Welcome
Copyright © SirsiDynix. All rights reserved.
(Build horizon-8.0.1.5407)
German Jordanian University
العربية (السعودية)
English (United States)
Log in
Help
Welcome
Catalogue Search
E-Journal Federated Search
Search Library Catalog
Simple
Advanced
Power
Community Resources
JOPULS
Search History
My List
My Account
Search
Options
Refine
Start Over
Show details
Hide details
Duplicate Items
Add to My List
Print
Sorts and Limits
Sorts:
None
Author
Publication Date
Publisher
Subject
Title
Select All
Results 1 - 20 of 42
1
2
3
Next
>>
1
.
Title:
Intrusion detection in distributed systems : an abstraction-based approach / by Peng Ning, Sushil Jajodia, X. Sean Wang.
Advances in information security ;
Author:
Ning, Peng.
Publication:
Kluwer Academic Publishers, Boston : 2004.
2
.
Title:
Advances in cryptology--EUROCRYPT '91 : Workshop on the Theory and Application of Cryptographic Techniques, Brighton, UK, April 8-11, 1991 : proceedings / D.W. Davies (ed.).
Lecture notes in computer science ;
Author:
EUROCRYPT '91 (1991 : Brighton, England)
Publication:
Springer-Verlag, Berlin ; New York : c1991.
3
.
Title:
How secure is your wireless network? : safeguarding your Wi-Fi-LAN / Lee Barken.
Author:
Barken, Lee.
Publication:
Prentice Hall PTR, Upper Saddle River, NJ : c2004.
4
.
Title:
Managers guide to computer security / Donn B. Parker.
Computer security management.
Author:
Parker, Donn B.
Publication:
Reston Pub. Co., Reston, Va. : c1981.
5
.
Title:
Secrecy, authentication, and public key systems / by Ralph C. Merkle.
Computer science. Systems programming ;
Author:
Merkle, Ralph C. (Ralph Charles)
Publication:
UMI Research Press, Ann Arbor, Mich. : c1982.
6
.
Title:
Cryptography and security services : mechanisms and applications / Manuel Mogollon.
Author:
Mogollon, Manuel.
Publication:
Cybertech Pub., Hershey, : 2007.
7
.
Title:
Formal modeling of role hierarchy and delegation constraints in role based access control policies / by Nafi’ Yousef Eid Alsawae’r ; supervised by Khair Eddin Sabri.
نمذجة رسمية لقيود التسلسل الهرمي والتفويض في سياسات التحكم المعتمده على الدور في الوصول
Author:
al-Sawae’r, Nafi’ Yousef Eid.
Publication:
2017.
8
.
Title:
Metasploit : the penetration tester's guide / by David Kennedy [and others].
Metasploit (Electronic resource)
Metasploit (Electronic resource)
Metasploit (Electronic resource)
Publication:
No Starch Press, San Francisco : �2011.
9
.
Title:
Introduction to data security and controls/ Edward R. Buck..
Author:
Buck, Edward R.
Publication:
QED Information Sciences, Wellesly:
10
.
Title:
Information integrity : a structure for its definition and management / Hal B. Becker.
Author:
Becker, Hal B.
Publication:
McGraw-Hill, New York : c1983.
11
.
Title:
Cryptography, a primer / Alan G. Konheim.
Author:
Konheim, Alan G., 1934-
Publication:
Wiley, New York : c1981.
12
.
Title:
Firewalls 24 seven / Matthew Strebe, Charles Perkins.
Firewalls twenty four seven
24 seven
Twenty four seven
Author:
Strebe, Matthew.
Publication:
Sybex, San Francisco, CA : c2000.
13
.
Title:
Cryptography and data security / Dorothy Elizabeth Robling Denning.
Author:
Denning, Dorothy Elizabeth Robling, 1945
Publication:
Addison-Wesley, Reading, Mass. : c1982.
14
.
Title:
Linux firewalls.
Linux.
Linux firewalls.
Author:
Suehring, Steve.
Publication:
Novell Press, Indianapolis, Ind. : 2006.
Edition:
3rd ed. / Steve Suehring, Robert Ziegler.
15
.
Title:
Professional rootkits / Ric Vieler.
Rootkits
Wrox professional guides
Microsoft Windows (Computer file)
Author:
Vieler, Ric, 1960-
Publication:
Wiley/Wrox, Indianapolis, IN : c2007.
16
.
Title:
Firewalls 24 seven / Matthew Strebe, Charles Perkins.
Firewalls twenty four seven
24 seven
Twenty four seven
Author:
Strebe, Matthew.
Publication:
Sybex, San Francisco, CA : c2000.
17
.
Title:
Rootkits, spyware/adware, keyloggers and backdoors : detection and neutralization / Oleg Zaytsev.
Author:
Zaytsev, Oleg.
Publication:
A-List, Wayne, Pa. : c2007.
Edition:
1st ed.
18
.
Title:
Network security : private communication in a public world / Charlie Kaufman, Radia Perlman, Mike Speciner.
Prentice Hall series in computer networking and distributed systems
Author:
Kaufman, Charlie.
Publication:
Prentice Hall PTR, Upper Saddle River, NJ : c2002.
Edition:
2nd ed.
19
.
Title:
Cryptology unlocked / Reinhard Wobst ; translated by Angelika Shafir.
Author:
Wobst, Reinhard.
Publication:
John Wiley & Sons, Chichester ; Hoboken, NJ : c2007.
20
.
Title:
Practical intrusion analysis : prevention and detection for the twenty-first century / Ryan Trost.
Author:
Trost, Ryan.
Publication:
Addison-Wesley, Upper Saddle River, NJ : c2010.
Results 1 - 20 of 42
1
2
3
Next
>>
Duplicate Items
Add to My List
Print
Sorts and Limits
Sorts:
None
Author
Publication Date
Publisher
Subject
Title