Welcome
user_choices_background_image
Welcome
login container bottom
Search Libraries Catalogue
Search Selected
Select All
<<   Previous     Next   >>
Title Main Entry Publication Date
امن المعلومات والمواقع واجهزة الكمبيوتر والدفع الالكتروني = Information Security / خالد، محمد خالد 2006
أمن المعلومات / الجواد، دلال صادق مصطفى 2008
Elementary information security / Smith, Richard E., 1952- 2016.
Information Security : Principles and New Concepts /   2015.
Information security : a source book for librarians / Ramamurthy, C. R. c2001.
Information security : contemporary cases / Wright, Marie A. 2007.
Information security : dictionary of concepts , standards and terms / Caelli, William 1992.
Information security : principles and practice / Stamp, Mark. �2011.
Information security : principles and practices / MERKOW , Mark S 2006.
Information security : principles and practices / Merkow, Mark S. c2006.
Information security : the complete reference / Rhodes-Ousley, Mark. 2013.
Information Security 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007. Proceedings / Garay, Juan A. 2007.
Information Security 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings / Hutchison, David. 2008.
Information Security 12th International Conference, ISC 2009, Pisa, Italy, September 7-9, 2009. Proceedings / Samarati, Pierangela. 2009.
Information Security 13th International Conference, ISC 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers / Burmester, Mike. 2011.
Information Security 14th International Conference, ISC 2011, Xi’an, China, October 26-29, 2011. Proceedings / Lai, Xuejia. 2011.
Information Security 15th International Conference, ISC 2012, Passau, Germany, September 19-21, 2012. Proceedings / Gollmann, Dieter. 2012.
Information Security 16th International Conference, ISC 2013, Dallas, Texas, November 13-15, 2013, Proceedings /   2015.
Information Security 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings /   2014.
Information Security 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings /   2015.
Information Security and Assurance 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings / Bandyopadhyay, Samir Kumar. 2010.
Information Security and Assurance International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011. Proceedings / Kim, Tai-hoon. 2011.
Introduction to cryptography : principles and applications / Delfs, Hans. 2002.
Efficient Secure Two-Party Protocols Techniques and Constructions / Hazay, Carmit. 2010.
Efficient Secure Two-Party Protocols Techniques and Constructions / Hazay, Carmit. 2010.
Advanced Statistical Steganalysis Böhme, Rainer. 2010.
Advanced Statistical Steganalysis Böhme, Rainer. 2010.
Locally Decodable Codes and Private Information Retrieval Schemes Yekhanin, Sergey. 2010.
Locally Decodable Codes and Private Information Retrieval Schemes Yekhanin, Sergey. 2010.
Towards Hardware-Intrinsic Security Foundations and Practice / Sadeghi, Ahmad-Reza. 2010.
Towards Hardware-Intrinsic Security Foundations and Practice / Sadeghi, Ahmad-Reza. 2010.
The Block Cipher Companion Knudsen, Lars R. 2011.
The Block Cipher Companion Knudsen, Lars R. 2011.
The LLL Algorithm Survey and Applications / Nguyen, Phong Q. 2010.
The LLL Algorithm Survey and Applications / Nguyen, Phong Q. 2010.
Operational Semantics and Verification of Security Protocols Cremers, Cas. 2012.
Operational Semantics and Verification of Security Protocols Cremers, Cas. 2012.
Fault Analysis in Cryptography Joye, Marc. 2012.
Fault Analysis in Cryptography Joye, Marc. 2012.
Cryptography in Constant Parallel Time Applebaum, Benny. 2014.
Cryptography in Constant Parallel Time Applebaum, Benny. 2014.
Introduction to Cryptography Principles and Applications / Delfs, Hans. 2015.
Introduction to Cryptography Principles and Applications / Delfs, Hans. 2015.
The Hash Function BLAKE Aumasson, Jean-Philippe. 2014.
The Hash Function BLAKE Aumasson, Jean-Philippe. 2014.
Secure Data Deletion Reardon, Joel. 2016.
Secure Data Deletion Reardon, Joel. 2016.
Cryptography Made Simple Smart, Nigel P. 2016.
Cryptography Made Simple Smart, Nigel P. 2016.
Tutorials on the Foundations of Cryptography Dedicated to Oded Goldreich /   2017.
Tutorials on the Foundations of Cryptography Dedicated to Oded Goldreich /   2017.
Practical Signcryption Dent, Alexander W. 2010.
Practical Signcryption Dent, Alexander W. 2010.
Concurrent Zero-Knowledge With Additional Background by Oded Goldreich / Rosen, Alon. 2006.
Introduction to Cryptography Principles and Applications / Delfs, Hans. 2007.
Formal Correctness of Security Protocols With 62 Figures and 4 Tables / Bella, Giampaolo. 2007.
