Welcome
user_choices_background_image
Welcome
login container bottom
Search Libraries Catalogue
Duplicate Items
Add to My List

Print
Sorts and Limits

Results 1 - 56 of 56
1. Title: Inside Internet security : what hackers don't want you to know / Jeff Crume.
Author: Crume, Jeff.
Publication: Addison-Wesley, Harlow, Eng. ; New York : 2000.
2. Title: Bypassing the antiviruson-access scanner's thresholds / by Fatima Mohammed Theab Abu Hjeela ; advisor, Mohammed I. Al-Saleh, co-advisor, Zaid A. al-Sharif.
تجاوز امكانيات برامج مكافحة الفيروسات.
Author: Abu Hjeela, Fatima Mohammed Theab.
Publication: JUST, Irbid, Jordan : 2013.
3. Title: Mission critical! : Internet security / [Bradley Dunsmore, Jeffrey W. Brown, Michael Cross ; technical editor, Stace Cunningham].
Author: Dunsmore, Bradley.
Publication: Syngress, Rockland, Ma. : 2001.
4. Title: MCSE exam 70-227 : Microsoft Internet security and acceleration server 2000 : training kit / Microsoft.
MCSE training kit
IT professional
Publication: Microsoft Press, Redmond, Wash. : c2001.
5. Title: Aggressive network self-defense / Neil Archibald ... [et al] ; technical editor Neil R. Wyler (aka Grifter), foreword by Timothy M. Mullen (Thor).
Publication: shroff publishers & distributors pvt ltd, Mumbai : c2005.
6. Title: Internet security : hacking, counterhacking, and society / [edited by] Kenneth Einar Himma.
Publication: Jones and Bartlett Publishers, Sudbury, Mass. : c2007.
7. Title: Internet security professional reference / Derek Atkins ... [et al.].
Publication: New Riders Pub., Indianapolis, IN : c1997.
Edition: 2nd ed.
8. Title: Developing a Word-Based Encryption Algorithm by Amer M. Al-Bsharat ; Advisor Mohammad A. Al-Jarrah.
Author: Al-Bsharat, Amer M.
Publication: Yarmouk university, Irbid : 2016.
9. Title: Cisco secure Internet security solutions / Andrew G. Mason, Mark J. Newcomb.
Cisco Press Core series
Author: Mason, Andrew G.
Publication: Cisco Press, Indianapolis, IN : 2001.
10. Title: Security performance analysis and enhancement authentication for internet of things / by Haya Ali Joudeh ; supervised by Dr. Jaafer al Saraireh.
تحليل الأداء الأمني وتحسين التحقق في إنترنت الأشياء
Author: Joudeh, Haya Ali,
Publication: 2018.
11. Title: Computer & internet security : a hands-on approach / Wenliang Du.
Computer and internet security
Author: Du, Wenliang,
Publication: {Publisher not identified], [Place of publication not identified] : [2019]
Edition: Second edition
12. Title: Sharing bandwidth / Simon St. Laurent.
Author: St. Laurent, Simon.
Publication: IDG Books Worldwide, Foster City, CA : c1998.
13. Title: Internet trust and security : the way ahead / James Essinger.
Author: Essinger, James, 1957-
Publication: Addison-Wesley, Harlow : 2001.
14. Title: I-way robbery : crime on the Internet / William C. Boni and Gerald L. Kovacich.
Author: Boni, William C.
Publication: Butterworth-Heinemann, Boston : c1999.
15. Title: E-commerce security : weak links, best defenses / Anup Ghosh.
Author: Ghosh, Anup K.
Publication: John Wiley, New York : 1998.
16. Title: The Internet security guidebook : from planning to deployment / Juanita Ellis, Tim Speed.
The Korper and Ellis e-commerce books series
Author: Ellis, Juanita.
Publication: Academic Press, San Diego : c2001.
17. Title: Internet security : a jumpstart for systems administrators and IT managers / Tim Speed, Juanita Ellis.
Author: Speed, Tim.
Publication: Digital Press, Amsterdam ; Boston : c2003.
18. Title: Principles and practice of information security : protecting computers from hackers and lawyers / Linda Volonino, Stephen R. Robinson with contributions by Charles P. Volonino..
Author: Volonino, Linda
Publication: Pearson Prentice Hall, Upper Saddle River, N. J.: 2004.
19. Title: Designing network security / Merike Kaeo.
Author: Kaeo, Merike.
Publication: Cisco Press, Indianapolis, IN : c2004.
Edition: 2nd ed.
20. Title: Internet denial of service : attack and defense mechanisms / Jelena Mirkovic ... [et al.].
The Radia Perlman series in computer networking and security
Publication: Prentice Hall Professional Technical Reference, Upper Saddle River, N.J. : 2005.
21. Title: Internet security : a jumpstart for systems administrators and IT managers/ Tim Speed, Juanita Ellis.
Author: Speed,Tim
Publication: Elsevier, New Delhi: 2003.
22. Title: Encryption : Protecting your data / Ankit Fadia and Jaya Bhattacharjee.
Author: Fadia, Ankit.
