Welcome
Copyright © SirsiDynix. All rights reserved.
(Build horizon-8.0.1.5407)
Center Of Excellence for Jordanian Public University Library System (COE-JOPULS)
العربية (السعودية)
English (United States)
Log in
Help
Welcome
Jordanian Union Catalogue
360 Search
Search Libraries Catalogue
Simple
Advanced
Power
Community Resource
Search History
My List
My Account
Search
Options
Refine
Start Over
Show details
Hide details
Search Selected
Select All
<<
Previous
Next
>>
Title
Main Entry
Publication Date
Concurrent Zero-Knowledge With Additional Background by Oded Goldreich /
Rosen, Alon.
2006.
Introduction to Cryptography Principles and Applications /
Delfs, Hans.
2007.
Formal Correctness of Security Protocols With 62 Figures and 4 Tables /
Bella, Giampaolo.
2007.
Information Security and Cryptology - ICISC 2004 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers
Chee, Seongtaek.
2005
Information Security and Cryptology - ICISC 2005 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers
Won, Dongho.
2006
Information Security and Cryptology - ICISC 2006 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings
Rhee, Min Surp.
2006
Information Security and Cryptology - ICISC 2007 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings /
Nam, Kil-Hyun.
2007.
Information Security and Cryptology – ICISC 2008 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers /
Lee, Pil Joong.
2009.
Information, Security and Cryptology – ICISC 2009 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers /
Lee, Donghoon.
2010.
Information Security and Cryptology - ICISC 2010 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers /
Rhee, Kyung-Hyune.
2011.
Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers /
Kim, Howon.
2012.
Information Security and Cryptology – ICISC 2012 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers /
Kwon, Taekyoung.
2013.
Information Security and Cryptology - ICISC 2014 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers /
2015.
Information Security and Cryptology – ICISC 2016 19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papers /
2017.
Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers /
2015.
Information Security and Cryptology 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers /
2017.
Information Security and Cryptology 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers /
Yung, Moti.
2009.
Information Security and Cryptology 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers /
Bao, Feng.
2011.
Information Security and Cryptology 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers /
Lai, Xuejia.
2011.
Information Security and Cryptology 7th International Conference, Inscrypt 2011, Beijing, China, November 30 – December 3, 2011. Revised Selected Papers /
Wu, Chuan-Kun.
2012.
Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers /
Kutyłowski, Mirosław.
2013.
Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers /
2014.
Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers /
2014.
Information Security and Cryptology (vol. # 3822) First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings
Feng, Dengguo.
2005
Information Security and Cryptology (vol. # 4318) Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings
Lipmaa, Helger.
2006
Information Security and Digital Forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers /
Weerasinghe, Dasun.
2010.
Information security and employee behaviour how to reduce risk through employee education, training and awareness /
McIlwraith, Angus.
c2006.
أمن المعلومات وإدارة مخاطر تقنية المعلومات /
أغروال، مانيش،
2018
امن المعلومات و اثره على الثقة في استخدام خدمات الحكومة الالكترونية : دراسة ميدانية على عينة من المؤسسات الحكومية في الاردن /
الزيادين، علاء عصام
2012.
Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedings /
Pieprzyk, Josef.
2007.
Information Security and Privacy 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings /
Boyd, Colin.
2009.
Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings /
Steinfeld, Ron.
2010.
Information Security and Privacy 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings /
Parampalli, Udaya.
2011.
Information Security and Privacy 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings /
Susilo, Willy.
2012.
Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings /
Boyd, Colin.
2013.
Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings /
2014.
Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings /
2015.
Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I /
2017.
Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II /
2017.
Information Security and Privacy 6th Australasian Conference, ACISP 2001 Sydney, Australia, July 11–13, 2001 Proceedings /
Varadharajan, Vijay.
2006.
Information Security and Privacy Research 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings /
Gritzalis, Dimitris.
2012.
Information Security and Privacy (vol. # 3574) 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings
Boyd, Colin.
2005
Information Security and Privacy (vol. # 4058) 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings
Batten, Lynn.
2006
Information Security Applications 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers /
Youm, Heung Youl.
2009.
Information Security Applications 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers /
Chung, Yongwha.
2011.
Information Security Applications 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers /
Jung, Souhwan.
2012.
Information Security Applications 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers /
Lee, Dong Hoon.
2012.
Information Security Applications 14th International Workshop, WISA 2013, Jeju Island, Korea, August 19-21, 2013, Revised Selected Papers /
2014.
Information Security Applications 15th International Workshop, WISA 2014, Jeju Island, Korea, August 25-27, 2014. Revised Selected Papers /
2015.
Information Security Applications 17th International Workshop, WISA 2016, Jeju Island, Korea, August 25-27, 2016, Revised Selected Papers /
2017.
Information Security Applications 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers /
Lee, Jae Kwang.
2007.
Information Security Applications 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers /
Kim, Sehun.
2008.
Information Security Applications 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers /
Chung, Kyo-Il.
2009.
Information Security Applications (vol. # 3325) 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers
Lim, Chae Hoon.
2005
Information Security Applications (vol. # 3786) 6th International Workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers
Song, Jooseok.
