The purpose of research for this thesis is to explain the impact of a smart card system to the university. The methodologies used to draw conclusion is by analyzing the performance of similar syste…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
346
Availability1
Add to basket
View DetailCite
cover
Designing and building Indonesian malware laboratory for Swiss German University
Lim, CharlesArmando

The growth of malicious software raised over decades, all of them could bring harmful to the system. The threats growth forms viruses into network-aware worms, Trojans, DDoS agents, IRC Controlled …

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
729
Availability1
Add to basket
View DetailCite
cover
Analysis of machine learning techniques used in behavior-based malware detection
Lim, CharlesFirdausi, Ivan

The increasing of malware that are exploiting the Internet daily has become a serious threat. The manual heuristic inspection of malware analysis is no longer considered effective and efficient com…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
735
Availability1
Add to basket
View DetailCite
cover
Design and implementation of honeynets to capture autonomous spreading malwar…
Anthony, RandyLim, Charles

Some companies and researches around the world have used honeypot for certain purpose. Especially in the malware research, honeypot can be used to collect malware samples. Malwares that can be coll…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
744
Availability1
Add to basket
View DetailCite
cover
Integrating dynamic analysis using clustering techniques for local malware in…
Christian, RockyLim, Charles

The understanding and predict threats to the security of information systems become really important in order to protect critical systems. Protection against the threat of computer threats have bee…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
747
Availability1
Add to basket
View DetailCite
cover
Designing and prototyping video encoding job/task management
Biotamalo, AgustinusLim, Charles

Videos uploaded by the users need to be encoded before going to public. The encodedrnprocess reduce the video file bandwidth. To manage those new jobs created by thernusers need a scheduling algori…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
933
Availability1
Add to basket
View DetailCite
cover
Design and implementation of e-ktp mutual authentication and key management p…
Lim, CharlesDarwis, Aravada Kevindra

E-KTP (Indonesian: Kartu Penduduk Elektronik) was introduced by IndonesianrnInterior Ministry to replace the existing identity card. With the contactless smart cardrntechnology, e-KTP obligates eve…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
937
Availability1
Add to basket
View DetailCite
cover
Security vulnerability assesment of web application for query single bio-data…
Lim, CharlesLie, Darmanto

During the development of ?E-KTP search? web application, the programmer did notrntake security into consideration. There are no vulnerability assessments, mitigationrnstrategies and penetration te…

Edition
-
ISBN/ISSN
-
Collation
-
Series Title
-
Call Number
938
Availability1
Add to basket
View DetailCite
1 2 3 Next Last Page

Search Result

Found 28 from your keywords: Author : "Lim, Charles"
Query took 0.00519 second(s) to complete
XML ResultJSON Result

Suggestion
image
Siemens AG : internship report 2015
Restiana, Mita
image
Uniform system of accounts for the lodging industry
NULL
image
Analysis of relation between microfinance customer profile with customer perceptions in Tangerang Selatan
Amrullah, Iqbal - Ganiarto, Eko
image
The United States and East Asia: conflict and co-operation
Koh, Tommy T.B.
image
Cryptography and Network Security : Principle and Practice
Stalling
Swiss German University Library
  • Information
  • Services
  • Librarian
  • Member Area

About Us

As a complete Library Management System, SLiMS (Senayan Library Management System) has many features that will help libraries and librarians to do their job easily and quickly. Follow this link to show some features provided by SLiMS.

Search

start it by typing one or more keywords for title, author or subject

Keep SLiMS Alive Want to Contribute?

© 2023 — Senayan Developer Community

Powered by SLiMS
Select the topic you are interested in
  • Computer Science, Information & General Works
  • Philosophy & Psychology
  • Religion
  • Social Sciences
  • Language
  • Pure Science
  • Applied Sciences
  • Art & Recreation
  • Literature
  • History & Geography
Icons made by Freepik from www.flaticon.com
Advanced Search