Welcome
Copyright © SirsiDynix. All rights reserved.
(Build horizon-8.0.1.5407)
German Jordanian University
العربية (السعودية)
English (United States)
Log in
Help
Welcome
Catalogue Search
E-Journal Federated Search
Search Library Catalog
Simple
Advanced
Power
Community Resources
JOPULS
Search History
My List
My Account
Search
Options
Refine
Start Over
Show details
Hide details
Duplicate Items
Add to My List
Print
Sorts and Limits
Sorts:
None
Author
Publication Date
Publisher
Subject
Title
Title:
Real 802.11 security : wi fi protected access and 802.11i / Jon Edney، William a Arbaugh.
Author:
Edney, Jon.
Arbaugh, William a. Joint author.
General Notes:
Includes index., Includes index.
Publisher:
Pearson education , inc,
Publication Place:
Delhi :
ISBN:
8129703122
Subject:
Computer security.
Edition:
1st ed.
Physical Description:
451 p.
Publication Date:
2004.
Results 1 - 1 of 1
Agency:
Collection:
Call No.:
Item Type:
Status:
Copy:
Barcode:
Media Type:
Balqa
General
005.8 E 3648
Normal Circulation
Available
1
BU201007259
Book
Title:
Information security : principles and practices / Mark S. Merkow , Jim Breithaupt.
Author:
MERKOW , Mark S
BREITHAUPT , Jim JT.AUTH
Publisher:
Pearson Education,
Publication Place:
Upper Saddle River:
ISBN:
0131547291
Subject:
Computer security
Physical Description:
xxvii , 420 p.
Publication Date:
2006.
Results 1 - 2 of 2
Agency:
Collection:
Call No.:
Item Type:
Status:
Copy:
Barcode:
Media Type:
Hashemite Main Library
General
005.8 M 563
Normal Circulation
Available
HU267938
Book
Muta Main Library
General
005.8MER
Normal Circulation
Shelving Cart
1
MU20096838
Book
Title:
Basics of networke security , firewalls , and vpns.
Publisher:
Prentice hall,
Publication Place:
New delhi :
ISBN:
8120324102
Subject:
Computer networks -- Security measures.
Computer security.
Edition:
1st ed.
Physical Description:
294 p.
Publication Date:
2003.
Results 1 - 1 of 1
Agency:
Collection:
Call No.:
Item Type:
Status:
Copy:
Barcode:
Media Type:
Balqa
General
005.8 B 3766
Normal Circulation
Available
1
BU201007472
Book
Title:
Data protection and information lifecycle management / Tom Petrocelli.
Author:
PETROCELLI , Tom
Publisher:
Prentice Hall,
Publication Place:
Upper Saddle River:
ISBN:
0131927574
Subject:
Computer security
Data protection
Physical Description:
xviii , 256 p.
Publication Date:
2006.
Results 1 - 1 of 1
Agency:
Collection:
Call No.:
Item Type:
Status:
Barcode:
Media Type:
Hashemite Main Library
General
005.8 P 497
Normal Circulation
Available
HU267931
Book
Title:
Unix system security : a guide for users and system administrators. / David A. Curry.
Addison-Wesley professional computing series.
Author:
Curry , David A.
Publisher:
Addison-Wesley Pub,
Publication Place:
California:
Subject:
Computer security
UNIX (Computer file)
Series:
Addison-Wesley professional computing series.
Physical Description:
xiii , 279p.
Publication Date:
1992.
Results 1 - 1 of 1
Agency:
Collection:
Call No.:
Item Type:
Status:
Barcode:
Media Type:
Al Al-Bayt University
General
QA76.9.A25C87
Normal Circulation
Shelving Cart
AB0061836
Book
Title:
MCSE Training KIt : Microsoft internet security and Acceleration server 2000/ Microsoft Corporation.
Author:
Microsoft Corporation مؤلف
General Notes:
Includes index, Includes index
Publisher:
Microsoft،
Publication Place:
[د.م.]:
Subject:
Internet -- Security measures
Computer security
Physical Description:
xliii ، 608 p. ill.;
Publication Date:
2001.
Results 1 - 2 of 2
Agency:
Collection:
Call No.:
Item Type:
Status:
Item Notes:
Barcode:
Media Type:
Yarmouk
General
TK5105.875.I57 .M384 2001
Normal Circulation
Available
الكتاب موجود في الطابق الثالث
YU337922
Book
YU CDROM
Audio Visuals
TK5105.875.I57 .M384 2001
Normal Circulation
Available
YU476180
Compact Disc Read-only Memory
Title:
Software Security : Theory, Programming, and Practice / Richard Sinn.
Author:
Sinn, Richard.
Publisher:
Course technology,
Publication Place:
Australia :
ISBN:
9788131508497
Subject:
Computer security.
Computer software.
Edition:
India ed.
Physical Description:
375 p. : ill. ;
Publication Date:
2008.
