|
|
|
1.
Title:
Inside Internet security : what hackers don't want you to know / Jeff Crume.
Author:
Crume, Jeff.
Publication:
Addison-Wesley, Harlow, Eng. ; New York : 2000.
|
|
|
|
2.
Title:
Bypassing the antiviruson-access scanner's thresholds / by Fatima Mohammed Theab Abu Hjeela ; advisor, Mohammed I. Al-Saleh, co-advisor, Zaid A. al-Sharif.
تجاوز امكانيات برامج مكافحة الفيروسات.
Author:
Abu Hjeela, Fatima Mohammed Theab.
Publication:
JUST, Irbid, Jordan : 2013.
|
|
|
|
3.
Title:
Mission critical! : Internet security / [Bradley Dunsmore, Jeffrey W. Brown, Michael Cross ; technical editor, Stace Cunningham].
Author:
Dunsmore, Bradley.
Publication:
Syngress, Rockland, Ma. : 2001.
|
|
|
|
4.
Title:
MCSE exam 70-227 : Microsoft Internet security and acceleration server 2000 : training kit / Microsoft.
MCSE training kit
IT professional
Publication:
Microsoft Press, Redmond, Wash. : c2001.
|
|
|
|
5.
Title:
Aggressive network self-defense / Neil Archibald ... [et al] ; technical editor Neil R. Wyler (aka Grifter), foreword by Timothy M. Mullen (Thor).
Publication:
shroff publishers & distributors pvt ltd, Mumbai : c2005.
|
|
|
|
6.
Title:
Internet security : hacking, counterhacking, and society / [edited by] Kenneth Einar Himma.
Publication:
Jones and Bartlett Publishers, Sudbury, Mass. : c2007.
|
|
|
|
7.
Title:
Internet security professional reference / Derek Atkins ... [et al.].
Publication:
New Riders Pub., Indianapolis, IN : c1997.
Edition:
2nd ed.
|
|
|
|
8.
Title:
Developing a Word-Based Encryption Algorithm by Amer M. Al-Bsharat ; Advisor Mohammad A. Al-Jarrah.
Author:
Al-Bsharat, Amer M.
Publication:
Yarmouk university, Irbid : 2016.
|
|
|
|
9.
Title:
Cisco secure Internet security solutions / Andrew G. Mason, Mark J. Newcomb.
Cisco Press Core series
Author:
Mason, Andrew G.
Publication:
Cisco Press, Indianapolis, IN : 2001.
|
|
|
|
10.
Title:
Security performance analysis and enhancement authentication for internet of things
/ by Haya Ali Joudeh ; supervised by Dr. Jaafer al Saraireh.
تحليل الأداء الأمني وتحسين التحقق في إنترنت الأشياء
Author:
Joudeh, Haya Ali,
Publication:
2018.
|
|
|
|
11.
Title:
Computer & internet security : a hands-on approach / Wenliang Du.
Computer and internet security
Author:
Du, Wenliang,
Publication:
{Publisher not identified], [Place of publication not identified] : [2019]
Edition:
Second edition
|
|
|
|
12.
Title:
Sharing bandwidth / Simon St. Laurent.
Author:
St. Laurent, Simon.
Publication:
IDG Books Worldwide, Foster City, CA : c1998.
|
|
|
|
13.
Title:
Internet trust and security : the way ahead / James Essinger.
Author:
Essinger, James, 1957-
Publication:
Addison-Wesley, Harlow : 2001.
|
|
|
|
14.
Title:
I-way robbery : crime on the Internet / William C. Boni and Gerald L. Kovacich.
Author:
Boni, William C.
Publication:
Butterworth-Heinemann, Boston : c1999.
|
|
|
|
15.
Title:
E-commerce security : weak links, best defenses / Anup Ghosh.
Author:
Ghosh, Anup K.
Publication:
John Wiley, New York : 1998.
|
|
|
|
16.
Title:
The Internet security guidebook : from planning to deployment / Juanita Ellis, Tim Speed.
The Korper and Ellis e-commerce books series
Author:
Ellis, Juanita.
Publication:
Academic Press, San Diego : c2001.
|
|
|
|
17.
