Personal Information
Organização/Local de trabalho
Kuala Lumpur, Malaysia, WP Malaysia
Cargo
Lecturer
Marcadores
hafiza abas
english for writing research papers
utm
advanced informatics school
access control
assessment
access control attacks by nor liyana binti azman
access control attacks
path
animation
elearning
epembelajaran
universiti teknologi malaysia
spoofing attack
phishing
logic bomb
noraini abdullah
access control and perimeter protection
man in the middle
frequency analysis
hong kim sheng
trojan horse
brute force
alex k s hong
radius
biometrics
anova
t-test
spss
regression
islamic studies
disabled
apps
autism
solat
teaching salat
qualitative research
survey and questionnaire
quantitative research
method
review of the literature
english for writing
research papers
structuring
paragraph
research
abstract
english for writing research papers chapter 3
research methodology
title in resaerch
english for writing research papers adrian.wallwor
evaluation
rubrics
rubric
business continuity plan
disaster recovery plan
mind map access control
general access control issues
yaakub bin idris
web 2.0
image manipulation using power point
physical security
perimeter protection
Ver mais
Apresentações
(28)Documentos
(1)Gostaram
(21)Programming IoT with Docker: How to Start?
msyukor
•
Há 6 anos
Containerizing Web Application with Docker
msyukor
•
Há 7 anos
Internet of Things: How To Start
msyukor
•
Há 7 anos
Validity and reliability of questionnaires
Venkitachalam R
•
Há 8 anos
Access Controls Attacks
Hafiza Abas
•
Há 8 anos
Man In The Middle - Hacking Illustrated
InfoSec Institute
•
Há 13 anos
Doing a Literature Review
Professor Abd Karim Alias
•
Há 13 anos
Web 2 0 Tools For Learning Syllabus
Patricia Roberts
•
Há 14 anos
Thesis writing and examiners' expectation
Prof Jamaluddin
•
Há 8 anos
Conole webinar 19_oct_final
Grainne Conole
•
Há 8 anos
Literature Review
Anaika Alexander
•
Há 11 anos
Bab 2 teori kecerdasan emosi dan kejayaan
Mazmon Mahmud
•
Há 11 anos
Sketchnoting FOR Learning
Silvia Rosenthal Tolisano
•
Há 9 anos
Chapter 6-THEORETICAL & CONCEPTUAL FRAMEWORK
Ludy Mae Nalzaro,BSM,BSN,MN
•
Há 11 anos
Ctlhe07 monograf 1
Sidek Aziz
•
Há 9 anos
Convert to journal
Prof Jamaluddin
•
Há 9 anos
Aplikasi Penyelidikan Web 2,0
Mohamed Amin Embi
•
Há 9 anos
Design ppt slides using IxD theory
Prof Jamaluddin
•
Há 9 anos
Sampel penggunaan peta pemikiran i think dlm pdp
CIKGU A.J.ZAMRI MZ@KPM MALAYSIA
•
Há 10 anos
Icee2013 paper suzaimah_camera ready (2)
Suzaimah Ramli
•
Há 10 anos
Week 12 mm_dev_model
Hajah Norasiken Bakar
•
Há 10 anos
Personal Information
Organização/Local de trabalho
Kuala Lumpur, Malaysia, WP Malaysia
Cargo
Lecturer
Marcadores
hafiza abas
english for writing research papers
utm
advanced informatics school
access control
assessment
access control attacks by nor liyana binti azman
access control attacks
path
animation
elearning
epembelajaran
universiti teknologi malaysia
spoofing attack
phishing
logic bomb
noraini abdullah
access control and perimeter protection
man in the middle
frequency analysis
hong kim sheng
trojan horse
brute force
alex k s hong
radius
biometrics
anova
t-test
spss
regression
islamic studies
disabled
apps
autism
solat
teaching salat
qualitative research
survey and questionnaire
quantitative research
method
review of the literature
english for writing
research papers
structuring
paragraph
research
abstract
english for writing research papers chapter 3
research methodology
title in resaerch
english for writing research papers adrian.wallwor
evaluation
rubrics
rubric
business continuity plan
disaster recovery plan
mind map access control
general access control issues
yaakub bin idris
web 2.0
image manipulation using power point
physical security
perimeter protection
Ver mais