Found about 4 results
Downloads: 134
Research Paper, Information Technology, Malaysia, Volume 2 Issue 12, December 2013
352 - 357A Study: Cryptology Techniques and Methodologies
Cutifa Safitri [5] | Haroon Shoukat Ali [2] | Jamaludin Bin Ibrahim [4]
Downloads: 124
Research Paper, Information Technology, Malaysia, Volume 5 Issue 12, December 2016
325 - 329Critical Infrastructure Protection of ICT in Muslim World
Sami Mohammed Abdulrahman Ali | Muhammad Abdu [5] | Jamaludin Bin Ibrahim [4]
Downloads: 117 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Review Papers, Information Technology, Malaysia, Volume 6 Issue 5, May 2017
1798 - 1803Increasing the Performance of Organization by Using Management Tool and Strategic
Jamaludin Bin Ibrahim [4] | Sami Ali [4] | Naby Nouhou Nassou [2] | Muhammad Abdu [5]
Downloads: 110
Informative Article, Information Technology, Malaysia, Volume 3 Issue 12, December 2014
570 - 576How Much Privacy We Still Have?
Ayn Nur Azhana Binti Azhar Amanullah | Nur Faizah Binti Ab Aziz [2] | Maya Novia Sari [2] | Jamaludin Bin Ibrahim [4]