Welcome
user_choices_background_image
Welcome
login container bottom
Search Libraries Catalogue
Duplicate Items
Add to My List

Print
Sorts and Limits

Results 1 - 42 of 42
1. Title: Intrusion detection in distributed systems : an abstraction-based approach / by Peng Ning, Sushil Jajodia, X. Sean Wang.
Advances in information security ;
Author: Ning, Peng.
Publication: Kluwer Academic Publishers, Boston : 2004.
2. Title: Advances in cryptology--EUROCRYPT '91 : Workshop on the Theory and Application of Cryptographic Techniques, Brighton, UK, April 8-11, 1991 : proceedings / D.W. Davies (ed.).
Lecture notes in computer science ;
Author: EUROCRYPT '91 (1991 : Brighton, England)
Publication: Springer-Verlag, Berlin ; New York : c1991.
3. Title: How secure is your wireless network? : safeguarding your Wi-Fi-LAN / Lee Barken.
Author: Barken, Lee.
Publication: Prentice Hall PTR, Upper Saddle River, NJ : c2004.
4. Title: Managers guide to computer security / Donn B. Parker.
Computer security management.
Author: Parker, Donn B.
Publication: Reston Pub. Co., Reston, Va. : c1981.
5. Title: Secrecy, authentication, and public key systems / by Ralph C. Merkle.
Computer science. Systems programming ;
Author: Merkle, Ralph C. (Ralph Charles)
Publication: UMI Research Press, Ann Arbor, Mich. : c1982.
6. Title: Cryptography and security services : mechanisms and applications / Manuel Mogollon.
Author: Mogollon, Manuel.
Publication: Cybertech Pub., Hershey, : 2007.
7. Title: Formal modeling of role hierarchy and delegation constraints in role based access control policies / by Nafi’ Yousef Eid Alsawae’r ; supervised by Khair Eddin Sabri.
نمذجة رسمية لقيود التسلسل الهرمي والتفويض في سياسات التحكم المعتمده على الدور في الوصول
Author: al-Sawae’r, Nafi’ Yousef Eid.
Publication: 2017.
8. Title: Metasploit : the penetration tester's guide / by David Kennedy [and others].
Metasploit (Electronic resource)
Metasploit (Electronic resource)
Metasploit (Electronic resource)
Publication: No Starch Press, San Francisco : �2011.
9. Title: Introduction to data security and controls/ Edward R. Buck..
Author: Buck, Edward R.
Publication: QED Information Sciences, Wellesly:
10. Title: Information integrity : a structure for its definition and management / Hal B. Becker.
Author: Becker, Hal B.
Publication: McGraw-Hill, New York : c1983.
11. Title: Cryptography, a primer / Alan G. Konheim.
Author: Konheim, Alan G., 1934-
Publication: Wiley, New York : c1981.
12. Title: Firewalls 24 seven / Matthew Strebe, Charles Perkins.
Firewalls twenty four seven
24 seven
Twenty four seven
Author: Strebe, Matthew.
Publication: Sybex, San Francisco, CA : c2000.
13. Title: Cryptography and data security / Dorothy Elizabeth Robling Denning.
Author: Denning, Dorothy Elizabeth Robling, 1945
Publication: Addison-Wesley, Reading, Mass. : c1982.
14. Title: Linux firewalls.
Linux.
Linux firewalls.
Author: Suehring, Steve.
Publication: Novell Press, Indianapolis, Ind. : 2006.
Edition: 3rd ed. / Steve Suehring, Robert Ziegler.
15. Title: Professional rootkits / Ric Vieler.
Rootkits
Wrox professional guides
Microsoft Windows (Computer file)
Author: Vieler, Ric, 1960-
Publication: Wiley/Wrox, Indianapolis, IN : c2007.
16. Title: Firewalls 24 seven / Matthew Strebe, Charles Perkins.
Firewalls twenty four seven
24 seven
Twenty four seven
Author: Strebe, Matthew.
Publication: Sybex, San Francisco, CA : c2000.
