|
|
Security in computing/
|
Pfleeger , Charles P.
|
2003.
|
|
Security in Computing Systems Challenges, Approaches and Solutions /
|
Biskup, Joachim.
|
2009.
|
|
Security in disarmament/
|
Barnet, Richard J.
|
1965.
|
|
Security in E-Learning
|
Weippl, Edgar.
|
2005.
|
|
Security in Embedded Devices
|
Gebotys, Catherine H.
|
2010.
|
|
Security in Emerging Wireless Communication and Networking Systems First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers /
|
Gu, Qijun.
|
2010.
|
|
Security in Europe
|
Hunter, Robert Edwards, 1940-
|
[1972, c1969]
|
|
Security in Iraq a framework for analyzing emerging threats as U.S. forces leave /
|
Gompert, David C.
|
2010.
|
|
Security in Network Coding
|
Zhang, Peng.
|
2016.
|
|
Security in Pervasive Computing (vol. # 3450) Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings
|
Hutter, Dieter.
|
2005
|
|
Security in Pervasive Computing (vol. # 3934) Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings
|
Clark, John A.
|
2006
|
|
Security in schools its effect on students /
|
Phaneuf, Shannon Womer, 1971-
|
2009.
|
|
Security in Shared Neighbourhoods Foreign Policy of Russia, Turkey and the EU /
|
|
2016.
|
|
Security in southern Asia /
|
|
1984.
|
|
Security in the Gulf /
|
Litwak, Robert
|
1982.
|
|
Security in the information society : visions and perspectives : IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt /
|
IFIP TC11 International Conference on Information Security 2002 : Cairo, Egypt)
|
c2002.
|
|
Security in the Middle East : regional change and great power strategies /
|
|
1987.
|
|
Security in the Middle East : regional change and great power strategies /
|
|
1987.
|
|
Sources of inter-state conflict /
|
Litwak , Robert
|
1981.
|
|
Modernisation , political development and stability /
|
Plascov, Avi
|
1982.
|
|
Security in the Persian Gulf.
|
|
c1981-
|
|
Security in the Persian Gulf /
|
Chubin , Shahram
|
1981.
|
|
Security in the Persian Gulf: domestic political factors/
|
Chubin, Shahram.
|
1981.
|
|
Security in the Persian Gulf Region
|
Shayan, Fatemeh.
|
2017.
|
|
Security in the private cloud /
|
|
2017.
|
|
Security in wireless LANs and MANs
|
Hardjono, Thomas.
|
2005.
|
|
Security in wireless personal area networks - bluetooth /
|
Dorgham, Osama Mohammad Ahmad.
|
2005.
|
|
Security in Wireless Sensor Networks
|
Oreku, George S.
|
2016.
|
|
Security integration in Europe how knowledge-based networks are transforming the European Union /
|
Cross, Mai'a K. Davis, 1977-
|
c2011.
|
|
Security intelligence : a practitioner's guide to solving enterprise security challenges /
|
Li, Qing, 1971-
|
2015.
|
|
الضمانات والتدابير القانونية لحماية الدائنين بموجب اتفاقية كيب تاون والبروتوكول الملحق بها بشأن المسائل التي تخص الطائرات ومعداتها : دراسة تطبيقية في النظام القانوني الأردني /
|
أبو العرجة، إيهاب محمد،
|
2014.
|
|
الضمانات والتدابير القانونية لحماية الدائنين بموجب اتفاقية كيب تاون والبروتوكول الملحق بها بشأن المسائل التي تخص الطائرات ومعداتها : دراسة تطبيقية في النظام القانوني الأردني
|
ابو العرجة، ايهاب محمد.
|
2014.
|
|
Security Interests in Intellectual Property
|
|
2017.
|
|
Security Issues in Mobile NFC Devices
|
Roland, Michael.
|
2015.
|
|
Security issues of IT outsourcing
|
|
c2006.
|
|
Security law and methods
|
Pastor, James F., 1957-
|
c2007.
|
|
Security log management identifying patterns in the chaos /
|
|
c2006.
|
|
إدارة الأمن وتأمين المؤتمرات /
|
مركز الخبرات المهنية للإدارة (القاهرة)
|
2012
|
|
Security Management, Integrity, and Internal Control in Information Systems IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference /
|
Dowland, Paul.
|
2005.
|
|
Security manual
|
Brooksbank, David.
|
c2007.
|
|
SECURITY MANUAL/
|
OLIVER,ERIC
|
1983
|
|
Security markets : stochastic models /
|
Duffie, Darrell.
|
c1988.
|
|
الإعلام الأمني في الأردن ودوره في التصدي للإرهاب
|
الحامد، ميساء غازي،
|
2019.
|
|
Security metaphors : cold war discourse from containment to common house /
|
Chilton, Paul A. (Paul Anthony)
|
c1996.
|
|
Security modeling and analysis of mobile agent systems
|
Ma, Lu.
|
c2006.
|
|
Security of block ciphers : from algorithm design to hardware implementation /
|
Sakiyama, Kazuo, 1971-
|
2015
|
|
The security of buildings /
|
Underwood, Grahame.
|
1984.
|
|
The security of China; Chinese approaches to problems of war and strategy.
|
Huck, Arthur.
|
1970.
|
|
Security of computer based information systems /
|
Lane, V.P.
|
1985.
|
|
Security of e-systems and computer networks /
|
Obaidat, Mohammad S. (Mohammad Salameh), 1952-
|
2007.
|
|
Security of Industrial Control Systems and Cyber-Physical Systems Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016, Revised Selected Papers /
|
|
2017.