Results 1 - 1 of 1
Agency:
Collection:
Call No.:
Item Type:
Status:
Item Notes:
Barcode:
Media Type:
Yarmouk
General
QA 76 .9 .A25 S56 2008
Normal Circulation
Available
الكتاب موجود في الطابق الثالث
YU503896
Book
Title:
Recognizing patterns in transmitted signals for identification purposes by Baha' A. Alsaify.
Author:
Alsaify, Baha' A., 1984-
General Notes:
Advisor : Gordon Beavers., Advisor : Gordon Beavers.
Publisher:
University of Arkansas,
Publication Place:
Arkansas :
Subject:
Radio frequency identification systems.
Computer security.
Hidden Markov models.
Dissertation Note:
Thesis (Ph. D.) University of Arkansas (Arkansas, United States of America ), 2012.
Physical Description:
1 online resource (114 pages) : PDF
Electronic Location:
Abstract
Publication Date:
2012.
Results 1 - 2 of 2
Agency:
Collection:
Call No.:
Item Type:
Status:
Item Notes:
Barcode:
Media Type:
Yarmouk
Thesis
TK6570.I34 S254 2012
Thesis
Available
رسالة جامعية موجودة في الطابق الأول بقاعة المجموعات الخاصة
YU547060
Thesis
Yarmouk
Arabic Digital Library
No Circulation
Available Online
YU604807
Electronic resource
Title:
Network security for dummies/ by Chey Cobb.
Author:
Cobb , Chey
General Notes:
Includes index (p.359-380), Includes index (p.359-380)
Publisher:
Wiley,
Publication Place:
[S.l.]:
Subject:
Computer networks -- Security measure
Computer security
Data protection
Physical Description:
380 p.
Publication Date:
2003.
Results 1 - 1 of 1
Agency:
Collection:
Call No.:
Item Type:
Status:
Item Notes:
Barcode:
Media Type:
Yarmouk
General
TK5105.59 .C579 2003
Normal Circulation
Available
الكتاب موجود في الطابق الثالث
YU407543
Book
Title:
Security in computing/ Charles P. Pfleeger , Shari Lawrence Pfleeger.
Author:
Pfleeger , Charles P.
Pfleeger , Shari Lawrence Author
General Notes:
Includes bibliographical references and index (p.727-746), Includes bibliographical references and index (p.727-746)
Publisher:
Prentice Hall,
Publication Place:
[S.l.]:
Subject:
Computer security
Data protection
Privacy , Right of
Edition:
3rd.ed.
Physical Description:
746 p.
Publication Date:
2003.
Results 1 - 1 of 1
Agency:
Collection:
Call No.:
Item Type:
Status:
Item Notes:
Barcode:
Media Type:
Yarmouk
General
QA76.9.A25 .P45 2003
Normal Circulation
Available
الكتاب موجود في الطابق الثالث
YU361689
Book
Title:
Linux and unix security protables reference / Nitesh Dhanjani.
Author:
Dhanjani, Nitesh.
Publisher:
Mcgraw hill/ osborne,
Publication Place:
New york :
ISBN:
0072227869
Subject:
Computer security.
LINUX(COMPUTER FILE).
UNIX(Computer file).
Edition:
1st ed.
Publication Date:
2003.
Results 1 - 1 of 1
Agency:
Collection:
Call No.:
Item Type:
Status:
Copy:
Barcode:
Media Type:
Balqa
General
005.8 D4264
Normal Circulation
Available
1
BU201007058
Book
Title:
Ethics and security management on the web / NIIT.
Publisher:
Prentice-hall of india,
Publication Place:
New delhi :
ISBN:
8120324110
Subject:
Computer security.
Database security.
Software protection.
Edition:
1st ed.
Physical Description:
289 p.
Publication Date:
2003.
Title:
Persistent protection in multicast content delivery / Malek Bahoush ; A. Aghdam, supervisor.
Author:
Barhous, Malek.
Aghdam, A., supervisor.
General Notes:
Program : Computer Science., Program : Computer Science.
Subject:
Computer security
Data protection.
Copyright -- Electronic information resources.
Copyright and electronic data processing.
Privacy, Right of.
Dissertation Note:
Thesis(Ph.D. in Computer Science)-Concordia University(Montreal, Canada), School of Graduate Studies, Department of Computer Science and Software Engineering, 2011.
Physical Description:
xv, 181 leaves : ill. ;
Publication Date:
2011.
Title:
Encryption Using Random Keys Sequence- A Scheme for Secured Audio Data Transmission / by Hiba Hekmat Mohammed Mistareehi ; Bassam Harb, supervisor.
Author:
Mistareehi, Hiba Hekmat Mohammed.
Harb, Bassam, supervisor.
General Notes:
Program : Wireless communication., Program : Wireless communication.
Subject:
Data encryption (Computer science).
Random number generators.
Computer security.
Dissertation Note:
Thesis(M. Sc. in Wireless communication)-Y.U.(Irbid, Jordan), Faculty of Hijjawi for Engineering Technology, Telecommunications Engineering Department, 2012.
Physical Description:
x, 58 leaves : ill. ;
Location/SubLocation:
YU/YU_HIJ YU_COME
Electronic Location:
Abstract
Publication Date:
2012.