Title:
Internet security : a jumpstart for systems administrators and IT managers / Tim Speed, Juanita Ellis.
Author:
Speed, Tim.
Publication:
Digital Press, Amsterdam ; Boston : c2003.
|
|
|
|
18.
Title:
Principles and practice of information security : protecting computers from hackers and lawyers / Linda Volonino, Stephen R. Robinson with contributions by Charles P. Volonino..
Author:
Volonino, Linda
Publication:
Pearson Prentice Hall, Upper Saddle River, N. J.: 2004.
|
|
|
|
19.
Title:
Designing network security / Merike Kaeo.
Author:
Kaeo, Merike.
Publication:
Cisco Press, Indianapolis, IN : c2004.
Edition:
2nd ed.
|
|
|
|
20.
Title:
Internet denial of service : attack and defense mechanisms / Jelena Mirkovic ... [et al.].
The Radia Perlman series in computer networking and security
Publication:
Prentice Hall Professional Technical Reference, Upper Saddle River, N.J. : 2005.
|
|
|
|
21.
Title:
Internet security : a jumpstart for systems administrators and IT managers/ Tim Speed, Juanita Ellis.
Author:
Speed,Tim
Publication:
Elsevier, New Delhi: 2003.
|
|
|
|
22.
Title:
Encryption : Protecting your data / Ankit Fadia and Jaya Bhattacharjee.
Author:
Fadia, Ankit.
Publication:
Vikas Publishing House ; New Delhi : 2007.
|
|
|
|
23.
Title:
Intrusion detection & prevention / Carl Endorf, Dr. Eugene Schultz, Jim Mellander.
Intrusion detection and prevention
Author:
Endorf, Carl F., 1969-
Publication:
Tata McGraw-Hill, New Delhi : 200.
|
|
|
|
24.
Title:
Crimeware : understanding new attacks and defenses / Markus Jakobsson, Zulfikar Ramzan.
Publication:
Addison-Wesley, Upper Saddle River, NJ : c2008.
|
|
|
|
25.
Title:
Web hacker boot camp / Gerald Quakenbush.
Information security series
Author:
Quakenbush, Gerald
Publication:
MasterMind Press., Noblesville, Indiana : 2005.
|
|
|
|
26.
Title:
Microsoft ISA Server 2006 unleashed / Michael Noel.
Author:
Noel, Michael.
Publication:
Sams, Indianapolis, Ind. : 2008.
|
|
|
|
27.
Title:
E-commerce security : weak links, best defenses / Anup K. Ghosh.
Author:
Ghosh, Anup K.
Publication:
John Wiley, New York : 1998.
|
|
|
|
28.
Title:
Secure Java : for web application development / Abhay Bhargav and B.V. Kumar.
Author:
Bhargav, Abhay.
Publication:
CRC Press, Boca Raton, FL : c2011.
|
|
|
|
29.
Title:
A Graphic Processing unit Based Pattern Matching for Intrusion Detection using Mapreduce Framework and Dynamic Programming / by Ansam Mohammad Ali Abu Dalo ; Supervised by Moath Jarrah.
وحدة المعالجه القائمه على نمط المطابقه للجرافيك باستخدام الاطار كشف التسلل ماب ريديوس والبرمجه الديناميكية.
Author:
abu Dalo, Ansam Mohammad Ali.
Publication:
JUST, Irbid, Jordan : 2013.
|
|
|
|
30.
Title:
Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 / Harlan Carvey.
Microsoft Windows (Computer file)
Author:
Carvey, Harlan A.
Publication:
Syngress, Amsterdam ; Boston : [2014]
Edition:
Fourth edition.
|
|
|
|
31.
Title:
Internet security : how to defend against attackers on the web / Mike Harwood.
How to defend against attackers on the web
Jones & Bartlett Learning information systems security & assurance series
Security strategies in Web applications and social networking.
Jones & Bartlett Learning information systems security & assurance series.
Author:
Harwood, Mike,
Publication:
Jones & Bartlett Learning, Burlington, MA : [2016]
Edition:
Second edition.
|
|
|
|
32.
Title:
Internet security : a hands-on approach / Wenliang Du.
