Welcome
user_choices_background_image
Welcome
login container bottom
Search Library Catalog
Duplicate Items
Add to My List

Print
Sorts and Limits


Title: Real 802.11 security : wi fi protected access and 802.11i / Jon Edney، William a Arbaugh.
Author: Edney, Jon.
Arbaugh, William a. Joint author.

General Notes: Includes index., Includes index.
Publisher: Pearson education , inc,
Publication Place: Delhi :
ISBN: 8129703122
Subject: Computer security.
Edition: 1st ed.
Physical Description: 451 p.
Publication Date: 2004.

Results 1 - 1 of 1
  Agency: Collection: Call No.: Item Type: Status: Copy: Barcode: Media Type:
Balqa General 005.8 E 3648 Normal Circulation Available 1 BU201007259 Book

Title: Information security : principles and practices / Mark S. Merkow , Jim Breithaupt.
Author: MERKOW , Mark S
BREITHAUPT , Jim JT.AUTH

Publisher: Pearson Education,
Publication Place: Upper Saddle River:
ISBN: 0131547291
Subject: Computer security
Physical Description: xxvii , 420 p.
Publication Date: 2006.

Results 1 - 2 of 2
  Agency: Collection: Call No.: Item Type: Status: Copy: Barcode: Media Type:
Hashemite Main Library General 005.8 M 563 Normal Circulation Available   HU267938 Book
Muta Main Library General 005.8MER Normal Circulation Shelving Cart 1 MU20096838 Book

Title: Basics of networke security , firewalls , and vpns.
Publisher: Prentice hall,
Publication Place: New delhi :
ISBN: 8120324102
Subject: Computer networks -- Security measures.
Computer security.

Edition: 1st ed.
Physical Description: 294 p.
Publication Date: 2003.

Results 1 - 1 of 1
  Agency: Collection: Call No.: Item Type: Status: Copy: Barcode: Media Type:
Balqa General 005.8 B 3766 Normal Circulation Available 1 BU201007472 Book

Title: Data protection and information lifecycle management / Tom Petrocelli.
Author: PETROCELLI , Tom
Publisher: Prentice Hall,
Publication Place: Upper Saddle River:
ISBN: 0131927574
Subject: Computer security
Data protection

Physical Description: xviii , 256 p.
Publication Date: 2006.

Results 1 - 1 of 1
  Agency: Collection: Call No.: Item Type: Status: Barcode: Media Type:
Hashemite Main Library General 005.8 P 497 Normal Circulation Available HU267931 Book


Results 1 - 1 of 1
  Agency: Collection: Call No.: Item Type: Status: Barcode: Media Type:
Al Al-Bayt University General QA76.9.A25C87 Normal Circulation Shelving Cart AB0061836 Book

Title: MCSE Training KIt : Microsoft internet security and Acceleration server 2000/ Microsoft Corporation.
Author: Microsoft Corporation مؤلف
General Notes: Includes index, Includes index
Publisher: Microsoft،
Publication Place: [د.م.]:
Subject: Internet -- Security measures
Computer security

Physical Description: xliii ، 608 p. ill.;
Publication Date: 2001.

Results 1 - 2 of 2
  Agency: Collection: Call No.: Item Type: Status: Item Notes: Barcode: Media Type:
Yarmouk General TK5105.875.I57 .M384 2001 Normal Circulation Available الكتاب موجود في الطابق الثالث YU337922 Book
YU CDROM Audio Visuals TK5105.875.I57 .M384 2001 Normal Circulation Available   YU476180 Compact Disc Read-only Memory

Title: Software Security : Theory, Programming, and Practice / Richard Sinn.
Author: Sinn, Richard.
Publisher: Course technology,
Publication Place: Australia :
ISBN: 9788131508497
Subject: Computer security.
Computer software.

Edition: India ed.
Physical Description: 375 p. : ill. ;
Publication Date: 2008.

Results 1 - 1 of 1
  Agency: Collection: Call No.: Item Type: Status: Item Notes: Barcode: Media Type:
Yarmouk General QA 76 .9 .A25 S56 2008 Normal Circulation Available الكتاب موجود في الطابق الثالث YU503896 Book

Title: Recognizing patterns in transmitted signals for identification purposes by Baha' A. Alsaify.
Author: Alsaify, Baha' A., 1984-
General Notes: Advisor : Gordon Beavers., Advisor : Gordon Beavers.
Publisher: University of Arkansas,
Publication Place: Arkansas :
Subject: Radio frequency identification systems.
Computer security.
Hidden Markov models.

Dissertation Note: Thesis (Ph. D.) University of Arkansas (Arkansas, United States of America ), 2012.
Physical Description: 1 online resource (114 pages) : PDF
Electronic Location: Abstract
Publication Date: 2012.

Results 1 - 2 of 2
  Agency: Collection: Call No.: Item Type: Status: Item Notes: Barcode: Media Type:
Yarmouk Thesis TK6570.I34 S254 2012 Thesis Available رسالة جامعية موجودة في الطابق الأول بقاعة المجموعات الخاصة YU547060 Thesis
Yarmouk Arabic Digital Library   No Circulation Available Online   YU604807 Electronic resource

Title: Network security for dummies/ by Chey Cobb.
Author: Cobb , Chey
General Notes: Includes index (p.359-380), Includes index (p.359-380)
Publisher: Wiley,
Publication Place: [S.l.]:
Subject: Computer networks -- Security measure
Computer security
Data protection

Physical Description: 380 p.
Publication Date: 2003.

