Online Catalog - List of Record(s) Retrieved
Philadelphia   University
Library & Information Resources
 

Technical   Services   Department
Online Catalog - Record(s) Retrieved

 
Date:17/05/24


Search Query:Subject Computer security
Original Number of Retrieved Title(s):129

#TypeTitleAuther(s)\ Publisher Pub. Year
1.  Book Practical unix and internet security

Garfinkel, Simson
Spafford, Gene

1996
2.  Book Computer security handbook

Hutt, Arthur E.
Bosworth, Seymour
Hoyt, Douglas B.

1988
3.  Book Computer security basics

Russell, Deborah
Gangemi, G.T.

1991
4.  Book Unix system security: how to protect your data and prevent intruders

Farrow, Rik

1990
5.  Book applied cryptography: protocols, algorithms, and source code in C

Schneier, Bruce

1996
6.  Book The stephen cobb complete book of PC and LAN security

Cobb, Stephen

1990
7.  Book Unix security for the organization

Bryant, R. Bringle

1994
8.  Book Java security

Mcgraw, Gary
Felten, Edward

1996
9.  Book Fundamentals of computer security technology

Amoroso, Edward G.

1994
10.  Book Security in computing

Pfleeger, Charles P.

1997
11.  Book Cryptography and network security : principles and practice

William Stallings

1998
12.  Book Introduction to data security and controls

Buck, Edward R.

1982
13.  Book Information and communications security: conference proceedings held in Beijing, China, 11 - 14, November, 1997

Han, Yongfei
Okamoto, Tatsuaki
Qing, Sihan

1997
14.  Book Security protocols: workshop proceedings held in Cambridge, United Kingdom, 10 - 12 April, 1996

Lomas, Mark

1997
15.  Book Information security and privacy: conference proceedings held in Brisbane, Australia, 13 - 15 July, 1998

Boyd, Colin
Dawson, Ed

1998
16.  Book Digital signature schemes: general framework and fail-stop signatures

Pfitzmann, Birgit

1996
17.  Book Hacking exposed: network security, secrets and solutions

Scambray, Joel
Mcclure, Stuart
Kurtz, George

2001
18.  Book MCSE: windows 2000 network security design: exam notes

Govanus, Gary
King, Robert

2001
19.  Book Windows 2000 security handbook

Cox, Philip
Sheldon, Tom

2001
20.  Book Java security handbook

Jaworski, Jamie
Perrone, Paul

2000
21.  Book Windows 2000 user management

Sanders, Lori

2000
22.  Book Hacker attack

Mansfield, Richard

2000
23.  Book Protecting your web site with firewalls

Goncalves, Marcus

1997
24.  Book Firewalls : a complete guide

Marcus Goncalves

2000
25.  Book Practical firewalls

Ogletree, Terry William

2000
26.  Book Developing secure applications with Visual Basic

Chapman, Davis

2000
27.  Book Database nation : the death of privacy in the 21st century

Garfinkel, Simon

2000
28.  Book Decrypted secrets: methods and maxims of cryptography

Bauer, Friedrich L.

2000
29.  Book Information hiding: first international workshop, Cambridge, U.K., May 30 - June 1, 1996: Proceedings

Anderson, Ross

1996
30.  Book Advances in cryptology, 1981-1997: electronic proceedings and index of the crypto and Eurocrypt conferences 1981-1997

McCurley, Kevin S.
Ziegler, Claus Dieter

1998
31.  Book Configuring Windows 2000 server security

Syngress Media

2000
32.  Book IT manager's guide to virtual private networks

Clark, David Leon

1999
33.  Book Cisco network security

Pike, James

2001
34.  Book Security complete

SYBEX

2001
35.  Book Modern cryptography, probabilistic proofs and pseudorandomness

Goldreich, Oded

1999
36.  Book Coding theory, cryptography, and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998

Johannes Buchmann ... [et al.], editors

2000
37.  Book Lectures on data security: modern cryptology in theory and practice

Damgard, Ivan

1999
38.  Book Financial cryptography : First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings

Rafael Hirschfeld (ed.)