Publication: Vikas Publishing House ; New Delhi : 2007.
23. Title: Intrusion detection & prevention / Carl Endorf, Dr. Eugene Schultz, Jim Mellander.
Intrusion detection and prevention
Author: Endorf, Carl F., 1969-
Publication: Tata McGraw-Hill, New Delhi : 200.
24. Title: Crimeware : understanding new attacks and defenses / Markus Jakobsson, Zulfikar Ramzan.
Publication: Addison-Wesley, Upper Saddle River, NJ : c2008.
25. Title: Web hacker boot camp / Gerald Quakenbush.
Information security series
Author: Quakenbush, Gerald
Publication: MasterMind Press., Noblesville, Indiana : 2005.
26. Title: Microsoft ISA Server 2006 unleashed / Michael Noel.
Author: Noel, Michael.
Publication: Sams, Indianapolis, Ind. : 2008.
27. Title: E-commerce security : weak links, best defenses / Anup K. Ghosh.
Author: Ghosh, Anup K.
Publication: John Wiley, New York : 1998.
28. Title: Secure Java : for web application development / Abhay Bhargav and B.V. Kumar.
Author: Bhargav, Abhay.
Publication: CRC Press, Boca Raton, FL : c2011.
29. Title: A Graphic Processing unit Based Pattern Matching for Intrusion Detection using Mapreduce Framework and Dynamic Programming / by Ansam Mohammad Ali Abu Dalo ; Supervised by Moath Jarrah.
وحدة المعالجه القائمه على نمط المطابقه للجرافيك باستخدام الاطار كشف التسلل ماب ريديوس والبرمجه الديناميكية.
Author: abu Dalo, Ansam Mohammad Ali.
Publication: JUST, Irbid, Jordan : 2013.
30. Title: Windows forensic analysis toolkit : advanced analysis techniques for Windows 8 / Harlan Carvey.
Microsoft Windows (Computer file)
Author: Carvey, Harlan A.
Publication: Syngress, Amsterdam ; Boston : [2014]
Edition: Fourth edition.
31. Title: Internet security : how to defend against attackers on the web / Mike Harwood.
How to defend against attackers on the web
Jones & Bartlett Learning information systems security & assurance series
Security strategies in Web applications and social networking.
Jones & Bartlett Learning information systems security & assurance series.
Author: Harwood, Mike,
Publication: Jones & Bartlett Learning, Burlington, MA : [2016]
Edition: Second edition.
32. Title: Internet security : a hands-on approach / Wenliang Du.
Author: Du, Wenliang.
Publication: [Publisher not identified], [Place of publication not identified] : 2019.
Edition: Second edition
33. Title: Attention-Based Deep Learning Approach for Detecting Iot Botnet-Based Distributed Denial of Service Attacks / by Maha Khalifah Al-Jarah ; advisor, Prof. Mohammad Shurman, co-advisor, Prof. Basheer Al-Duwairi.
نهج التعلم العميق القائم على الانتباه لاكتشاف هجمات حجب الخدمة الموزعة القائمة على شبكات روبوتات انترنت الأشياء
Author: Al-Jarah, Maha Khalifah,
Publication: Jordan University of Science and Technology, Irbid : 2021.
34. Title: Building Internet Firewalls : Internet and Web security / Elizabeth D. Zwicky, Simon Cooper & D. Brent Chapman.
Author: Zwicky, Elizabeth D.
Publication: O'Reilly, Beijing ; Cambridge, Mass. : c2000.
Edition: 2nd ed.
35. Title: Digital certificates : applied Internet security / Jalal Feghhi, Jalil Feghhi, Peter Williams.
Author: Feghhi, Jalal.
Publication: Addison­Wesley, Reading, Mass. : c1999.
36. Title: Designing network security / Merike Kaeo.
Practical guide to creating a secure network infrastructure
Cisco Press fundamentals series
Author: Kaeo, Merike.
Publication: Macmillan Technical Pub., Indianapolis, Ind. : c1999.
37. Title: Adaptive multi-layer privacy information centric network for ITO / by Huda Khaled Saadeh ; Supervised by Prof. Dr. Wesam abdelrahman almobaideen, Dr. Khair Eddin Muawiyah Sabri.
الشبكة مركزية المعلومات خصوصية متكيفة متعددة الطبقات لإنترنت الأشياء
Author: Saadeh, Huda Khaled,
Publication: 2018.
38. Title: An intrusion detection system based on dendrite morphological neural networks / by Suhad Ibrahim Abureesh ; Supervised by Prof. Dr. Mohammed Aref al Shridah, Dr. Khair Eddin Moawya Sabri.
نظام كشف التسلل المبنى على تشعبات الشبكات العصبية المورفولوجية
Author: Abureesh, Suhad Ibrahim,
Publication: 2018.
39. Title: The computer privacy handbook / Andr<U+00E9> Bacard.
Publication: Peachpit Press, Berkeley, CA : c1995.
40. Title: Internet security for business / Terry Bernstein ... [et al.].
Publication: Wiley, New York : c1996.