Author:
Du, Wenliang.
Publication:
[Publisher not identified], [Place of publication not identified] : 2019.
Edition:
Second edition
|
|
|
|
33.
Title:
Attention-Based Deep Learning Approach for Detecting Iot Botnet-Based Distributed Denial of Service Attacks / by Maha Khalifah Al-Jarah ; advisor, Prof. Mohammad Shurman, co-advisor, Prof. Basheer Al-Duwairi.
نهج التعلم العميق القائم على الانتباه لاكتشاف هجمات حجب الخدمة الموزعة القائمة على شبكات روبوتات انترنت الأشياء
Author:
Al-Jarah, Maha Khalifah,
Publication:
Jordan University of Science and Technology, Irbid : 2021.
|
|
|
|
34.
Title:
Building Internet Firewalls : Internet and Web security / Elizabeth D. Zwicky, Simon Cooper & D. Brent Chapman.
Author:
Zwicky, Elizabeth D.
Publication:
O'Reilly, Beijing ; Cambridge, Mass. : c2000.
Edition:
2nd ed.
|
|
|
|
35.
Title:
Digital certificates : applied Internet security / Jalal Feghhi, Jalil Feghhi, Peter Williams.
Author:
Feghhi, Jalal.
Publication:
AddisonWesley, Reading, Mass. : c1999.
|
|
|
|
36.
Title:
Designing network security / Merike Kaeo.
Practical guide to creating a secure network infrastructure
Cisco Press fundamentals series
Author:
Kaeo, Merike.
Publication:
Macmillan Technical Pub., Indianapolis, Ind. : c1999.
|
|
|
|
37.
Title:
Adaptive multi-layer privacy information centric network for ITO / by Huda Khaled Saadeh ; Supervised by Prof. Dr. Wesam abdelrahman almobaideen, Dr. Khair Eddin Muawiyah Sabri.
الشبكة مركزية المعلومات خصوصية متكيفة متعددة الطبقات لإنترنت الأشياء
Author:
Saadeh, Huda Khaled,
Publication:
2018.
|
|
|
|
38.
Title:
An intrusion detection system based on dendrite morphological neural networks / by Suhad Ibrahim Abureesh ; Supervised by Prof. Dr. Mohammed Aref al Shridah, Dr. Khair Eddin Moawya Sabri.
نظام كشف التسلل المبنى على تشعبات الشبكات العصبية المورفولوجية
Author:
Abureesh, Suhad Ibrahim,
Publication:
2018.
|
|
|
|
39.
Title:
The computer privacy handbook / Andr<U+00E9> Bacard.
Publication:
Peachpit Press, Berkeley, CA : c1995.
|
|
|
|
40.
Title:
Internet security for business / Terry Bernstein ... [et al.].
Publication:
Wiley, New York : c1996.
|
|
|
|
41.
Title:
Internet besieged : countering cyberspace scofflaws / [edited by] Dorothy E. Denning, Peter J. Denning.
Publication:
ACM Press ; Addison Wesley, New York, N.Y. : Reading, Mass. : c1998.
|
|
|
|
42.
Title:
Hacker's challenge 2 : test your network security & forensic skills / Mike Schiffman ... [et al.].
Publication:
McGraw-Hill/Osborne, New York : 2003.
|
|
|
|
43.
Title:
Development and performance analysis of hybrid IPSec SSL VPN technology / by Mazen Ghazi Juma ; supervised by Hilal al-Bayatti.
المهجنة IPSec SSLتطوير و تحليل أداء تكنولوجيا الشبكات الخاصة الإفتراضية لتقنيات البروتوكولات الآمنة.
Author:
Juma, Mazen Ghazi.
Publication:
2007.
|
|
|
|
44.
Title:
Network intrusion analysis : methodologies, tools, and techniques for incident analysis and response / edited by Joe Fichera, Steven Bolt.
Publication:
Elsevier, Amsterdam : [2013]
Edition:
First edition.
|
|
|
|
45.
Title:
Cryptography for Internet and database applications : developing secret and public key techniques with Java / Nick Galbreath.
Author:
Galbreath, Nick, 1970-
Publication:
Wiley Pub., Indianapolis, Ind. : c2002.
|
|
|
|
46.