2006
Information Security Awareness : Antecedents and User Satisfaction Perspective
Alshboul, Yazan
2017. 2017.
Information security, coding theory and related combinatorics information coding and combinatorics /
2011.
Information Security Education Across the Curriculum 9th IFIP WG 11.8 World Conference, WISE 9, Hamburg, Germany, May 26-28, 2015, Proceedings /
2015.
Information Security Education for a Global Digital Society 10th IFIP WG 11.8 World Conference, WISE 10, Rome, Italy, May 29-31, 2017, Proceedings /
2017.
Information Security Evaluation A Holistic Approach from a Business Perspective.
2011.
Information Security for Automatic Speaker Identification
El-Samie, Fathi E. Abd.
2011.
Information security for management
Iyengar, Venugopal.
2010.
Information security for managers /
Caelli, William.
1989.
Information security for managers /
Caelli, William.
1989.
Information security fundamentals /
PELTIER, Thomas R.
c2005.
Information security fundamentals /
PELTIER, Thomas R.
c2005.
Information Security Governance
Solms, S.H.
2009.
An information security handbook /
Hunter, John M. D., 1940-
2001.
Information security handbook /
Caelli, William.
1991.
Information security management : concepts and practice /
Raggad, Bel G.
2010.
Information security management & small systems security : IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30-October 1, 1999, Amsterdam, The Netherlands /
IFIP TC11 WG11.1/WG11.2 Working Conference on Information Security Management & Small Systems Security 1999 : Amsterdam, Netherlands)
c1999.
Information security management & small systems security : IFIP TC11 WG11.1/WG11.2 Seventh Annual Working Conference on Information Security Management & Small Systems Security, September 30-October 1, 1999, Amsterdam, The Netherlands /
IFIP TC11 WG11.1/WG11.2 Working Conference on Information Security Management & Small Systems Security 1999 : Amsterdam, Netherlands)
c1999.
Information security management handbook /
2005
Information security of highly critical wireless networks /
cop. 2017.
Information Security of Highly Critical Wireless Networks
Martellini, Maurizio.
2017.
Information security policies and procedures : a practitioner's reference /
PELTIER, Thomas R.
c2004.
Information security policy, processes, and practices /
c2008.
Information Security Practice and Experience 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014. Proceedings /
2014.
Information Security Practice and Experience 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015, Proceedings /
2015.
Information Security Practice and Experience 5th International Conference, ISPEC 2009 Xi’an, China, April 13-15, 2009 Proceedings /
Bao, Feng.
2009.
Information Security, Practice and Experience 6th International Conference, ISPEC 2010, Seoul, Korea, May 12-13, 2010. Proceedings /
Kwak, Jin.
2010.
Information Security Practice and Experience 7th International Conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings /
Bao, Feng.
2011.
Information Security Practice and Experience 8th International Conference, ISPEC 2012, Hangzhou, China, April 9-12, 2012. Proceedings /
Ryan, Mark D.
2012.
Information Security Practice and Experience 9th International Conference, ISPEC 2013, Lanzhou, China, May 12-14, 2013. Proceedings /
Deng, Robert H.
2013.
Information Security Practice and Experience Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007. Proceedings /
Dawson, Ed.
2007.
Information Security Practice and Experience (vol. # 3439) First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings
Bao, Feng.
2005
Information Security Practice and Experience (vol. # 3903) Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings
Chen, Kefei.
2006
Information Security Practices Emerging Threats and Perspectives /
2017.
Information security risk analysis
PELTIER, Thomas R.
c2001.
Fundamentals of network security /
Maiwald, Eric.
c2004.
Web hacker boot camp /
Quakenbush, Gerald
2005.
Information Security Technology for Applications 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers /
Aura, Tuomas.
2012.
Information Security Technology for Applications 16th Nordic Conference on Secure IT Systems, NordSec 2011, Tallinn, Estonia, October 26-28, 2011, Revised Selected Papers /
Laud, Peeter.
2012.
Information Security Theory and Practice 9th IFIP WG 11.2 International Conference, WISTP 2015, Heraklion, Crete, Greece, August 24-25, 2015. Proceedings /
2015.
Information Security Theory and Practice. Securing the Internet of Things 8th IFIP WG 11.2 International Workshop, WISTP 2014, Heraklion, Crete, Greece, June 30 – July 2, 2014. Proceedings /
2014.
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication 5th IFIP WG 11.2 International Workshop, WISTP 2011, Heraklion, Crete, Greece, June 1-3, 2011. Proceedings /
Ardagna, Claudio A.
2011.
Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems 7th IFIP WG 11.2 International Workshop, WISTP 2013, Heraklion, Greece, May 28-30, 2013. Proceedings /
Cavallaro, Lorenzo.
2013.
Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems 6th IFIP WG 11.2 International Workshop, WISTP 2012, Egham, UK, June 20-22, 2012. Proceedings /
Askoxylakis, Ioannis.
2012.
Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings /
Markowitch, Olivier.
2009.
Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices 4th IFIP WG 11.2 International Workshop, WISTP 2010, Passau, Germany, April 12-14, 2010. Proceedings /
Samarati, Pierangela.
2010.
<<
Previous
Next
>>