Summary: Information is a business asset that needs to be accessed and processed for it to bring value to the business. The use of technologies in handling information introduces information security risks that are inherited from flaws and weaknesses in the implementation of these technologies. Information security risks could be addressed sys
Summary: The social media is being considered an important source in the perspective of academic learning in the educational sector. The scope of learning through the social media encompasses broadening information sharing through collaborative approach with the help of web-based social networking sites as the means to enhance the knowledge of
Summary: The use of NFC technology is growing rapidly and implemented in various applications. It aims to reduce the steps needed to perform tasks by the user in day to day operations such as payment, electronic ticketing, attendance system, and other office related tasks. The university institution contains mainly a large population of admini
Summary: Today, web applications are vital to most organizations. They provide quick and efficient access to corporate services and resources. Web application security is an extremely important component in these applications. The presence of any web vulnerabilities can lead to uninvited and harmful attacks. For the very same reason, web appli
Subject(s): Object-oriented programming (Computer science) | C (Computer program language)
Holdings:
,,Hamzah Fansuri Resource Centre, KICT,,General Stacks,QA76.64 FAR 2007,Available,
Subject(s): Object-oriented programming (Computer science) | C++ (Computer program language)
Holdings:
,,Hamzah Fansuri Resource Centre, KICT,,General Stacks,QA76.64 JOS 2003,Available,