|
|
|
1.
Title:
Intrusion detection in distributed systems : an abstraction-based approach / by Peng Ning, Sushil Jajodia, X. Sean Wang.
Advances in information security ;
Author:
Ning, Peng.
Publication:
Kluwer Academic Publishers, Boston : 2004.
|
|
|
|
2.
Title:
Advances in cryptology--EUROCRYPT '91 : Workshop on the Theory and Application of Cryptographic Techniques, Brighton, UK, April 8-11, 1991 : proceedings / D.W. Davies (ed.).
Lecture notes in computer science ;
Author:
EUROCRYPT '91 (1991 : Brighton, England)
Publication:
Springer-Verlag, Berlin ; New York : c1991.
|
|
|
|
3.
Title:
How secure is your wireless network? : safeguarding your Wi-Fi-LAN / Lee Barken.
Author:
Barken, Lee.
Publication:
Prentice Hall PTR, Upper Saddle River, NJ : c2004.
|
|
|
|
4.
Title:
Managers guide to computer security / Donn B. Parker.
Computer security management.
Author:
Parker, Donn B.
Publication:
Reston Pub. Co., Reston, Va. : c1981.
|
|
|
|
5.
Title:
Secrecy, authentication, and public key systems / by Ralph C. Merkle.
Computer science. Systems programming ;
Author:
Merkle, Ralph C. (Ralph Charles)
Publication:
UMI Research Press, Ann Arbor, Mich. : c1982.
|
|
|
|
6.
Title:
Cryptography and security services : mechanisms and applications / Manuel Mogollon.
Author:
Mogollon, Manuel.
Publication:
Cybertech Pub., Hershey, : 2007.
|
|
|
|
7.
Title:
Formal modeling of role hierarchy and delegation constraints in role based access control policies / by Nafi’ Yousef Eid Alsawae’r ; supervised by Khair Eddin Sabri.
نمذجة رسمية لقيود التسلسل الهرمي والتفويض في سياسات التحكم المعتمده على الدور في الوصول
Author:
al-Sawae’r, Nafi’ Yousef Eid.
Publication:
2017.
|
|
|
|
8.
Title:
Metasploit : the penetration tester's guide / by David Kennedy [and others].
Metasploit (Electronic resource)
Metasploit (Electronic resource)
Metasploit (Electronic resource)
Publication:
No Starch Press, San Francisco : �2011.
|
|
|
|
9.
Title:
Introduction to data security and controls/ Edward R. Buck..
Author:
Buck, Edward R.
Publication:
QED Information Sciences, Wellesly:
|
|
|
|
10.
Title:
Information integrity : a structure for its definition and management / Hal B. Becker.
Author:
Becker, Hal B.
Publication:
McGraw-Hill, New York : c1983.
|
|
|
|
11.
Title:
Cryptography, a primer / Alan G. Konheim.
Author:
Konheim, Alan G., 1934-
Publication:
Wiley, New York : c1981.
|
|
|
|
12.
Title:
Firewalls 24 seven / Matthew Strebe, Charles Perkins.
Firewalls twenty four seven
24 seven
Twenty four seven
Author:
Strebe, Matthew.
Publication:
Sybex, San Francisco, CA : c2000.
|
|
|
|
13.
Title:
Cryptography and data security / Dorothy Elizabeth Robling Denning.
Author:
Denning, Dorothy Elizabeth Robling, 1945
Publication:
Addison-Wesley, Reading, Mass. : c1982.
|
|
|
|
14.
Title:
Linux firewalls.
Linux.
Linux firewalls.
Author:
Suehring, Steve.
Publication:
Novell Press, Indianapolis, Ind. : 2006.
Edition:
3rd ed. / Steve Suehring, Robert Ziegler.
|
|
|
|
15.
Title:
Professional rootkits / Ric Vieler.
Rootkits
Wrox professional guides
Microsoft Windows (Computer file)
Author:
Vieler, Ric, 1960-
Publication:
Wiley/Wrox, Indianapolis, IN : c2007.
|
|
|
|
16.
Title:
Firewalls 24 seven / Matthew Strebe, Charles Perkins.
Firewalls twenty four seven
24 seven
Twenty four seven
Author:
Strebe, Matthew.
Publication:
Sybex, San Francisco, CA : c2000.
|
|
|
|
17.
Title:
Rootkits, spyware/adware, keyloggers and backdoors : detection and neutralization / Oleg Zaytsev.