Title:
Botnet Group Behavior Detection Based on Temporal DNS Traffic Similarity by Walaa Mohammad Ahmad Bani Domi ; Advisor Ahmed Manasrah.
Author:
bani Domi, Walaa Mohammad,
Publication:
Yarmouk University, Irbid : 2015.
|
|
|
|
47.
Title:
An approach to analyze and detect BotNet behavior for IoT devices
/ by Ahmad Raji Wshah ; supervised by Dr. Sufyan alMajali.
منهج جديد لتحليل وكشف سلوك الروبوتات البرمجية في أجهزة إنترنت الأشياء
Author:
Wshah, Ahmad Raji,
Publication:
2018.
|
|
|
|
48.
Title:
Digital E-mail forensic / by Duha 'Muhammad Bassam' Qutishat ; supervised by Mohammad Belal al-Zoubi.
التعامل القضائي في الجرائم الإلكترونية المتعلقة بالبريد الإلكتروني
Author:
Qutishat, Duha 'Muhammad Bassam'.
Publication:
2012.
|
|
|
|
49.
Title:
Spam profile detection in social networks based on public attributes / by Ala’ Mahmoud al-Zoubi ; supervised by Ja'far Alqatawna, co-supervisor Hossam Faris.
كشف الحسابات الغير مرغوبة والمؤذية في مواقع التواصل الاجتماعي عن طريق الخصائص العامة
Author:
al-Zoubi, Ala’ Mahmoud.
Publication:
2017.
|
|
|
|
50.
Title:
Malicious spam detection in email systems of educational institutes / by Aisha Deeb Zaid ; supervised by Ammar Huneiti, co-supervisor Ja'far alqatawna.
كشف البريد الإلكتروني الخبيث في أنظمة البريد الإلكتروني للمؤسسات التعليمية
Author:
Zaid, Aisha Deeb.
Publication:
2016.
|
|
|
|
51.
Title:
Preventing counterfeiting of certificates in educational institutions using blockchain technology / by Mohammad Qasem Al-Masri ; Supervised by Prof. Dr. Mohammad Qatawneh.
منع تزوير الشهادات الرقمية في المؤسسات التعليمية باستخدام تكنولوجيا سلسلة الكتل
Author:
Al-Masri, Mohammad Qasem,
Publication:
2020.
|
|
|
|
52.
Title:
Computer & internet security : a hands-on approach / Wenliang Du.
Computer and internet security
Author:
Du, Wenliang,
Publication:
Independently published, [Place of publication not identified] : [2022]
Edition:
Third edition
|
|
|
|
53.
Title:
A framework for privacy protection using blockchain technology / by Farah Hussein Khamayseh; supervised by Prof. Dr. Nadim Ali Obeid, Prof. Dr. Khair Eddin Sabri.
إطار للحفاظ على السرية بالإعتماد على تكنلوجيا سلسلة الكتل
Author:
Khamayseh, Farah Hussein,
Publication:
2020.
|
|
|
|
54.
Title:
Detecting compromised iot devices using machine learning
/ by Tariq Jalal Ali al-Khader ; supervised by Prof. Dr. Khair Eddin Sabri.
اكتشاف اجهزة شبكة الاشياء المقرصنة باستخدام التعلم الالي
Author:
Al-Khader, Tariq Jalal Ali,
Publication:
2020.
|
|
|
|
55.
Title:
Linux essentials for cybersecurity / William "Bo" Rothwell, Denise Kinsey.
Pearson IT cybersecurity curriculum
Linux.
Linux.
Author:
Rothwell, William,
Publication:
Pearson Education, [Indianapolis, Indiana] : [2019]
|
|
|
|
56.
Title:
Botnet group behavior detection based on temporal DNS traffic similarity / by Walaa Mohammad bani Domi ; supervised by Dr. Ahmed M. Manasrah.
اكتشاف الشبكات الروبوتية من خلال الخصائص الزمنية لعملها المنسق من ناحية بيانات الشبكات من نوع DNS
Author:
bani Domi, Walaa Mohammad,
Publication:
2015.
|
|
|
|
|
|
|