Welcome
Copyright © SirsiDynix. All rights reserved.
(Build horizon-8.0.1.5407)
Center Of Excellence for Jordanian Public University Library System (COE-JOPULS)
العربية (السعودية)
English (United States)
Log in
Help
Welcome
Jordanian Union Catalogue
360 Search
Search Libraries Catalogue
Simple
Advanced
Power
Community Resource
Search History
My List
My Account
Search
Options
Refine
Start Over
Show details
Hide details
Duplicate Items
Add to My List
Print
Sorts and Limits
Sorts:
None
Author
Publication Date
Publisher
Subject
Title
Select All
Results 1 - 8 of 8
1
.
Title:
Information security : dictionary of concepts , standards and terms / Dennis Longley , Michael Shain , William Caelli.
Author:
Caelli, William
Publication:
Macmillan, New York: 1992.
2
.
Title:
Data protection and information lifecycle management / Tom Petrocelli.
Author:
PETROCELLI , Tom
Publication:
Prentice Hall, Upper Saddle River: 2006.
3
.
Title:
Network security for dummies/ by Chey Cobb.
Author:
Cobb , Chey
Publication:
Wiley, [S.l.]: 2003.
4
.
Title:
Security in computing/ Charles P. Pfleeger , Shari Lawrence Pfleeger.
Author:
Pfleeger , Charles P.
Publication:
Prentice Hall, [S.l.]: 2003.
Edition:
3rd.ed.
5
.
Title:
Digital watermarking in transformed domain / by Marwa M. Munir Adel Dogramaci ; supervised by Sami Serhan, Moussa Habib.
الإشارة المائية الرقمية في المجال التحويلي.
Author:
Dogramaci, Marwa M. Munir Adel.
Publication:
2005.
6
.
Title:
Anti-hacker tool kit. Arabic
طقم أدوات مكافحة القراصنة / تأليف كيث جونز، مايك شيما، وبرادلي جونسن ؛ ترجمة مركز التعريب و البرمجة.
Author:
جونز، كيث.
Publication:
الدار العربية للعلوم، بيروت : 2003=1424.
Edition:
ط. 1.
7
.
Title:
Time Variant Mathematical Series Based Modulation / Demodulation Robust Text Data Hiding in an Image by Aya Rateb Al-Shamasneh.
عملية إخفاء بيانات نصية من خلال تحوير / استخلاص صورة اعتمادا على سلسلة رياضية متغيرة بالنسبة للوقت
Author:
al-Shamasneh, Aya Rateb.
Publication:
Yarmouk University, Irbid : 2014.
8
.
Title:
Evasion of Phishing Detection Techniques Using Generative Adversarial Deep Learning Networks : by Rayah Mohamed AL-Qurashi ; Advisor Dr Ahmad Saifan, Co-Advisor Dr Ahmed Aleroud.
التهرب من أنظمة الكشف عن هجمات التصيد الإلكتروني بإستخدام شبكات التعلم العميق التوليدية
Author:
Al-Qurashi, Rayah Mohamed,
Publication:
Yarmouk University, Irbid, Jordan : 2021.
Results 1 - 8 of 8
Duplicate Items
Add to My List
Print
Sorts and Limits
Sorts:
None
Author
Publication Date
Publisher
Subject
Title