Author:
Zaytsev, Oleg.
Publication:
A-List, Wayne, Pa. : c2007.
Edition:
1st ed.
|
|
|
|
18.
Title:
Network security : private communication in a public world / Charlie Kaufman, Radia Perlman, Mike Speciner.
Prentice Hall series in computer networking and distributed systems
Author:
Kaufman, Charlie.
Publication:
Prentice Hall PTR, Upper Saddle River, NJ : c2002.
Edition:
2nd ed.
|
|
|
|
19.
Title:
Cryptology unlocked / Reinhard Wobst ; translated by Angelika Shafir.
Author:
Wobst, Reinhard.
Publication:
John Wiley & Sons, Chichester ; Hoboken, NJ : c2007.
|
|
|
|
20.
Title:
Practical intrusion analysis : prevention and detection for the twenty-first century / Ryan Trost.
Author:
Trost, Ryan.
Publication:
Addison-Wesley, Upper Saddle River, NJ : c2010.
|
|
|
|
21.
Title:
A novel algorithm for defending the denial of service attacks in sensor networks / by Ramzy Rajeh Ahmad Saifan ; supervised by Omar Mohmoud al-Jarrah.
خوارزمية جديد لمنع هجوم حجب الخدمة في شبكات المجسات
Author:
Suʻayfan, Ramzi Rajih Ahmad.
Publication:
2006.
|
|
|
|
22.
Title:
Hybrid pattern matching algorithm for intrusion detection systems / by Niveen Yaser Ekailan ; supervised by Monther al-Dwairi.
خوارزمية مطابقة أنماط هجينة لكشف التسلل
Author:
Uqaylan, Nifin Yasir.
Publication:
2011.
|
|
|
|
23.
Title:
Modern authentication with Azure Active Directory for web applications / Vittorio Bertocci.
Windows Azure.
Author:
Bertocci, Vittorio,
Publication:
Microsoft Press, Redmond, Washington : [2016]
|
|
|
|
24.
Title:
A REPUTATION SYSTEM TO DETECT DGA-BASED
BOTNETS USING DNS TRAFFIC MINING IN MONITORED
NETWORKS / by Raeda Freehat, ; Advisor Najib A. Kofahi.
Author:
Freehat, Raeda
Publication:
2018
|
|
|
|
25.
Title:
Integrated security systems design : a complete reference for building enterprise-wide digital security systems / Thomas L. Norman.
Author:
Norman, Thomas L.,
Publication:
Elsevier/Butterworth-Heinemann, Amsterdam : [2014]
Edition:
Second edition.
|
|
|
|
26.
Title:
A proposed modelfor E-mail securtiy in E-government / by Falah Rashad Falah ; supervised by Prof. Dr. Alaa Hussein al-Hamami.
طريقة مقترحة لأمنية البريد الإلكتروني في الحكومة الإلكترونية
Author:
Falah, Falah Rashad,
Publication:
2016.
|
|
|
|
27.
Title:
Implementation of Real-Time Cryptographic Systems in the Cloud Environment : by Maram AL-Lassasmeh ; Advisor Abedalmuhdi M Almomany, Amin Jarrah .
تطبيق أنظمة التشفير في الزمن الحقيقي في البيئة السحابية
Author:
AL-Lassasmeh, Maram,
Publication:
Yarmouk University, Irbid : 2022.
|
|
|
|
28.
Title:
Supervised Machine Learning Techniques for Intrusion Detection / prepared by Wafa' Issam Jamil Eleisah ; supervisor Emad Eddien Awad Abdallah, Professor.
استخدام تقنيات التعلم الالي لكشف الهجمات الالكترونية
Author:
Eleisah, Wafa' Issam Jamil
Publication:
The Hashemite University, Zarqa : 2022.
|
|
|
|
29.
Title:
Rogue access point localization using particle swarm optimization / by Mohammad Badri al-Refai ; supervised by Dr. Ahmad al-Qerem, Dr. Fahed Awad.
Author:
al-Refai, Mohammad Badri,
Publication:
2017.
|
|
|
|
30.
Title:
An improved secure anonymity-preserving remote user authentication and session key agreement scheme based on ECC / by Eman Mohammad Bil'as Khamis ; supervised by Dr. Khaled Mohammad Batiha.