17. Title: Rootkits, spyware/adware, keyloggers and backdoors : detection and neutralization / Oleg Zaytsev.
Author: Zaytsev, Oleg.
Publication: A-List, Wayne, Pa. : c2007.
Edition: 1st ed.
18. Title: Network security : private communication in a public world / Charlie Kaufman, Radia Perlman, Mike Speciner.
Prentice Hall series in computer networking and distributed systems
Author: Kaufman, Charlie.
Publication: Prentice Hall PTR, Upper Saddle River, NJ : c2002.
Edition: 2nd ed.
19. Title: Cryptology unlocked / Reinhard Wobst ; translated by Angelika Shafir.
Author: Wobst, Reinhard.
Publication: John Wiley & Sons, Chichester ; Hoboken, NJ : c2007.
20. Title: Practical intrusion analysis : prevention and detection for the twenty-first century / Ryan Trost.
Author: Trost, Ryan.
Publication: Addison-Wesley, Upper Saddle River, NJ : c2010.
21. Title: A novel algorithm for defending the denial of service attacks in sensor networks / by Ramzy Rajeh Ahmad Saifan ; supervised by Omar Mohmoud al-Jarrah.
خوارزمية جديد لمنع هجوم حجب الخدمة في شبكات المجسات
Author: Suʻayfan, Ramzi Rajih Ahmad.
Publication: 2006.
22. Title: Hybrid pattern matching algorithm for intrusion detection systems / by Niveen Yaser Ekailan ; supervised by Monther al-Dwairi.
خوارزمية مطابقة أنماط هجينة لكشف التسلل
Author: Uqaylan, Nifin Yasir.
Publication: 2011.
23. Title: Modern authentication with Azure Active Directory for web applications / Vittorio Bertocci.
Windows Azure.
Author: Bertocci, Vittorio,
Publication: Microsoft Press, Redmond, Washington : [2016]
24. Title: A REPUTATION SYSTEM TO DETECT DGA-BASED BOTNETS USING DNS TRAFFIC MINING IN MONITORED NETWORKS / by Raeda Freehat, ; Advisor Najib A. Kofahi.
Author: Freehat, Raeda
Publication: 2018
25. Title: Integrated security systems design : a complete reference for building enterprise-wide digital security systems / Thomas L. Norman.
Author: Norman, Thomas L.,
Publication: Elsevier/Butterworth-Heinemann, Amsterdam : [2014]
Edition: Second edition.
26. Title: A proposed modelfor E-mail securtiy in E-government / by Falah Rashad Falah ; supervised by Prof. Dr. Alaa Hussein al-Hamami.
طريقة مقترحة لأمنية البريد الإلكتروني في الحكومة الإلكترونية
Author: Falah, Falah Rashad,
Publication: 2016.
27. Title: Implementation of Real-Time Cryptographic Systems in the Cloud Environment : by Maram AL-Lassasmeh ; Advisor Abedalmuhdi M Almomany, Amin Jarrah .
تطبيق أنظمة التشفير في الزمن الحقيقي في البيئة السحابية
Author: AL-Lassasmeh, Maram,
Publication: Yarmouk University, Irbid : 2022.
28. Title: Supervised Machine Learning Techniques for Intrusion Detection / prepared by Wafa' Issam Jamil Eleisah ; supervisor Emad Eddien Awad Abdallah, Professor.
استخدام تقنيات التعلم الالي لكشف الهجمات الالكترونية
Author: Eleisah, Wafa' Issam Jamil
Publication: The Hashemite University, Zarqa : 2022.
29. Title: Rogue access point localization using particle swarm optimization / by Mohammad Badri al-Refai ; supervised by Dr. Ahmad al-Qerem, Dr. Fahed Awad.
Author: al-Refai, Mohammad Badri,
Publication: 2017.
30. Title: An improved secure anonymity-preserving remote user authentication and session key agreement scheme based on ECC / by Eman Mohammad Bil'as Khamis ; supervised by Dr. Khaled Mohammad Batiha.
تحسين مخطط حماية مصادقة المستخدم عن بعد بالحفاظ على هويته وتوافق مفتاح الجلسة اعتماداً على خوارزمية ECC
Author: Khamis, Eman Mohammad Bil'as,
Publication: 2018.
