Welcome
user_choices_background_image
Welcome
login container bottom
Search Libraries Catalogue
Search Selected
Select All
<<   Previous     Next   >>
Title Main Entry Publication Date
Security in computing/ Pfleeger , Charles P. 2003.
Security in Computing Systems Challenges, Approaches and Solutions / Biskup, Joachim. 2009.
Security in disarmament/ Barnet, Richard J. 1965.
Security in E-Learning Weippl, Edgar. 2005.
Security in Embedded Devices Gebotys, Catherine H. 2010.
Security in Emerging Wireless Communication and Networking Systems First International ICST Workshop, SEWCN 2009, Athens, Greece, September 14, 2009, Revised Selected Papers / Gu, Qijun. 2010.
Security in Europe Hunter, Robert Edwards, 1940- [1972, c1969]
Security in Iraq a framework for analyzing emerging threats as U.S. forces leave / Gompert, David C. 2010.
Security in Network Coding Zhang, Peng. 2016.
Security in Pervasive Computing (vol. # 3450) Second International Conference, SPC 2005, Boppard, Germany, April 6-8, 2005, Proceedings Hutter, Dieter. 2005
Security in Pervasive Computing (vol. # 3934) Third International Conference, SPC 2006, York, UK, April 18-21, 2006, Proceedings Clark, John A. 2006
Security in schools its effect on students / Phaneuf, Shannon Womer, 1971- 2009.
Security in Shared Neighbourhoods Foreign Policy of Russia, Turkey and the EU /   2016.
Security in southern Asia /   1984.
Security in the Gulf / Litwak, Robert 1982.
Security in the information society : visions and perspectives : IFIP TC11 17th International Conference on Information Security (SEC2002), May 7-9, 2002, Cairo, Egypt / IFIP TC11 International Conference on Information Security 2002 : Cairo, Egypt) c2002.
Security in the Middle East : regional change and great power strategies /   1987.
Security in the Middle East : regional change and great power strategies /   1987.
Sources of inter-state conflict / Litwak , Robert 1981.
Modernisation , political development and stability / Plascov, Avi 1982.
Security in the Persian Gulf.   c1981-
Security in the Persian Gulf / Chubin , Shahram 1981.
Security in the Persian Gulf: domestic political factors/ Chubin, Shahram. 1981.
Security in the Persian Gulf Region Shayan, Fatemeh. 2017.
Security in the private cloud /   2017.
Security in wireless LANs and MANs Hardjono, Thomas. 2005.
Security in wireless personal area networks - bluetooth / Dorgham, Osama Mohammad Ahmad. 2005.
Security in Wireless Sensor Networks Oreku, George S. 2016.
Security integration in Europe how knowledge-based networks are transforming the European Union / Cross, Mai'a K. Davis, 1977- c2011.
Security intelligence : a practitioner's guide to solving enterprise security challenges / Li, Qing, 1971- 2015.
الضمانات والتدابير القانونية لحماية الدائنين بموجب اتفاقية كيب تاون والبروتوكول الملحق بها بشأن المسائل التي تخص الطائرات ومعداتها : دراسة تطبيقية في النظام القانوني الأردني / أبو العرجة، إيهاب محمد، 2014.
الضمانات والتدابير القانونية لحماية الدائنين بموجب اتفاقية كيب تاون والبروتوكول الملحق بها بشأن المسائل التي تخص الطائرات ومعداتها : دراسة تطبيقية في النظام القانوني الأردني ابو العرجة، ايهاب محمد. 2014.
Security Interests in Intellectual Property   2017.
Security Issues in Mobile NFC Devices Roland, Michael. 2015.
Security issues of IT outsourcing   c2006.
Security law and methods Pastor, James F., 1957- c2007.
Security log management identifying patterns in the chaos /   c2006.
إدارة الأمن وتأمين المؤتمرات / مركز الخبرات المهنية للإدارة (القاهرة) 2012
Security Management, Integrity, and Internal Control in Information Systems IFIP TC-11 WG 11.1 & WG 11.5 Joint Working Conference / Dowland, Paul. 2005.
Security manual Brooksbank, David. c2007.
SECURITY MANUAL/ OLIVER,ERIC 1983
Security markets : stochastic models / Duffie, Darrell. c1988.
الإعلام الأمني في الأردن ودوره في التصدي للإرهاب الحامد، ميساء غازي، 2019.
Security metaphors : cold war discourse from containment to common house / Chilton, Paul A. (Paul Anthony) c1996.
Security modeling and analysis of mobile agent systems Ma, Lu. c2006.
Security of block ciphers : from algorithm design to hardware implementation / Sakiyama, Kazuo, 1971- 2015
The security of buildings / Underwood, Grahame. 1984.
The security of China; Chinese approaches to problems of war and strategy. Huck, Arthur. 1970.
Security of computer based information systems / Lane, V.P. 1985.
Security of e-systems and computer networks / Obaidat, Mohammad S. (Mohammad Salameh), 1952- 2007.
Security of Industrial Control Systems and Cyber-Physical Systems Second International Workshop, CyberICPS 2016, Heraklion, Crete, Greece, September 26-30, 2016, Revised Selected Papers /   2017.