تحسين مخطط حماية مصادقة المستخدم عن بعد بالحفاظ على هويته وتوافق مفتاح الجلسة اعتماداً على خوارزمية ECC
Author:
Khamis, Eman Mohammad Bil'as,
Publication:
2018.
|
|
|
|
31.
Title:
Supporting multi-client and multi-server user authentication in the context of the internet of things / by Malek Saleh alJbour ; Supervised by Prof. Dr. Wesam A. almobaideen.
دعم تعدد العميل وتعدد الخادم في مصادقة هوية المستخدم في نظام شبكات الأشياء
Author:
alJbour, Malek Saleh,
Publication:
2018.
|
|
|
|
32.
Title:
Verification of access control policies using model checking
/ by Raya Kamel Ali al-Yazjeen ; supervised by Dr. Khair Eddin Sabri.
التحقق من سياسات التحكم في الوصول
باستخدام فحص النموذج
Author:
Al-Yazjeen, Raya Kamel Ali,
Publication:
2020.
|
|
|
|
33.
Title:
Managed code rootkits : hooking into runtime environments / Erez Metula.
Author:
Metula, Erez.
Publication:
Elsevier/Syngress, Amsterdam ; Boston, MA : c2011.
|
|
|
|
34.
Title:
An approach to analyze and detect BotNet behavior for IoT devices
/ by Ahmad Raji Wshah ; supervised by Dr. Sufyan alMajali.
منهج جديد لتحليل وكشف سلوك الروبوتات البرمجية في أجهزة إنترنت الأشياء
Author:
Wshah, Ahmad Raji,
Publication:
2018.
|
|
|
|
35.
Title:
Flexible information flow control in object-oriented systems / by Lina Abdul Rahman Salem ; supervised by Allaoua Maamir, co-supervisor AbdelAziz Fellah.
Author:
Salem, Lina Abd al-rahman.
Publication:
2007.
|
|
|
|
36.
Title:
Development of organizations' security using data mining on log files / by Taghreed Qasim Challoob ; supervised Dr. Khaled Batiha, co-supervisor Prof. Venus Samawi.
تطوير أمنية المنظمات بأستخدام تنقيب البيانات على سجلات الملفات
Author:
Challoob, Taghreed Qasim,
Publication:
2014
|
|
|
|
37.
Title:
Enhanced solutions for misuse network
intrusion detection system using sga and
ssga / by Sabah Abdulazeez Jebur ; supervised by Prof. Dr. Hebah H. O. Nasereddin.
الحلول المحسنة لنظام كشف التطفل باستخدام الخوارزمية الجينية البسيطة والخوارومية الجينية الحالة المستقرة
Author:
Jebur, Sabah Abd-ul-Azeez,
Publication:
2015.
|
|
|
|
38.
Title:
Integrated security systems design a complete reference for building enterprise-wide digital security systems / Thomas Norman.
Author:
Norman, Thomas L.
Publication:
Butterworth-Heinemann, Waltham, MA : �2014.
Edition:
2nd ed.
|
|
|
|
39.
Title:
Development of a network-based Intrusion prevention system using data mining approach / by Nagham Farouk al-Sammerai ; supervised by Prof. Dr. Alaa Hussein al-Hamami.
تطوير نظام منع التطفل المعتمد على الشبكة بأستخدام أسلوب تنقيب البيانات
Author:
al-Sammerai, Nagham Farouk,
Publication:
2011.
|
|
|
|
40.
Title:
Botnet group behavior detection based on temporal DNS traffic similarity / by Walaa Mohammad bani Domi ; supervised by Dr. Ahmed M. Manasrah.
اكتشاف الشبكات الروبوتية من خلال الخصائص الزمنية لعملها المنسق من ناحية بيانات الشبكات من نوع DNS
Author:
bani Domi, Walaa Mohammad,
Publication:
2015.
|
|
|
|
41.
Title:
New technique for cross-platform availability
control over electronic messages / by Ward Ahmed Al-Hussein ; supervised by Prof. Dr. Hebah H. O. Nasereddin.
استخدام طريقة جديدة في عملية التحكم في البريد الإلكتروني
Author:
al-Hussein, Ward Ahmed,
Publication:
2015.
|
|
|
|
42.
Title:
Readings and cases in information security : law and ethics / Michael E. Whitman and Herbert J. Mattord.
Author:
Whitman, Michael E., 1964-
Publication:
Course Technology, Cengage Learning, Boston, MA : �2011.
|
|
|
|
|
|
|