|
|
|
1.
Title:
Real 802.11 security : wi fi protected access and 802.11i / Jon Edney، William a Arbaugh.
Author:
Edney, Jon.
Publication:
Pearson education , inc, Delhi : 2004.
Edition:
1st ed.
|
|
|
|
2.
Title:
Information security : principles and practices / Mark S. Merkow , Jim Breithaupt.
Author:
MERKOW , Mark S
Publication:
Pearson Education, Upper Saddle River: 2006.
|
|
|
|
3.
Title:
Basics of networke security , firewalls , and vpns.
Publication:
Prentice hall, New delhi : 2003.
Edition:
1st ed.
|
|
|
|
4.
Title:
Data protection and information lifecycle management / Tom Petrocelli.
Author:
PETROCELLI , Tom
Publication:
Prentice Hall, Upper Saddle River: 2006.
|
|
|
|
5.
Title:
Unix system security : a guide for users and system administrators. / David A. Curry.
Addison-Wesley professional computing series.
Author:
Curry , David A.
Publication:
Addison-Wesley Pub, California: 1992.
|
|
|
|
6.
Title:
MCSE Training KIt : Microsoft internet security and Acceleration server 2000/ Microsoft Corporation.
Publication:
Microsoft، [د.م.]: 2001.
|
|
|
|
7.
Title:
Software Security : Theory, Programming, and Practice / Richard Sinn.
Author:
Sinn, Richard.
Publication:
Course technology, Australia : 2008.
Edition:
India ed.
|
|
|
|
8.
Title:
Recognizing patterns in transmitted signals for identification purposes by Baha' A. Alsaify.
Author:
Alsaify, Baha' A., 1984-
Publication:
University of Arkansas, Arkansas : 2012.
|
|
|
|
9.
Title:
Network security for dummies/ by Chey Cobb.
Author:
Cobb , Chey
Publication:
Wiley, [S.l.]: 2003.
|
|
|
|
10.
Title:
Security in computing/ Charles P. Pfleeger , Shari Lawrence Pfleeger.
Author:
Pfleeger , Charles P.
Publication:
Prentice Hall, [S.l.]: 2003.
Edition:
3rd.ed.
|
|
|
|
11.
Title:
Linux and unix security protables reference / Nitesh Dhanjani.
Author:
Dhanjani, Nitesh.
Publication:
Mcgraw hill/ osborne, New york : 2003.
Edition:
1st ed.
|
|
|
|
12.
Title:
Ethics and security management on the web / NIIT.
Publication:
Prentice-hall of india, New delhi : 2003.
Edition:
1st ed.
|
|
|
|
13.
Title:
Persistent protection in multicast content delivery / Malek Bahoush ; A. Aghdam, supervisor.
Author:
Barhous, Malek.
Publication:
2011.
|
|
|
|
14.
Title:
Encryption Using Random Keys Sequence- A Scheme for Secured Audio Data Transmission / by Hiba Hekmat Mohammed Mistareehi ; Bassam Harb, supervisor.
Author:
Mistareehi, Hiba Hekmat Mohammed.
Publication:
2012.
|
|
|
|
15.
Title:
Time Variant Mathematical Series Based Modulation / Demodulation Robust Text Data Hiding in an Image by Aya Rateb Al-Shamasneh.
عملية إخفاء بيانات نصية من خلال تحوير / استخلاص صورة اعتمادا على سلسلة رياضية متغيرة بالنسبة للوقت
Author:
al-Shamasneh, Aya Rateb.
Publication:
Yarmouk University, Irbid : 2014.
|
|
|
|
16.
Title:
جودة خدمة الفيديو في الشبكات اللاسلكية لهجمات الشبكة المختلفة.
Quality of Service of Video in Wireless Networks Under Various Network Attacks by Ekbal M. Al_Hurani ; Supervisor Hussein Al_Zoubi.
Author:
al-Hurani, Ekbal M,
Publication:
Yarmouk University, Irbid : 2014.
|
|
|
|
17.
Title:
Developing SNORT Rules for Detection and Protection Against SQL Injection Attacks by Hussein Azmi AlNabulsi.
تطوير قواعد سنورت لاكتشاف والحماية من هجوم SQL
Snort (Software).
Author:
alNabulsi, Hussein Azmi.
Publication:
Yarmouk University, Irbid : 2013.
|
|
|
|
18.
Title:
Cryptography for database and internet applications: Developing secret and piblic key techniques with java / Nick Galbreath.
Author:
Galbreath, Nick.
Publication:
Wiley publishing inc, New delhi : 2002.
Edition:
1st ed.
|
|
|
|
19.
Title:
Developing snort rules for detection and protection against SQL injection attacks / by Hussein Azmi alNabulsi ; supervised by Dr. Mohammad al-Jarrah, Dr. Izzat Alsmadi.
Author:
alNabulsi, Hussein Azmi,
Publication:
2013.
|
|
|
|
|
|
|