Security of Industrial Water Supply and Management Atimtay, Aysel T. 2011.
Security of information and communication networks / Kartalopoulos, Stamatios V. c2009.
Security of mobile communications / Boudriga, Noureddine. c2010.
Security of Networks and Services in an All-Connected World 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings /   2017.
Security of radioactive sources : proceedings of an international conference held in Vienna, Austria, 10-13 March 2003, organized by the International Atomic Energy Agency, hosted by the government of Austria, co-sponsored by the government of the Russian Federation and the government of the United States of America, and in co-operation with the European Commission, the European Police Office, the International Criminal Police Organization and the World Customs Organization. International Conference on Security of Radioactive Sources (2003 : Vienna, Austria) 2003.
The security of the Caspian Sea region /   2001.
The Security of the Persian Gulf /   c1981.
The Security of Water, Food, Energy and Liveability of Cities Challenges and Opportunities for Peri-Urban Futures /   2014.
Security of Water Supply Systems: from Source to Tap Pollert, Jaroslav. 2006.
SECURITY OF WEAK STATS: THE"POPULAR WAR"DOCTRINE IN ROMANIAN DEFENSE POLICY/ CHAPLIN,ARIE 1977
مسئولي الأمن أساسي / مركز الخبرات المهنية للإدارة (القاهرة). 2009.
مسئولي الأمن ( متقدم) /   2010.
Security officers and policing powers, culture and control in the governance of private space / Button, Mark. c2007.
Security operations management McCrie, Robert D. 2007.
Security outlook of the Asia-Pacific countries and its implications for the Defense Sector. International Workshop on Asia Pacific Security 2012 : Tokyo, Japan) 2012.
Security outlook of the Asia-Pacific countries and its implications for the Defense Sector. International Workshop on Asia Pacific Security 2011 : Tokyo, Japan) 2011.
Security outlook of the Asia Pacific countries and its implications for the defense sector. International Workshop on Asia Pacific Security 2013 : Tokyo, Japan) 2013. [2013]
Security outlook of the Asia Pacific countries and its implications for the defense sector : the NIDS International Workshop on Asia Pacific Security, 2014. International Workshop on Asia Pacific Security 2014 : Tokyo, Japan) 2014.
Security performance analysis and enhancement authentication for internet of things / Joudeh, Haya Ali, 2018.
Security phishing detection using DOM-Tree structure and cAnt-Minerpb algorithm / al-Sarhan, Asma’a Mohammad. 2016.
Security phishing detection using rule induction (Prism) data mining / Muhammad, Buran Abd Allah. 2013.
Security planning & disaster recovery / Maiwald, Eric. c2002.
Security planning & disaster recovery Maiwald, Eric. c2002.
Security Planning An Applied Approach / Lincke, Susan. 2015.
Security planning & disaster recovery / Maiwald, Eric. c2002.
Security planning & disaster recovery Maiwald, Eric. c2002.
Security+ certification : CompTIA exam SYO-101 : training kit /   c2003.
Security+ exam guide Crayton, Christopher A. c2003.
CompTIA security+ guide to network security fundamentals / Ciampa, Mark D., [2018] 2018.
Lab manual for CompTIA security+ guide to network security fundamentals / Hurd, Andy, [2018] �2018
Security+ guide to network security fundamentals / Ciampa, Mark D. 2005.
Security+ study guide & DVD training system   c2007.
Security+ study guide and DVD training system Cross, Michael. 2002.
Security+ study guide & DVD training system   c2007.
Security+ training guide/ King,Todd 2003.
Security+ guide to network security fundamentals / Ciampa, Mark D. 2005.
Security+ study guide & DVD training system   c2007.
Security+ study guide and DVD training system Cross, Michael. 2002.
Security policies and procedures : principles and practices / Greene, Sari Stern, 1957- c2006.
Security, Privacy, and Applied Cryptography Engineering 4th International Conference, SPACE 2014, Pune, India, October 18-22, 2014. Proceedings /   2014.
Security, Privacy, and Applied Cryptography Engineering 5th International Conference, SPACE 2015, Jaipur, India, October 3-7, 2015, Proceedings /   2015.
Security, Privacy, and Applied Cryptography Engineering Second International Conference, SPACE 2012, Chennai, India, November 3-4, 2012. Proceedings / Bogdanov, Andrey. 2012.
Security, Privacy, and Applied Cryptography Engineering Third International Conference, SPACE 2013, Kharagpur, India, October 19-23, 2013. Proceedings / Gierlichs, Benedikt. 2013.
Security, Privacy and Trust in Cloud Systems   2014.
Security, Privacy, and Trust in Modern Data Management Petkovic, Milan. 2007.
Security Privatization How Non-security-related Private Businesses Shape Security Governance /   2018.
Security Protocols 13th International Workshop, Cambridge, UK, April 20-22, 2005, Revised Selected Papers / Christianson, Bruce. 2007.
Security Protocols 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers / Christianson, Bruce. 2009.
Security Protocols 15th International Workshop, Brno, Czech Republic, April 18-20, 2007. Revised Selected Papers / Christianson, Bruce. 2010.
<<   Previous     Next   >>