Personal Information
Organization / Workplace
Kuala Lumpur, Malaysia, WP Malaysia
Occupation
Lecturer
Website
http://www.ais.utm.my/hafizaabas
Tags
hafiza abas
english for writing research papers
utm
advanced informatics school
access control
assessment
access control attacks by nor liyana binti azman
access control attacks
path
animation
elearning
epembelajaran
universiti teknologi malaysia
spoofing attack
phishing
logic bomb
noraini abdullah
access control and perimeter protection
man in the middle
frequency analysis
hong kim sheng
trojan horse
brute force
alex k s hong
radius
biometrics
anova
t-test
spss
regression
islamic studies
disabled
apps
autism
solat
teaching salat
qualitative research
survey and questionnaire
quantitative research
method
review of the literature
english for writing
research papers
structuring
paragraph
research
abstract
english for writing research papers chapter 3
research methodology
title in resaerch
english for writing research papers adrian.wallwor
evaluation
rubrics
rubric
business continuity plan
disaster recovery plan
mind map access control
general access control issues
yaakub bin idris
web 2.0
image manipulation using power point
physical security
perimeter protection
See more
Presentations
(28)Documents
(1)Likes
(21)Programming IoT with Docker: How to Start?
msyukor
•
6 years ago
Containerizing Web Application with Docker
msyukor
•
7 years ago
Internet of Things: How To Start
msyukor
•
7 years ago
Validity and reliability of questionnaires
Venkitachalam R
•
8 years ago
Access Controls Attacks
Hafiza Abas
•
8 years ago
Man In The Middle - Hacking Illustrated
InfoSec Institute
•
13 years ago
Doing a Literature Review
Professor Abd Karim Alias
•
13 years ago
Web 2 0 Tools For Learning Syllabus
Patricia Roberts
•
14 years ago
Thesis writing and examiners' expectation
Prof Jamaluddin
•
8 years ago
Conole webinar 19_oct_final
Grainne Conole
•
8 years ago
Literature Review
Anaika Alexander
•
11 years ago
Bab 2 teori kecerdasan emosi dan kejayaan
Mazmon Mahmud
•
11 years ago
Sketchnoting FOR Learning
Silvia Rosenthal Tolisano
•
9 years ago
Chapter 6-THEORETICAL & CONCEPTUAL FRAMEWORK
Ludy Mae Nalzaro,BSM,BSN,MN
•
11 years ago
Ctlhe07 monograf 1
Sidek Aziz
•
9 years ago
Convert to journal
Prof Jamaluddin
•
9 years ago
Aplikasi Penyelidikan Web 2,0
Mohamed Amin Embi
•
9 years ago
Design ppt slides using IxD theory
Prof Jamaluddin
•
9 years ago
Sampel penggunaan peta pemikiran i think dlm pdp
CIKGU A.J.ZAMRI MZ@KPM MALAYSIA
•
10 years ago
Icee2013 paper suzaimah_camera ready (2)
Suzaimah Ramli
•
10 years ago
Week 12 mm_dev_model
Hajah Norasiken Bakar
•
10 years ago
Personal Information
Organization / Workplace
Kuala Lumpur, Malaysia, WP Malaysia
Occupation
Lecturer
Website
http://www.ais.utm.my/hafizaabas
Tags
hafiza abas
english for writing research papers
utm
advanced informatics school
access control
assessment
access control attacks by nor liyana binti azman
access control attacks
path
animation
elearning
epembelajaran
universiti teknologi malaysia
spoofing attack
phishing
logic bomb
noraini abdullah
access control and perimeter protection
man in the middle
frequency analysis
hong kim sheng
trojan horse
brute force
alex k s hong
radius
biometrics
anova
t-test
spss
regression
islamic studies
disabled
apps
autism
solat
teaching salat
qualitative research
survey and questionnaire
quantitative research
method
review of the literature
english for writing
research papers
structuring
paragraph
research
abstract
english for writing research papers chapter 3
research methodology
title in resaerch
english for writing research papers adrian.wallwor
evaluation
rubrics
rubric
business continuity plan
disaster recovery plan
mind map access control
general access control issues
yaakub bin idris
web 2.0
image manipulation using power point
physical security
perimeter protection
See more