41. Title: Internet besieged : countering cyberspace scofflaws / [edited by] Dorothy E. Denning, Peter J. Denning.
Publication: ACM Press ; Addison Wesley, New York, N.Y. : Reading, Mass. : c1998.
42. Title: Hacker's challenge 2 : test your network security & forensic skills / Mike Schiffman ... [et al.].
Publication: McGraw-Hill/Osborne, New York : 2003.
43. Title: Development and performance analysis of hybrid IPSec SSL VPN technology / by Mazen Ghazi Juma ; supervised by Hilal al-Bayatti.
المهجنة IPSec SSLتطوير و تحليل أداء تكنولوجيا الشبكات الخاصة الإفتراضية لتقنيات البروتوكولات الآمنة.
Author: Juma, Mazen Ghazi.
Publication: 2007.
44. Title: Network intrusion analysis : methodologies, tools, and techniques for incident analysis and response / edited by Joe Fichera, Steven Bolt.
Publication: Elsevier, Amsterdam : [2013]
Edition: First edition.
45. Title: Cryptography for Internet and database applications : developing secret and public key techniques with Java / Nick Galbreath.
Author: Galbreath, Nick, 1970-
Publication: Wiley Pub., Indianapolis, Ind. : c2002.
46. Title: Botnet Group Behavior Detection Based on Temporal DNS Traffic Similarity by Walaa Mohammad Ahmad Bani Domi ; Advisor Ahmed Manasrah.
Author: bani Domi, Walaa Mohammad,
Publication: Yarmouk University, Irbid : 2015.
47. Title: An approach to analyze and detect BotNet behavior for IoT devices / by Ahmad Raji Wshah ; supervised by Dr. Sufyan alMajali.
منهج جديد لتحليل وكشف سلوك الروبوتات البرمجية في أجهزة إنترنت الأشياء
Author: Wshah, Ahmad Raji,
Publication: 2018.
48. Title: Digital E-mail forensic / by Duha 'Muhammad Bassam' Qutishat ; supervised by Mohammad Belal al-Zoubi.
التعامل القضائي في الجرائم الإلكترونية المتعلقة بالبريد الإلكتروني
Author: Qutishat, Duha 'Muhammad Bassam'.
Publication: 2012.
49. Title: Spam profile detection in social networks based on public attributes / by Ala’ Mahmoud al-Zoubi ; supervised by Ja'far Alqatawna, co-supervisor Hossam Faris.
كشف الحسابات الغير مرغوبة والمؤذية في مواقع التواصل الاجتماعي عن طريق الخصائص العامة
Author: al-Zoubi, Ala’ Mahmoud.
Publication: 2017.
50. Title: Malicious spam detection in email systems of educational institutes / by Aisha Deeb Zaid ; supervised by Ammar Huneiti, co-supervisor Ja'far alqatawna.
كشف البريد الإلكتروني الخبيث في أنظمة البريد الإلكتروني للمؤسسات التعليمية
Author: Zaid, Aisha Deeb.
Publication: 2016.
51. Title: Preventing counterfeiting of certificates in educational institutions using blockchain technology / by Mohammad Qasem Al-Masri ; Supervised by Prof. Dr. Mohammad Qatawneh.
منع تزوير الشهادات الرقمية في المؤسسات التعليمية باستخدام تكنولوجيا سلسلة الكتل
Author: Al-Masri, Mohammad Qasem,
Publication: 2020.
52. Title: Computer & internet security : a hands-on approach / Wenliang Du.
Computer and internet security
Author: Du, Wenliang,
Publication: Independently published, [Place of publication not identified] : [2022]
Edition: Third edition
53. Title: A framework for privacy protection using blockchain technology / by Farah Hussein Khamayseh; supervised by Prof. Dr. Nadim Ali Obeid, Prof. Dr. Khair Eddin Sabri.
إطار للحفاظ على السرية بالإعتماد على تكنلوجيا سلسلة الكتل
Author: Khamayseh, Farah Hussein,
Publication: 2020.
54. Title: Detecting compromised iot devices using machine learning / by Tariq Jalal Ali al-Khader ; supervised by Prof. Dr. Khair Eddin Sabri.
اكتشاف اجهزة شبكة الاشياء المقرصنة باستخدام التعلم الالي
Author: Al-Khader, Tariq Jalal Ali,
Publication: 2020.
55. Title: Linux essentials for cybersecurity / William "Bo" Rothwell, Denise Kinsey.
Pearson IT cybersecurity curriculum
Linux.
Linux.
Author: Rothwell, William,
Publication: Pearson Education, [Indianapolis, Indiana] : [2019]
56. Title: Botnet group behavior detection based on temporal DNS traffic similarity / by Walaa Mohammad bani Domi ; supervised by Dr. Ahmed M. Manasrah.
اكتشاف الشبكات الروبوتية من خلال الخصائص الزمنية لعملها المنسق من ناحية بيانات الشبكات من نوع DNS
Author: bani Domi, Walaa Mohammad,
Publication: 2015.
 
 
Results 1 - 56 of 56
Duplicate Items
Add to My List

Print
Sorts and Limits