1997
39.  Book Information security: first international workshop, ISW'97, Tatsunokuchi, Ishikawa, Japan, September 17-19, 1997: Proceedings

Okamoto, Eiji
Davida, George
Mambo, Masahiro

1998
40.  Book Information security and privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999: Proceedings

Pieprzyk, Josef
Safavi-Naini, Rei
Sebervy, Jennifer

1999
41.  Book Selected areas in cryptography: 5th annual international workshop, SAC'98, Kingstone, Ontario, Canada, August 17-18, 1998: Proceedings

Tavares, Stafford
Meijer, Henk

1998
42.  Book State of the art in applied cryptography:"course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997: revised lectures

Preneel, Bart
Rijmen, Vincent

1998
43.  Book Public key cryptography: second international workshop on practice and theory in public key cryptography, PKC'99, Kamakura, Japan, March, 1-3, 1999: Proc

Imai, Hideki
Zheng, Yuliang

1999
44.  Book Information hiding:"second international workshop, IH'98: Portland, Oregon, USA, April 14-17, 1998: Proceedings

Aucsmith, David

1998
45.  Book Security protocols: 6th international workshop, Cambridge, UK, April 15-17, 1998: proceedings

Christianson, Bruce ... [et al.]

1999
46.  Book Maximum Windows 2000 security

Sams

2002
47.  Book Maximum security

Sams

2001
48.  Book .NET framework security

LaMacchia, Brian A....[et al.]

2002
49.  Book Information security architecture: an integrated approach to security in the organization

Tudor, Jan Killmeyer

2000
50.  Book Information security risk analysis

Peltier, Thomas R.

2001
51.  Book Security management: an introduction

P. J. Ortmeier

2002
52.  Book Security and privacy for e-business

Ghosh, Anup K.

2001
53.  G-project Digital signature

Ashraf AL-Khateeb, Noor Al-Qatnani ; supervised by Sattar J. Aboud

2002
54.  G-project Investigation into : data and system security

by Ayman Minawi ; supervisor Souhail Sa'adallah

1997
55.  G-project Encrypt message using RSA and El gamal schemes

prepared by Mohammad Jawarneh, Sa'id Abd Al-Raheem Al-Issa ; supervised by Sattar J. Aboud

2003
56.  G-project Identification method

team work Ahlam Arabiat, Shehab Tamer, Arwa Abdel Rahman ; supervised by Sattar J. Aboud

[199-]
57.  G-project Juevara encryption method

project team Shatha A-Faqeeh, Samer Al-Faqeeh, Ibrahiem Abu-Zer ; supervised by Sattar J. Aboud

2002
58.  G-project Encryption and decryption

Ahmed Alfaleh ... [et al]. ; supervisor Sattar Aboud

1999
59.  Book Security in computing

Charles P. Pfleeger, Shari Lawrence Pfleeger

2003
60.  Book How secure is your wireless network? safeguarding your Wi-Fi Lan

Barken, Lee

2004
61.  Book PDA security: incorporating handhelds into the enterprise

Melnick, David ... [et al.]

2003
62.  Journal Information Management and Computer Security

MCB University Press

v. 1 (1993)-
63.  Book Wireless operational security

Rittinghouse, John W.
Ransome, James F.

2004
64.  Book Public key infrastructure: building trusted applications and web services

John R. Vacca

2004
65.  Book Defend I.T. : security by example

Ajay Gupta, Scott Laliberte

2004
66.  Book Designing network security

Merike Kaeo

2004
67.  Book Software forensics: collecting evidence from the scene of a digital crime

Robert M. Slade

2004
68.  Book ISA server 2004 unleashed

Michael Noel

2006
69.  Book Cisco network security troubleshooting handbook

Mynul Hoda

2006
70.  Book Core security patterns: best practices and strategies for J2EE, Web services and identity management

Christopher Steel, Ramesh Nagappan, Ray Lai

2005
71.  Book A simple guide to security and privacy on your PC

Manon Cassade

2000
72.  Book Administering Windows Vista security: the big surprises

Mark Minasi, Byron Hynes

2007
73.  Book Hacking the Xbox: an introduction to reverse engineering

Andrew "Bunnie" Huang

2003
74.  Book Reversing: secrets of reverse engineering

Eldad Eilam

2005
75.  Book Data protection and information lifecycle management

Tom Petrocelli

2006
76.  Book Microsoft Windows XP networking and security: inside out: also covers Windows 2000

Ed Bott, Carl Siechert

2006
77.  Book Network security: a practical approach

Jan L. Harrington

2006
78.  Book IT governance: a manager's guide to data security and BS 7799-ISO 17799

Alan Calder, Steve Watkins

2005
79.  Book Internet security: a jumpstart for systems administrators and IT managers

Tim Speed, Juanita Ellis

2003
80.  Book Wireless security: models, threats, and solutions

Randall K. Nichols, Panos C. Lekkas

2006
81.  Book Network security: current status and future directions

edited by Christos Douligeris, Dimitrios N. Serpanos

2007
82.  Book Cryptography and network security: principles and practice

William Stallings

2006
83.  Journal Security and communication networks

John Wiley & Sons, Ltd.