31. Title: Supporting multi-client and multi-server user authentication in the context of the internet of things / by Malek Saleh alJbour ; Supervised by Prof. Dr. Wesam A. almobaideen.
دعم تعدد العميل وتعدد الخادم في مصادقة هوية المستخدم في نظام شبكات الأشياء
Author: alJbour, Malek Saleh,
Publication: 2018.
32. Title: Verification of access control policies using model checking / by Raya Kamel Ali al-Yazjeen ; supervised by Dr. Khair Eddin Sabri.
التحقق من سياسات التحكم في الوصول باستخدام فحص النموذج
Author: Al-Yazjeen, Raya Kamel Ali,
Publication: 2020.
33. Title: Managed code rootkits : hooking into runtime environments / Erez Metula.
Author: Metula, Erez.
Publication: Elsevier/Syngress, Amsterdam ; Boston, MA : c2011.
34. Title: An approach to analyze and detect BotNet behavior for IoT devices / by Ahmad Raji Wshah ; supervised by Dr. Sufyan alMajali.
منهج جديد لتحليل وكشف سلوك الروبوتات البرمجية في أجهزة إنترنت الأشياء
Author: Wshah, Ahmad Raji,
Publication: 2018.
35. Title: Flexible information flow control in object-oriented systems / by Lina Abdul Rahman Salem ; supervised by Allaoua Maamir, co-supervisor AbdelAziz Fellah.
Author: Salem, Lina Abd al-rahman.
Publication: 2007.
36. Title: Development of organizations' security using data mining on log files / by Taghreed Qasim Challoob ; supervised Dr. Khaled Batiha, co-supervisor Prof. Venus Samawi.
تطوير أمنية المنظمات بأستخدام تنقيب البيانات على سجلات الملفات
Author: Challoob, Taghreed Qasim,
Publication: 2014
37. Title: Enhanced solutions for misuse network intrusion detection system using sga and ssga / by Sabah Abdulazeez Jebur ; supervised by Prof. Dr. Hebah H. O. Nasereddin.
الحلول المحسنة لنظام كشف التطفل باستخدام الخوارزمية الجينية البسيطة والخوارومية الجينية الحالة المستقرة
Author: Jebur, Sabah Abd-ul-Azeez,
Publication: 2015.
38. Title: Integrated security systems design a complete reference for building enterprise-wide digital security systems / Thomas Norman.
Author: Norman, Thomas L.
Publication: Butterworth-Heinemann, Waltham, MA : �2014.
Edition: 2nd ed.
39. Title: Development of a network-based Intrusion prevention system using data mining approach / by Nagham Farouk al-Sammerai ; supervised by Prof. Dr. Alaa Hussein al-Hamami.
تطوير نظام منع التطفل المعتمد على الشبكة بأستخدام أسلوب تنقيب البيانات
Author: al-Sammerai, Nagham Farouk,
Publication: 2011.
40. Title: Botnet group behavior detection based on temporal DNS traffic similarity / by Walaa Mohammad bani Domi ; supervised by Dr. Ahmed M. Manasrah.
اكتشاف الشبكات الروبوتية من خلال الخصائص الزمنية لعملها المنسق من ناحية بيانات الشبكات من نوع DNS
Author: bani Domi, Walaa Mohammad,
Publication: 2015.
41. Title: New technique for cross-platform availability control over electronic messages / by Ward Ahmed Al-Hussein ; supervised by Prof. Dr. Hebah H. O. Nasereddin.
استخدام طريقة جديدة في عملية التحكم في البريد الإلكتروني
Author: al-Hussein, Ward Ahmed,
Publication: 2015.
42. Title: Readings and cases in information security : law and ethics / Michael E. Whitman and Herbert J. Mattord.
Author: Whitman, Michael E., 1964-
Publication: Course Technology, Cengage Learning, Boston, MA : �2011.
 
 
Results 1 - 42 of 42
Duplicate Items
Add to My List

Print
Sorts and Limits