Welcome
Copyright © SirsiDynix. All rights reserved.
(Build horizon-8.0.1.5407)
Center Of Excellence for Jordanian Public University Library System (COE-JOPULS)
العربية (السعودية)
English (United States)
Log in
Help
Welcome
Jordanian Union Catalogue
360 Search
Search Libraries Catalogue
Simple
Advanced
Power
Community Resource
Search History
My List
My Account
Search
Options
Refine
Start Over
Show details
Hide details
Search Selected
Select All
<<
Previous
Next
>>
Title
Main Entry
Publication Date
امن المعلومات والمواقع واجهزة الكمبيوتر والدفع الالكتروني = Information Security /
خالد، محمد خالد
2006
أمن المعلومات /
الجواد، دلال صادق مصطفى
2008
Elementary information security /
Smith, Richard E., 1952-
2016.
Information Security : Principles and New Concepts /
2015.
Information security : a source book for librarians /
Ramamurthy, C. R.
c2001.
Information security : contemporary cases /
Wright, Marie A.
2007.
Information security : dictionary of concepts , standards and terms /
Caelli, William
1992.
Information security : principles and practice /
Stamp, Mark.
�2011.
Information security : principles and practices /
MERKOW , Mark S
2006.
Information security : principles and practices /
Merkow, Mark S.
c2006.
Information security : the complete reference /
Rhodes-Ousley, Mark.
2013.
Information Security 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007. Proceedings /
Garay, Juan A.
2007.
Information Security 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings /
Hutchison, David.
2008.
Information Security 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings /
Samarati, Pierangela.
2009.
Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers /
Burmester, Mike.
2011.
Information Security 14th International Conference, ISC 2011, Xi’an, China, October 26-29, 2011. Proceedings /
Lai, Xuejia.
2011.
Information Security 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings /
Gollmann, Dieter.
2012.
Information Security 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings /
2015.
Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings /
2014.
Information Security 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings /
2015.
Information Security and Assurance 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings /
Bandyopadhyay, Samir Kumar.
2010.
Information Security and Assurance International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings /
Kim, Tai-hoon.
2011.
Introduction to cryptography : principles and applications /
Delfs, Hans.
2002.
Efficient Secure Two-Party Protocols Techniques and Constructions /
Hazay, Carmit.
2010.
Efficient Secure Two-Party Protocols Techniques and Constructions /
Hazay, Carmit.
2010.
Advanced Statistical Steganalysis
Böhme, Rainer.
2010.
Advanced Statistical Steganalysis
Böhme, Rainer.
2010.
Locally Decodable Codes and Private Information Retrieval Schemes
Yekhanin, Sergey.
2010.
Locally Decodable Codes and Private Information Retrieval Schemes
Yekhanin, Sergey.
2010.
Towards Hardware-Intrinsic Security Foundations and Practice /
Sadeghi, Ahmad-Reza.
2010.
Towards Hardware-Intrinsic Security Foundations and Practice /
Sadeghi, Ahmad-Reza.
2010.
The Block Cipher Companion
Knudsen, Lars R.
2011.
The Block Cipher Companion
Knudsen, Lars R.
2011.
The LLL Algorithm Survey and Applications /
Nguyen, Phong Q.
2010.
The LLL Algorithm Survey and Applications /
Nguyen, Phong Q.
2010.
Operational Semantics and Verification of Security Protocols
Cremers, Cas.
2012.
Operational Semantics and Verification of Security Protocols
Cremers, Cas.
2012.
Fault Analysis in Cryptography
Joye, Marc.
2012.
Fault Analysis in Cryptography
Joye, Marc.
2012.
Cryptography in Constant Parallel Time
Applebaum, Benny.
2014.
Cryptography in Constant Parallel Time
Applebaum, Benny.
2014.
Introduction to Cryptography Principles and Applications /
Delfs, Hans.
2015.
Introduction to Cryptography Principles and Applications /
Delfs, Hans.
2015.
The Hash Function BLAKE
Aumasson, Jean-Philippe.
2014.
The Hash Function BLAKE
Aumasson, Jean-Philippe.
2014.
Secure Data Deletion
Reardon, Joel.
2016.
Secure Data Deletion
Reardon, Joel.
2016.
