AsrAtul syAuqAh
Monday, October 26, 2009

Lec 10- CYBERLAW

›
In this chapter, we make a group and do some research about topic that he provides. Our topic is about "Communication and Multimedia (T...

Lec 9 - LEGAL AND ETHICAL ISSUES IN COMPUTER SECURITY

›
Legal & Ethical *Law *imply imposition by the obligation of obedience on the part of all subject to that authority *Ethics *a set of mor...

Lec 8 - Wireless LAN Security

›
WEP use to provide comparable confidentiality to a traditional wired network in particular it does not protect users of the network from eac...

Lab 7 - SECURITY IN APPLICATIONS

›
Email has two part, header and body. Header part used to state the sender and email recipient. Body part is content of the message or email....

Lec 6 - COMPUTER NETWORKS

›
A computer network is a group of computer that are connected to each other for the purpose of communication. Networks may be classified acco...

Lab 5 - Web Application

›
On this lab, we need to describe the flaw of web application and how it is exploited. Besides that, we also have to exploit the web vulnerab...

Lec 5 - Database Security

›
Databases need to have level of security in order to protect the database against both malicious and accidental threats. A threat is any typ...
›
Home
View web version

About Me

My photo
~Nurul Ain~
"~Aku dalam proses mencari IDENTITI diri,yg terserlah di MATA anda, belum tentu yang HAQ, yang terfikir di MINDA anda,belum tentu yang BENAR,yang terlintas di HATI anda belum tentu yang PASTI..yang terlepas dalam BICARA kata,belum tentu yang JELAS..yang termaktub dalam tulisan,belum tentu yang HAKIKI,yang KENAL belum tentu MENGENALI..hakikatnya Dialah,Pencipta Agung,-ALLAH- Yang Maha Mengetahui hakikat segalanya tentang empunya diri,nilailah aku sebagai manusia yang tersangat jahil & biasa, kerana itu memang AKU! ~::aku yg msh mencari::
View my complete profile
Powered by Blogger.