Refine your search

Your search returned 65 results.

Not what you expected? Check for suggestions
Sort
Results
PRINT
The security risk assessment handbook : a complete guide for performing security risk assessments Douglas J. Landoll by
Material type: Text Text
Language: English
Publication details: Auerbach ; Boca Raton , Fla. ; 2006; c2006
Availability: Items available for loan: المكتبة الرئيسية (1)Location, call number: الطابق الثالث أ HF5548.37.L36 2006.

PRINT
Information systems for managers : text & cases Gabriele Piccoli by
Edition: 2nd ed.
Material type: Text Text
Language: English
Publication details: Wiley ; Hoboken, N.J. ; 2012; c2012
Availability: Items available for loan: المكتبة الرئيسية (1)Location, call number: الطابق الثالث أ HD30.213.P526 2012.

PRINT
The art of software security assessment : identifying and preventing software vulnerabilities Mark Dowd , John McDonald , Justin Schuh by
Material type: Text Text
Language: English
Publication details: Addison-Wesley ; Upper Saddle River , N.J. ; 2007; c2007
Availability: Items available for loan: المكتبة الرئيسية (1)Location, call number: الطابق الثاني أ QA76.9.A25D69 2007.

Yamen cryptosystem : an enhanced RSA by using Rabin algorithm and Huffman coding نظام التشفير يامن : آر إس إيه المعزز باستخدام خوارزمية رابين و ترميز هافمان Abdallah Karakra ; supervisor Ahmad Asadeh by
Material type: Text Text
Language: English
Publication details: 2015; 2015
Dissertation note: 000750M2015
Availability: Items available for loan: المكتبة الرئيسية (2)Location, call number: غرفة رسائل الماجستير و الدكتوراة - الطابق الرئيسي QA76.9.A25K37 2015, ...

PRINT
Securing the GCC in cyberspace Richard A. Clarke , Robert K. Knake by Series: Emirates lecture series. 83 ;
Material type: Text Text
Language: English
Publication details: The Emirates Center for Strategic Studies and Research ; Abu Dhabi ; 2010; 2010
Availability: Items available for loan: المكتبة / مبنى سعيد خوري لدراسات التنمية (1)Location, call number: معهد أبولغد للدراسات الدولية TK5105.59.C57 2010.

Intrusion detection system using feature ranking and GWO / Ameer Nasrallah ; supervisor Iyad Tumar. by
Material type: Text Text; Format: print ; Literary form: Not fiction
Language: English
Publication details: 2020
Dissertation note: M Birzeit University 2020 Thesis (M.S.)(Computing)
Other title:
  • نظام الكشف عن الإختراقات باستخدام أسلوب تصنيف السمات و خوارزمية قطيع الذئاب الرمادية /
Availability: Items available for loan: المكتبة الرئيسية (2)Location, call number: غرفة رسائل الماجستير و الدكتوراة - الطابق الرئيسي TK5105.59.N37 2020, ...

PRINT
Cryptography and network security : principles and practices William Stallings by Series: Stallings , William . William Stallings books on Computer and data communications technology
Edition: 4th ed.
Material type: Text Text
Language: English
Publication details: Pearson/Prentice Hall ; Upper Saddle River, N. J. ; 2006; c2006
Availability: Items available for loan: المكتبة الرئيسية (1)Location, call number: الطابق الثاني ب TK5105.59.S72 2006.

PRINT
The art of software security testing : identifying software security flaws Chris Wysopal ... [et al.] by
Material type: Text Text
Language: English
Publication details: Addison-Wesley ; Upper Saddle River, N. J. ; 2007; c2007
Availability: Items available for loan: المكتبة الرئيسية (1)Location, call number: الطابق الثاني أ QA76.9.A25A78 2007.

PRINT
The hazards of the international energy crisis : studies of the coming struggle for energy and strategic raw materials edited by David Carlton and Carlo Schaerf by
Material type: Text Text
Language: English
Publication details: Macmillan ; London ; 1982; c1982
Availability: Items available for loan: المكتبة الرئيسية (1)Location, call number: الطابق الثالث أ HD9502.A2I588 1982.

