Welcome
user_choices_background_image
Welcome
login container bottom
Search Libraries Catalogue
Duplicate Items
Add to My List

Print
Sorts and Limits

Results 1 - 7 of 7
1. Title: Design and application of a public key infrastructure / by Mohammad Ahmed Asmaran ; supervised by Yassin el-Cherif.
تصميم و تطبيق للبنية التحتية لأنظمة مفتاح الشيفرة المعلن.
Author: Asmaran, Mohammad Ahmad.
Publication: 2005.
2. Title: Improving cross-domain using Current Certificate Status Protocol (CCSP) / by Ihsan Ibraheem al-Hassany ; supervised by Hilal al-Bayatti.
"تحسين تقاطع المجالات باستخدام "بروتوكول حالة الشهادة الحالية.
Author: al-Hassany, Ihsan Ibraheem.
Publication: 2007.
3. Title: Secure electronic bidding / by Mohammad Y. al-Sarayreh ; supervised by Yasin el-Sherif.
Author: al-Sarayirah, Muhammad Y.
Publication: 2007.
4. Title: Investigation of FPGA implementation for public key cryptosystem / by Ghaida Younis Mohammed al-Tamimi ; supervised by Prof. Dr. Andraws Issa Swidan.
التحقيق في تنفيذ FPGA لنظام تشفير المفتاح العام
Author: al-Tamimi, Ghaida Younis Mohammed ,
Publication: 2022.
5. Title: Security without obscurity : a guide to PKI operations / J. J. Stapleton, W. Clay Epstein.
Guide to PKI operations
Guide to Public key infrastructure operations
Author: Stapleton, Jeffrey James,
Publication: CRC Press, Boca Raton, FL : [2016]
6. Title: National information incident management framework / by Ayat Mahmoud Hannoun ; supervised by Prof. Arafat A. Awajan, Dr. Ahmed Otoom.
الأطار الوطني لادارة حوادث المعلومات
Author: Hannoun, Ayat Mahmoud,
Publication: 2016.
7. Title: Critical national informational infrastructure protection-implementation framework “CNIIP-IF” / by Rawan Hani Massalha ; supervised by Prof. Dr. Jalal Atoum, Dr. Ahmed Otoom.
Facebook الاطار الوطني لحماية البنى التحتية ذات الاهمية
Author: Massalha, Rawan Hani,
Publication: 2017.
 
 
Results 1 - 7 of 7
Duplicate Items
Add to My List

Print
Sorts and Limits