Results 1 - 1 of 1
  Agency: Collection: Call No.: Item Type: Status: Item Notes: Barcode: Media Type:
Yarmouk General TK5105.59 .C579 2003 Normal Circulation Available الكتاب موجود في الطابق الثالث YU407543 Book

Title: Security in computing/ Charles P. Pfleeger , Shari Lawrence Pfleeger.
Author: Pfleeger , Charles P.
Pfleeger , Shari Lawrence Author

General Notes: Includes bibliographical references and index (p.727-746), Includes bibliographical references and index (p.727-746)
Publisher: Prentice Hall,
Publication Place: [S.l.]:
Subject: Computer security
Data protection
Privacy , Right of

Edition: 3rd.ed.
Physical Description: 746 p.
Publication Date: 2003.

Results 1 - 1 of 1
  Agency: Collection: Call No.: Item Type: Status: Item Notes: Barcode: Media Type:
Yarmouk General QA76.9.A25 .P45 2003 Normal Circulation Available الكتاب موجود في الطابق الثالث YU361689 Book

Title: Linux and unix security protables reference / Nitesh Dhanjani.
Author: Dhanjani, Nitesh.
Publisher: Mcgraw hill/ osborne,
Publication Place: New york :
ISBN: 0072227869
Subject: Computer security.
LINUX(COMPUTER FILE).
UNIX(Computer file).

Edition: 1st ed.
Publication Date: 2003.

Results 1 - 1 of 1
  Agency: Collection: Call No.: Item Type: Status: Copy: Barcode: Media Type:
Balqa General 005.8 D4264 Normal Circulation Available 1 BU201007058 Book

Title: Ethics and security management on the web / NIIT.
Publisher: Prentice-hall of india,
Publication Place: New delhi :
ISBN: 8120324110
Subject: Computer security.
Database security.
Software protection.

Edition: 1st ed.
Physical Description: 289 p.
Publication Date: 2003.


Title: Persistent protection in multicast content delivery / Malek Bahoush ; A. Aghdam, supervisor.
Author: Barhous, Malek.
Aghdam, A., supervisor.

General Notes: Program : Computer Science., Program : Computer Science.
Subject: Computer security
Data protection.
Copyright -- Electronic information resources.
Copyright and electronic data processing.
Privacy, Right of.

Dissertation Note: Thesis(Ph.D. in Computer Science)-Concordia University(Montreal, Canada), School of Graduate Studies, Department of Computer Science and Software Engineering, 2011.
Physical Description: xv, 181 leaves : ill. ;
Publication Date: 2011.


Title: Encryption Using Random Keys Sequence- A Scheme for Secured Audio Data Transmission / by Hiba Hekmat Mohammed Mistareehi ; Bassam Harb, supervisor.
Author: Mistareehi, Hiba Hekmat Mohammed.
Harb, Bassam, supervisor.

General Notes: Program : Wireless communication., Program : Wireless communication.
Subject: Data encryption (Computer science).
Random number generators.
Computer security.

Dissertation Note: Thesis(M. Sc. in Wireless communication)-Y.U.(Irbid, Jordan), Faculty of Hijjawi for Engineering Technology, Telecommunications Engineering Department, 2012.
Physical Description: x, 58 leaves : ill. ;
Location/SubLocation: YU/YU_HIJ YU_COME
Electronic Location: Abstract
Publication Date: 2012.




Title: جودة خدمة الفيديو في الشبكات اللاسلكية لهجمات الشبكة المختلفة.
Quality of Service of Video in Wireless Networks Under Various Network Attacks by Ekbal M. Al_Hurani ; Supervisor Hussein Al_Zoubi.

Author: al-Hurani, Ekbal M, Author.
General Notes: Advisor : Hussein Al_Zoubi., Advisor : Hussein Al_Zoubi.
Publisher: Yarmouk University,
Publication Place: Irbid :
Subject: Computer networks -- Security mesures.
Embedded computer systems.
Computer security.

Dissertation Note: Thesis (M. S.) Yarmouk University (Irbid, Jordan), Faculty of Science, Department of Computer Engineering, 2014.
Physical Description: 1 online resource (x, 53 pages) : PDF
Electronic Location: Abstract
Publication Date: 2014.




Title: Cryptography for database and internet applications: Developing secret and piblic key techniques with java / Nick Galbreath.
Author: Galbreath, Nick.
General Notes: Includes index., Includes index.
Publisher: Wiley publishing inc,
Publication Place: New delhi :
ISBN: 8126503327
Subject: Computer security.
Crypotography.
Database security.
Internet -- Security measures.
Java ( Computer Program language.

Edition: 1st ed.
Physical Description: 400 p.
Publication Date: 2002.


Title: Developing snort rules for detection and protection against SQL injection attacks / by Hussein Azmi alNabulsi ; supervised by Dr. Mohammad al-Jarrah, Dr. Izzat Alsmadi.
Author: alNabulsi, Hussein Azmi, author.
al-Jarrah, Mohammad, supervisor.
alsmadi,Izzat, co-supervisor.
Yarmouk University (Irbid, Jordan). Hijjawi Faculty for Engineering Technology. Department of Computer Engineering.

General Notes: Thesis (M. Sc. in Computer Engineering)--Yarmouk University (Irbid, Jordan), Hijjawi Faculty for Engineering Technology, Department of Computer Engineering, 2013.
Includes bibliographical references.
The electronic version is available in theses database \\ University of Jordan.
Includes abstracts in English and Arabic.

Subject: Computer networks -- Security measures.
Intrusion detection systems (Computer security).
Computers -- Access control.
Computer security.
SQL (Computer program language).

Dissertation Note: Thesis (M. Sc. in Computer Engineering)--Yarmouk University (Irbid, Jordan), Hijjawi Faculty for Engineering Technology, Department of Computer Engineering, 2013.
Physical Description: 1 CD-ROM : PDF.
Publication Date: 2013.