PRINT
Nuclear safeguards analysis : nondestructive and analytical chemical techniques : based on a symposium sponsored by the Division of Nuclear Chemistry and Technology at the 175th meeting of the American Chemical Society by Series: ACS symposium series. 79 ;
Material type: Text Text
Language: English
Publication details: American Chemical Society ; Washington ; 1978; 1978
Availability: Items available for loan: المكتبة الرئيسية (1)Location, call number: الطابق الثاني ب TK9360.N854 1978. مكتبة معهد الحقوق (2)Location, call number: قــــانون البيئـــة TK9360.N854 1978, ...

PRINT
Secrets and lies : digital security in a networked world Bruce Schneier by
Material type: Text Text
Language: English
Publication details: Wiley ; Indianapolis ; 2004; c2000
Availability: Items available for loan: المكتبة الرئيسية (1)Location, call number: الطابق الثاني أ QA76.9.A25S352 2000.

PRINT
International cooperation in nuclear energy Joseph A. Yager , with the assistance of Ralph T. Mabry , Jr. by
Material type: Text Text
Language: English
Publication details: Brookings ; Washington , D.C. ; 1981; c1981
Availability: Items available for loan: المكتبة الرئيسية (1)Location, call number: الطابق الثالث أ HD9698.A2Y34.

PRINT
Computer insecurity / Adrian R.D. Norman. by
Material type: Text Text
Language: English
Publication details: Chapman and Hall ; London ; 1983; 1983
Availability: Items available for loan: المكتبة الرئيسية (1)Location, call number: الطابق الثالث أ HF5548.2.N575 1983.

PRINT
Total information risk management : maximizing the value of data and information assets Alexander Borek ... [et al.] by
Edition: 1st ed.
Material type: Text Text
Language: English
Publication details: Elsevier/ Morgan Kaufmann ; Amsterdam ; 2014; c2014
Availability: Items available for loan: المكتبة الرئيسية (1)Location, call number: الطابق الثالث أ HF54.5.T68 2014.

PRINT
Web services : principles and technology Michael P. Papazoglou by
Material type: Text Text
Language: English
Publication details: Person/Prentice Hall ; Harlow, England ; 2008; c2008
Availability: Items available for loan: المكتبة الرئيسية (1)Location, call number: الطابق الثاني ب TK5105.88813.P37 2008.

PRINT
Terrorist threats to food : guidance for establishing and strengthening prevention and response systems by Series: Food safety issues ;
Material type: Text Text
Language: English
Publication details: World Health Organization Food Safety Department ; Geneva / Switzerland ; 2002; 2002
Availability: Items available for loan: المكتبة / مبنى سعيد خوري لدراسات التنمية (1)Location, call number: TX531.T47 2002.

PRINT
Managing information security editor John R. Vacca by
Material type: Text Text
Language: English
Publication details: Elsevier/Syngress ; Amsterdam ; 2010; c2010
Availability: Items available for loan: المكتبة الرئيسية (1)Location, call number: الطابق الثاني أ QA76.9.A25M326 2010.

CompTIA security+ : deluxe study guide CompTIA security + deluxe study guide : exam SYO 401 Emmett Dulaney by
Edition: 3rd ed.
Material type: Text Text
Language: English
Publication details: Sybex/Wiley ; Indianapolis, Ind. ; 2015; c2015
Availability: Items available for loan: المكتبة الرئيسية (1)Location, call number: الطابق الثاني أ QA76.3.D82279 2015.

PRINT
Internal security issues in an interim agreement by Series: Israel / Palestine : issues in conflict , issues for cooperation | . v.2, no.1
Material type: Text Text
Language: English
Publication details: Israel/Palestine Center for Research and Information ; Jerusalem ; 1993; 1993
Availability: Items available for loan: المكتبة الرئيسية (1)Location, call number: غرفة المجموعات الخاصة - الطابق الثاني DS119.7.I4846 1993.

Efficient elliptic curve cryptosystems using efficient exponentiation by Kamal Darweesh; supervisor Mohammad Saleh by
Material type: Text Text
Language: English
Publication details: 2006
Dissertation note: 000750M2006
Availability: Items available for loan: المكتبة الرئيسية (2)Location, call number: غرفة رسائل الماجستير و الدكتوراة - الطابق الرئيسي QA567.2.E44D37 2006, ...

Pages

Powered by Koha