Vol. 1, no. 1 (Jan.- Feb. 2008)-
84.  Book Cisco ASA, PIX, and FWSM firewall handbook

David Hucaby

2008
85.  Book The security development lifecycle : SDL, a process for developing demonstrably more secure software

Michael Howard and Steve Lipner

2006
86.  Book Software security : building security in

Gary McGraw

2006
87.  Book CEH : certified ethical hacker study guide

Kimberly Graves

2010
88.  Book Gray hat hacking : the ethical hacker’s handbook

Allen Harper ... [et al.].

2011
89.  Book Computer security: principles and practice

William Stallings, Lawrie Brown; with contributions by Mick Bauer, Michael Howard

2008
90.  eResource Best antivirus collection [electronic resource]

[s.n]

[-2000]
91.  Book Information security and cyber laws

Pankaj Sharma, Ashwin Perti

2010
92.  Book Information security and cyber laws

Pankaj Sharma

2011
93.  Book The art of enterprise information architecture: a systems-based approach for unlocking business insight

Mario Godinez ... [et al.]

2010
94.  Book Information security: principles and practice

Mark Stamp

2011
95.  Book Business data networks and security

Raymond R. Panko, Julia L. Panko

2013
96.  Book Principles of information security

Michael E. Whitman, Herbert J. Mattord

2013
97.  Book Security and computer: management strategy

Union of Arab Banks

1987
98.  Book Network security

Neha Ghai

2012
99.  Book Network security : private communication in a public world

Charlie Kaufman, Radia Perlman, Mike Speciner

2013
100.  Book Core banking solution : evaluation of security and controls

M. Revathy Sriram

2013
101.  Book Information security and cyber laws

Sanjeev Puri

2014
102.  Book Computer and information security handbook

edited by John R. Vacca

2013
103.  Book Introduction to computer security

Michael Goodrich, Roberto Tamassia

2014
104.  Book Network security essentials : applications and standards

William Stallings

2014
105.  Book Computer forensics : infoSec Pro guide

David Cowen

2013
106.  Book Security + guide to network security fundamentals

Mark Ciampa

2012
107.  Book Handbook of research on emerging developments in data privacy

Manish Gupta, editor

2015
108.  Book Securing the virtual environment : how to defend the enterprise against attack

Davi Ottenheimer, Matthew Wallace

2012
109.  Book CompTIA security + (Exam SYO-301) : training kit

David Seidl, Mike Chapple, James Michael

2014
110.  Book Network security

Neha Ghai

2013
111.  Book Information security management handbook

edited by Harold F. Tipton, Micki Krause Nozaki

2012
112.  Book Computer security: principles and practice

William Stallings, Lawrie Brown

2015
113.  Book Cryptography and network security: principles and practice

William Stallings; international edition contributions by Mohit P. Tahiliani

2014
114.  Book Core software security : security at the source

James Ransome and Anmol Misra

2014
115.  Book Secure and resilient software development

Mark S. Merkow, Lakshmikanth Raghavan

2010
116.  Book Secure software design

Theodor Richardson, Charles N. Thies

2013
117.  Book Principles of information security

Michael E. Whitman, Herbert J. Mattord

2016
118.  Book The web application : hacker's handbook

Dafydd Stuttard, Marcus Pinto

2011
119.  Book Computer security fundamentals

Chuck Easttom

2016
120.  Book Security + guide to network security fundamentals

Mark Ciampa

2018
121.  Book Foundations of information security : a straightforward introduction

Jason Andress

2019
122.  Book Security of web developers

John Paul Mueller

2016
123.  Book Security + guide to network security fundamentals

Mark Ciampa

2012
124.  Book Fintech law in a nutshell

Chris Brummer

2020
125.  Book Cybersecurity risk management : mastering the fundamentals using the NIST cybersecurity framework

Cynthia Brumfield, Brian Haugli

2022
126.  Book Information security: principles and practice

Mark Stamp

2022
127.  Book Cryptography and network security: principles and practice

William Stallings; international edition contributions by Mohit P. Tahiliani

2023
128.  Book Fintech : hacking, blockchain, big data, cryptocurrency (financial technology, smart contracts, digital banking, Internet technology)

Eliot P. Reznor

2017
129.  Book Fundamentals of information systems security

David Kim, Michael G. Solomon

2023



For more info.:  Tel: +962-6-4799000  Technical  Services Department Ext.2377  Email: Libraryatphiladelphia.edu.jo