Information Security and Cryptology - ICISC 2004 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers Chee, Seongtaek. 2005
Information Security and Cryptology - ICISC 2005 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers Won, Dongho. 2006
Information Security and Cryptology - ICISC 2006 9th International Conference, Busan, Korea, November 30 - December 1, 2006, Proceedings Rhee, Min Surp. 2006
Information Security and Cryptology - ICISC 2007 10th International Conference, Seoul, Korea, November 29-30, 2007. Proceedings / Nam, Kil-Hyun. 2007.
Information Security and Cryptology – ICISC 2008 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers / Lee, Pil Joong. 2009.
Information, Security and Cryptology – ICISC 2009 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers / Lee, Donghoon. 2010.
Information Security and Cryptology - ICISC 2010 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers / Rhee, Kyung-Hyune. 2011.
Information Security and Cryptology - ICISC 2011 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers / Kim, Howon. 2012.
Information Security and Cryptology – ICISC 2012 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers / Kwon, Taekyoung. 2013.
Information Security and Cryptology - ICISC 2014 17th International Conference, Seoul, South Korea, December 3-5, 2014, Revised Selected Papers /   2015.
Information Security and Cryptology – ICISC 2016 19th International Conference, Seoul, South Korea, November 30 – December 2, 2016, Revised Selected Papers /   2017.
Information Security and Cryptology 10th International Conference, Inscrypt 2014, Beijing, China, December 13-15, 2014, Revised Selected Papers /   2015.
Information Security and Cryptology 12th International Conference, Inscrypt 2016, Beijing, China, November 4-6, 2016, Revised Selected Papers /   2017.
Information Security and Cryptology 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers / Yung, Moti. 2009.
Information Security and Cryptology 5th International Conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised Selected Papers / Bao, Feng. 2011.
Information Security and Cryptology 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers / Lai, Xuejia. 2011.
Information Security and Cryptology 7th International Conference, Inscrypt 2011, Beijing, China, November 30 – December 3, 2011. Revised Selected Papers / Wu, Chuan-Kun. 2012.
Information Security and Cryptology 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers / Kutyłowski, Mirosław. 2013.
Information Security and Cryptology 9th International Conference, Inscrypt 2013, Guangzhou, China, November 27-30, 2013, Revised Selected Papers /   2014.
Information Security and Cryptology -- ICISC 2013 16th International Conference, Seoul, Korea, November 27-29, 2013, Revised Selected Papers /   2014.
Information Security and Cryptology (vol. # 3822) First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings Feng, Dengguo. 2005
Information Security and Cryptology (vol. # 4318) Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings Lipmaa, Helger. 2006
Information Security and Digital Forensics First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers / Weerasinghe, Dasun. 2010.
Information security and employee behaviour how to reduce risk through employee education, training and awareness / McIlwraith, Angus. c2006.
أمن المعلومات وإدارة مخاطر تقنية المعلومات / أغروال، مانيش، 2018
امن المعلومات و اثره على الثقة في استخدام خدمات الحكومة الالكترونية : دراسة ميدانية على عينة من المؤسسات الحكومية في الاردن / الزيادين، علاء عصام 2012.
Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007. Proceedings / Pieprzyk, Josef. 2007.
Information Security and Privacy 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings / Boyd, Colin. 2009.
Information Security and Privacy 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings / Steinfeld, Ron. 2010.
Information Security and Privacy 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings / Parampalli, Udaya. 2011.
Information Security and Privacy 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings / Susilo, Willy. 2012.
Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings / Boyd, Colin. 2013.
Information Security and Privacy 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings /   2014.
Information Security and Privacy 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings /   2015.
Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I /   2017.
Information Security and Privacy 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II /   2017.
Information Security and Privacy 6th Australasian Conference, ACISP 2001 Sydney, Australia, July 11–13, 2001 Proceedings / Varadharajan, Vijay. 2006.
Information Security and Privacy Research 27th IFIP TC 11 Information Security and Privacy Conference, SEC 2012, Heraklion, Crete, Greece, June 4-6, 2012. Proceedings / Gritzalis, Dimitris. 2012.
Information Security and Privacy (vol. # 3574) 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings Boyd, Colin. 2005
Information Security and Privacy (vol. # 4058) 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings Batten, Lynn. 2006
Information Security Applications 10th International Workshop, WISA 2009, Busan, Korea, August 25-27, 2009, Revised Selected Papers / Youm, Heung Youl. 2009.
Information Security Applications 11th International Workshop, WISA 2010, Jeju Island, Korea, August 24-26, 2010, Revised Selected Papers / Chung, Yongwha. 2011.
Information Security Applications 12th International Workshop, WISA 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers / Jung, Souhwan. 2012.
Information Security Applications 13th International Workshop, WISA 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers / Lee, Dong Hoon. 2012.
<<   Previous     Next   >>