Welcome
user_choices_background_image
Welcome
login container bottom
Search Library Catalog
Duplicate Items
Add to My List

Print
Sorts and Limits

Results 1 - 19 of 19
1. Title: Real 802.11 security : wi fi protected access and 802.11i / Jon Edney، William a Arbaugh.
Author: Edney, Jon.
Publication: Pearson education , inc, Delhi : 2004.
Edition: 1st ed.
2. Title: Information security : principles and practices / Mark S. Merkow , Jim Breithaupt.
Author: MERKOW , Mark S
Publication: Pearson Education, Upper Saddle River: 2006.
3. Title: Basics of networke security , firewalls , and vpns.
Publication: Prentice hall, New delhi : 2003.
Edition: 1st ed.
4. Title: Data protection and information lifecycle management / Tom Petrocelli.
Author: PETROCELLI , Tom
Publication: Prentice Hall, Upper Saddle River: 2006.
5. Title: Unix system security : a guide for users and system administrators. / David A. Curry.
Addison-Wesley professional computing series.
Author: Curry , David A.
Publication: Addison-Wesley Pub, California: 1992.
6. Title: MCSE Training KIt : Microsoft internet security and Acceleration server 2000/ Microsoft Corporation.
Publication: Microsoft، [د.م.]: 2001.
7. Title: Software Security : Theory, Programming, and Practice / Richard Sinn.
Author: Sinn, Richard.
Publication: Course technology, Australia : 2008.
Edition: India ed.
8. Title: Recognizing patterns in transmitted signals for identification purposes by Baha' A. Alsaify.
Author: Alsaify, Baha' A., 1984-
Publication: University of Arkansas, Arkansas : 2012.
9. Title: Network security for dummies/ by Chey Cobb.
Author: Cobb , Chey
Publication: Wiley, [S.l.]: 2003.
10. Title: Security in computing/ Charles P. Pfleeger , Shari Lawrence Pfleeger.
Author: Pfleeger , Charles P.
Publication: Prentice Hall, [S.l.]: 2003.
Edition: 3rd.ed.
11. Title: Linux and unix security protables reference / Nitesh Dhanjani.
Author: Dhanjani, Nitesh.
Publication: Mcgraw hill/ osborne, New york : 2003.
Edition: 1st ed.
12. Title: Ethics and security management on the web / NIIT.
Publication: Prentice-hall of india, New delhi : 2003.
Edition: 1st ed.
13. Title: Persistent protection in multicast content delivery / Malek Bahoush ; A. Aghdam, supervisor.
Author: Barhous, Malek.
Publication: 2011.
14. Title: Encryption Using Random Keys Sequence- A Scheme for Secured Audio Data Transmission / by Hiba Hekmat Mohammed Mistareehi ; Bassam Harb, supervisor.
Author: Mistareehi, Hiba Hekmat Mohammed.
Publication: 2012.
15. Title: Time Variant Mathematical Series Based Modulation / Demodulation Robust Text Data Hiding in an Image by Aya Rateb Al-Shamasneh.
عملية إخفاء بيانات نصية من خلال تحوير / استخلاص صورة اعتمادا على سلسلة رياضية متغيرة بالنسبة للوقت
Author: al-Shamasneh, Aya Rateb.
Publication: Yarmouk University, Irbid : 2014.
16. Title: جودة خدمة الفيديو في الشبكات اللاسلكية لهجمات الشبكة المختلفة.
Quality of Service of Video in Wireless Networks Under Various Network Attacks by Ekbal M. Al_Hurani ; Supervisor Hussein Al_Zoubi.
Author: al-Hurani, Ekbal M,
Publication: Yarmouk University, Irbid : 2014.
17. Title: Developing SNORT Rules for Detection and Protection Against SQL Injection Attacks by Hussein Azmi AlNabulsi.
تطوير قواعد سنورت لاكتشاف والحماية من هجوم SQL
Snort (Software).
Author: alNabulsi, Hussein Azmi.
Publication: Yarmouk University, Irbid : 2013.
18. Title: Cryptography for database and internet applications: Developing secret and piblic key techniques with java / Nick Galbreath.
Author: Galbreath, Nick.
Publication: Wiley publishing inc, New delhi : 2002.
Edition: 1st ed.
19. Title: Developing snort rules for detection and protection against SQL injection attacks / by Hussein Azmi alNabulsi ; supervised by Dr. Mohammad al-Jarrah, Dr. Izzat Alsmadi.
Author: alNabulsi, Hussein Azmi,
Publication: 2013.
 
 
Results 1 - 19 of 19
Duplicate Items
Add to My List

Print
Sorts and Limits