Cryptography Made Simple
Smart, Nigel P.
2016.
Cryptography Made Simple
Smart, Nigel P.
2016.
Tutorials on the Foundations of Cryptography Dedicated to Oded Goldreich /
2017.
Tutorials on the Foundations of Cryptography Dedicated to Oded Goldreich /
2017.
Practical Signcryption
Dent, Alexander W.
2010.
Practical Signcryption
Dent, Alexander W.
2010.
Concurrent Zero-Knowledge With Additional Background by Oded Goldreich /
Rosen, Alon.
2006.
Introduction to Cryptography Principles and Applications /
Delfs, Hans.
2007.
Formal Correctness of Security Protocols With 62 Figures and 4 Tables /
Bella, Giampaolo.
2007.
Information Security and Cryptology - ICISC 2004 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers
Chee, Seongtaek.
2005
Information Security and Cryptology - ICISC 2005 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers
Won, Dongho.
2006
Information Security and Cryptology - ICISC 2006 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings
Rhee, Min Surp.
2006
Information Security and Cryptology - ICISC 2007 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings /
Nam, Kil-Hyun.
2007.
Information Security and Cryptology – ICISC 2008 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers /
Lee, Pil Joong.
2009.
Information, Security and Cryptology – ICISC 2009 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers /
Lee, Donghoon.
2010.
Information Security and Cryptology - ICISC 2010 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers /
Rhee, Kyung-Hyune.
2011.
Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers /
Kim, Howon.
2012.
Information Security and Cryptology – ICISC 2012 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers /
Kwon, Taekyoung.
2013.
Information Security and Cryptology - ICISC 2014 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers /
2015.
Information Security and Cryptology – ICISC 2016 19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papers /
2017.
Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers /
2015.
Information Security and Cryptology 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers /
2017.
Information Security and Cryptology 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers /
Yung, Moti.
2009.
Information Security and Cryptology 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers /
Bao, Feng.
2011.
Information Security and Cryptology 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers /
Lai, Xuejia.
2011.
Information Security and Cryptology 7th International Conference, Inscrypt 2011, Beijing, China, November 30 – December 3, 2011. Revised Selected Papers /
Wu, Chuan-Kun.
2012.
Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers /
Kutyłowski, Mirosław.
2013.
Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers /
2014.
Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers /
2014.
Information Security and Cryptology (vol. # 3822) First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings
Feng, Dengguo.
2005
Information Security and Cryptology (vol. # 4318) Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings
Lipmaa, Helger.
2006
Information Security and Digital Forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers /
Weerasinghe, Dasun.
2010.
Information security and employee behaviour how to reduce risk through employee education, training and awareness /
McIlwraith, Angus.
c2006.
أمن المعلومات وإدارة مخاطر تقنية المعلومات /
أغروال، مانيش،
2018
امن المعلومات و اثره على الثقة في استخدام خدمات الحكومة الالكترونية : دراسة ميدانية على عينة من المؤسسات الحكومية في الاردن /
الزيادين، علاء عصام
2012.
Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedings /
Pieprzyk, Josef.
2007.
Information Security and Privacy 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings /
Boyd, Colin.
2009.
Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings /
Steinfeld, Ron.
2010.
Information Security and Privacy 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings /
Parampalli, Udaya.
2011.
Information Security and Privacy 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings /
Susilo, Willy.
2012.
Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings /
Boyd, Colin.
2013.
Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings /
2014.
Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings /
2015.
Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I /
2017.
Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II /
2017.
Information Security and Privacy 6th Australasian Conference, ACISP 2001 Sydney, Australia, July 11–13, 2001 Proceedings /
Varadharajan, Vijay.
2006.
Information Security and Privacy Research 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings /
Gritzalis, Dimitris.
2012.
Information Security and Privacy (vol. # 3574) 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings
Boyd, Colin.
2005
Information Security and Privacy (vol. # 4058) 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings
Batten, Lynn.
2006
Information Security Applications 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers /
Youm, Heung Youl.
2009.
Information Security Applications 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers /
Chung, Yongwha.
2011.
Information Security Applications 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers /
Jung, Souhwan.
2012.
Information Security Applications 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers /
Lee, Dong Hoon.
2012.
<<
Previous
Next
>>