|
|
Security of Industrial Water Supply and Management
|
Atimtay, Aysel T.
|
2011.
|
|
Security of information and communication networks /
|
Kartalopoulos, Stamatios V.
|
c2009.
|
|
Security of mobile communications /
|
Boudriga, Noureddine.
|
c2010.
|
|
Security of Networks and Services in an All-Connected World 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings /
|
|
2017.
|
|
Security of radioactive sources : proceedings of an international conference held in Vienna, Austria, 10-13 March 2003, organized by the International Atomic Energy Agency, hosted by the government of Austria, co-sponsored by the government of the Russian Federation and the government of the United States of America, and in co-operation with the European Commission, the European Police Office, the International Criminal Police Organization and the World Customs Organization.
|
International Conference on Security of Radioactive Sources (2003 : Vienna, Austria)
|
2003.
|
|
The security of the Caspian Sea region /
|
|
2001.
|
|
The Security of the Persian Gulf /
|
|
c1981.
|
|
The Security of Water, Food, Energy and Liveability of Cities Challenges and Opportunities for Peri-Urban Futures /
|
|
2014.
|
|
Security of Water Supply Systems: from Source to Tap
|
Pollert, Jaroslav.
|
2006.
|
|
SECURITY OF WEAK STATS: THE"POPULAR WAR"DOCTRINE IN ROMANIAN DEFENSE POLICY/
|
CHAPLIN,ARIE
|
1977
|
|
مسئولي الأمن أساسي /
|
مركز الخبرات المهنية للإدارة (القاهرة).
|
2009.
|
|
مسئولي الأمن ( متقدم) /
|
|
2010.
|
|
Security officers and policing powers, culture and control in the governance of private space /
|
Button, Mark.
|
c2007.
|
|
Security operations management
|
McCrie, Robert D.
|
2007.
|
|
Security outlook of the Asia-Pacific countries and its implications for the Defense Sector.
|
International Workshop on Asia Pacific Security 2012 : Tokyo, Japan)
|
2012.
|
|
Security outlook of the Asia-Pacific countries and its implications for the Defense Sector.
|
International Workshop on Asia Pacific Security 2011 : Tokyo, Japan)
|
2011.
|
|
Security outlook of the Asia Pacific countries and its implications for the defense sector.
|
International Workshop on Asia Pacific Security 2013 : Tokyo, Japan)
|
2013.
[2013]
|
|
Security outlook of the Asia Pacific countries and its implications for the defense sector : the NIDS International Workshop on Asia Pacific Security, 2014.
|
International Workshop on Asia Pacific Security 2014 : Tokyo, Japan)
|
2014.
|
|
Security performance analysis and enhancement authentication for internet of things
/
|
Joudeh, Haya Ali,
|
2018.
|
|
Security phishing detection using DOM-Tree structure and cAnt-Minerpb algorithm
/
|
al-Sarhan, Asma’a Mohammad.
|
2016.
|
|
Security phishing detection using rule induction (Prism) data mining /
|
Muhammad, Buran Abd Allah.
|
2013.
|
|
Security planning & disaster recovery /
|
Maiwald, Eric.
|
c2002.
|
|
Security planning & disaster recovery
|
Maiwald, Eric.
|
c2002.
|
|
Security Planning An Applied Approach /
|
Lincke, Susan.
|
2015.
|
|
Security planning & disaster recovery /
|
Maiwald, Eric.
|
c2002.
|
|
Security planning & disaster recovery
|
Maiwald, Eric.
|
c2002.
|
|
Security+ certification : CompTIA exam SYO-101 : training kit /
|
|
c2003.
|
|
Security+ exam guide
|
Crayton, Christopher A.
|
c2003.
|
|
CompTIA security+ guide to network security fundamentals /
|
Ciampa, Mark D.,
|
[2018]
2018.
|
|
Lab manual for CompTIA security+ guide to network security fundamentals /
|
Hurd, Andy,
|
[2018]
�2018
|
|
Security+ guide to network security fundamentals /
|
Ciampa, Mark D.
|
2005.
|
|
Security+ study guide & DVD training system
|
|
c2007.
|
|
Security+ study guide and DVD training system
|
Cross, Michael.
|
2002.
|
|
Security+ study guide & DVD training system
|
|
c2007.
|
|
Security+ training guide/
|
King,Todd
|
2003.
|
|
Security+ guide to network security fundamentals /
|
Ciampa, Mark D.
|
2005.
|
|
Security+ study guide & DVD training system
|
|
c2007.
|
|
Security+ study guide and DVD training system
|
Cross, Michael.
|
2002.
|
|
Security policies and procedures : principles and practices /
|
Greene, Sari Stern, 1957-
|
c2006.
|
|
Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings /
|
|
2014.
|
|
Security, Privacy, and Applied Cryptography Engineering 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings /
|
|
2015.
|
|
Security, Privacy, and Applied Cryptography Engineering Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings /
|
Bogdanov, Andrey.
|
2012.
|
|
Security, Privacy, and Applied Cryptography Engineering Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings /
|
Gierlichs, Benedikt.
|
2013.
|
|
Security, Privacy and Trust in Cloud Systems
|
|
2014.
|
|
Security, Privacy, and Trust in Modern Data Management
|
Petkovic, Milan.
|
2007.
|
|
Security Privatization How Non-security-related Private Businesses Shape Security Governance /
|
|
2018.
|
|
Security Protocols 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers /
|
Christianson, Bruce.
|
2007.
|
|
Security Protocols 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers /
|
Christianson, Bruce.
|
2009.
|
|
Security Protocols 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers /
|
Christianson, Bruce.
|
2010.
|