Title:
Time Variant Mathematical Series Based Modulation / Demodulation Robust Text Data Hiding in an Image by Aya Rateb Al-Shamasneh. عملية إخفاء بيانات نصية من خلال تحوير / استخلاص صورة اعتمادا على سلسلة رياضية متغيرة بالنسبة للوقت
عملية إخفاء بيانات نصية من خلال تحوير / استخلاص صورة اعتمادا على سلسلة رياضية متغيرة بالنسبة للوقت عملية إخفاء بيانات نصية من خلال تحوير / استخلاص صورة اعتمادا على سلسلة رياضية متغيرة بالنسبة للوقت
Author:
al-Shamasneh, Aya Rateb.
General Notes:
Advisor : Mohammad Al-Jarrah., Advisor : Mohammad Al-Jarrah.
Publisher:
Yarmouk University,
Publication Place:
Irbid :
Subject:
Computer security.
Data protection.
Cryptography.
Dissertation Note:
Thesis (M. Sc.) Yarmouk University (Irbid, Jordan), Hijjawi Faculty for Engineering Technology, Department of Computer Engineering, 2014.
Physical Description:
1 online resource (vii, 62 pages) : PDF
Electronic Location:
Abstract
Publication Date:
2014.
Title:
جودة خدمة الفيديو في الشبكات اللاسلكية لهجمات الشبكة المختلفة.
Quality of Service of Video in Wireless Networks Under Various Network Attacks by Ekbal M. Al_Hurani ; Supervisor Hussein Al_Zoubi.
Author:
al-Hurani, Ekbal M, Author.
General Notes:
Advisor : Hussein Al_Zoubi., Advisor : Hussein Al_Zoubi.
Publisher:
Yarmouk University,
Publication Place:
Irbid :
Subject:
Computer networks -- Security mesures.
Embedded computer systems.
Computer security.
Dissertation Note:
Thesis (M. S.) Yarmouk University (Irbid, Jordan), Faculty of Science, Department of Computer Engineering, 2014.
Physical Description:
1 online resource (x, 53 pages) : PDF
Electronic Location:
Abstract
Publication Date:
2014.
Title:
Developing SNORT Rules for Detection and Protection Against SQL Injection Attacks by Hussein Azmi AlNabulsi. تطوير قواعد سنورت لاكتشاف والحماية من هجوم SQL
تطوير قواعد سنورت لاكتشاف والحماية من هجوم SQL تطوير قواعد سنورت لاكتشاف والحماية من هجوم SQL
Snort (Software). تطوير قواعد سنورت لاكتشاف والحماية من هجوم SQL
Author:
alNabulsi, Hussein Azmi.
General Notes:
Advisor : Mohammad AlJarrah., Advisor : Mohammad AlJarrah.
Publisher:
Yarmouk University,
Publication Place:
Irbid :
Subject:
Intrusion detection systems (Computer security).
Computers -- Access control.
Computer security.
Computer networks -- Security measures.
SQL (Computer program language).
Snort (Software).
Dissertation Note:
Thesis (M. Sc. in Embedded Systems) Yarmouk University (Irbid, Jordan), Hijjawi Faculty for Engineering Technology, Department of Computer Engineering, 2013.
Physical Description:
1 online resource (129 pages) : PDF
Electronic Location:
Abstract
Publication Date:
2013.
Title:
Cryptography for database and internet applications: Developing secret and piblic key techniques with java / Nick Galbreath.
Author:
Galbreath, Nick.
General Notes:
Includes index., Includes index.
Publisher:
Wiley publishing inc,
Publication Place:
New delhi :
ISBN:
8126503327
Subject:
Computer security.
Crypotography.
Database security.
Internet -- Security measures.
Java ( Computer Program language.
Edition:
1st ed.
Physical Description:
400 p.
Publication Date:
2002.
Title:
Developing snort rules for detection and protection against SQL injection attacks / by Hussein Azmi alNabulsi ; supervised by Dr. Mohammad al-Jarrah, Dr. Izzat Alsmadi.
Author:
alNabulsi, Hussein Azmi, author.
al-Jarrah, Mohammad, supervisor.
alsmadi,Izzat, co-supervisor.
Yarmouk University (Irbid, Jordan). Hijjawi Faculty for Engineering Technology. Department of Computer Engineering.
General Notes:
Thesis (M. Sc. in Computer Engineering)--Yarmouk University (Irbid, Jordan), Hijjawi Faculty for Engineering Technology, Department of Computer Engineering, 2013.
Includes bibliographical references.
The electronic version is available in theses database \\ University of Jordan.
Includes abstracts in English and Arabic.
Subject:
Computer networks -- Security measures.
Intrusion detection systems (Computer security).
Computers -- Access control.
Computer security.
SQL (Computer program language).
Dissertation Note:
Thesis (M. Sc. in Computer Engineering)--Yarmouk University (Irbid, Jordan), Hijjawi Faculty for Engineering Technology, Department of Computer Engineering, 2013.
Physical Description:
1 CD-ROM : PDF.
Publication Date:
2013.