|
# | نوع المصدر | العنوان | بيانات التأليف / الناشر | سنة النشر |
1. |
كتاب
|
Practical unix and internet security
|
Garfinkel, Simson
Spafford, Gene
|
1996
|
2. |
كتاب
|
Computer security handbook
|
Hutt, Arthur E.
Bosworth, Seymour
Hoyt, Douglas B.
|
1988
|
3. |
كتاب
|
Computer security basics
|
Russell, Deborah
Gangemi, G.T.
|
1991
|
4. |
كتاب
|
Unix system security: how to protect your data and prevent intruders
|
Farrow, Rik
|
1990
|
5. |
كتاب
|
applied cryptography: protocols, algorithms, and source code in C
|
Schneier, Bruce
|
1996
|
6. |
كتاب
|
The stephen cobb complete book of PC and LAN security
|
Cobb, Stephen
|
1990
|
7. |
كتاب
|
Unix security for the organization
|
Bryant, R. Bringle
|
1994
|
8. |
كتاب
|
Java security
|
Mcgraw, Gary
Felten, Edward
|
1996
|
9. |
كتاب
|
Fundamentals of computer security technology
|
Amoroso, Edward G.
|
1994
|
10. |
كتاب
|
Security in computing
|
Pfleeger, Charles P.
|
1997
|
11. |
كتاب
|
Cryptography and network security : principles and practice
|
William Stallings
|
1998
|
12. |
كتاب
|
Introduction to data security and controls
|
Buck, Edward R.
|
1982
|
13. |
كتاب
|
Information and communications security: conference proceedings held in Beijing, China, 11 - 14, November, 1997
|
Han, Yongfei
Okamoto, Tatsuaki
Qing, Sihan
|
1997
|
14. |
كتاب
|
Security protocols: workshop proceedings held in Cambridge, United Kingdom, 10 - 12 April, 1996
|
Lomas, Mark
|
1997
|
15. |
كتاب
|
Information security and privacy: conference proceedings held in Brisbane, Australia, 13 - 15 July, 1998
|
Boyd, Colin
Dawson, Ed
|
1998
|
16. |
كتاب
|
Digital signature schemes: general framework and fail-stop signatures
|
Pfitzmann, Birgit
|
1996
|
17. |
كتاب
|
Hacking exposed: network security, secrets and solutions
|
Scambray, Joel
Mcclure, Stuart
Kurtz, George
|
2001
|
18. |
كتاب
|
MCSE: windows 2000 network security design: exam notes
|
Govanus, Gary
King, Robert
|
2001
|
19. |
كتاب
|
Windows 2000 security handbook
|
Cox, Philip
Sheldon, Tom
|
2001
|
20. |
كتاب
|
Java security handbook
|
Jaworski, Jamie
Perrone, Paul
|
2000
|
21. |
كتاب
|
Windows 2000 user management
|
Sanders, Lori
|
2000
|
22. |
كتاب
|
Hacker attack
|
Mansfield, Richard
|
2000
|
23. |
كتاب
|
Protecting your web site with firewalls
|
Goncalves, Marcus
|
1997
|
24. |
كتاب
|
Firewalls : a complete guide
|
Marcus Goncalves
|
2000
|
25. |
كتاب
|
Practical firewalls
|
Ogletree, Terry William
|
2000
|
26. |
كتاب
|
Developing secure applications with Visual Basic
|
Chapman, Davis
|
2000
|
27. |
كتاب
|
Database nation : the death of privacy in the 21st century
|
Garfinkel, Simon
|
2000
|
28. |
كتاب
|
Decrypted secrets: methods and maxims of cryptography
|
Bauer, Friedrich L.
|
2000
|
29. |
كتاب
|
Information hiding: first international workshop, Cambridge, U.K., May 30 - June 1, 1996: Proceedings
|
Anderson, Ross
|
1996
|
30. |
كتاب
|
Advances in cryptology, 1981-1997: electronic proceedings and index of the crypto and Eurocrypt conferences 1981-1997
|
McCurley, Kevin S.
Ziegler, Claus Dieter
|
1998
|
31. |
كتاب
|
Configuring Windows 2000 server security
|
Syngress Media
|
2000
|
32. |
كتاب
|
IT manager's guide to virtual private networks
|
Clark, David Leon
|
1999
|
33. |
كتاب
|
Cisco network security
|
Pike, James
|
2001
|
34. |
كتاب
|
Security complete
|
SYBEX
|
2001
|
35. |
كتاب
|
Modern cryptography, probabilistic proofs and pseudorandomness
|
Goldreich, Oded
|
1999
|
36. |
كتاب
|
Coding theory, cryptography, and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998
|
Johannes Buchmann ... [et al.], editors
|
2000
|
37. |
كتاب
|
Lectures on data security: modern cryptology in theory and practice
|
Damgard, Ivan
|
1999
|
38. |
كتاب
|
Financial cryptography : First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings
|
Rafael Hirschfeld (ed.)
|
1997
|
39. |
كتاب
|
Information security: first international workshop, ISW'97, Tatsunokuchi, Ishikawa, Japan, September 17-19, 1997: Proceedings
|
Okamoto, Eiji
Davida, George
Mambo, Masahiro
|
1998
|
40. |
كتاب
|
Information security and privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999: Proceedings
|
Pieprzyk, Josef
Safavi-Naini, Rei
Sebervy, Jennifer
|
1999
|
41. |
كتاب
|
Selected areas in cryptography: 5th annual international workshop, SAC'98, Kingstone, Ontario, Canada, August 17-18, 1998: Proceedings
|
Tavares, Stafford
Meijer, Henk
|
1998
|
42. |
كتاب
|
State of the art in applied cryptography:"course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997: revised lectures
|
Preneel, Bart
Rijmen, Vincent
|
1998
|
43. |
كتاب
|
Public key cryptography: second international workshop on practice and theory in public key cryptography, PKC'99, Kamakura, Japan, March, 1-3, 1999: Proc
|
Imai, Hideki
Zheng, Yuliang
|
1999
|
44. |
كتاب
|
Information hiding:"second international workshop, IH'98: Portland, Oregon, USA, April 14-17, 1998: Proceedings
|
Aucsmith, David
|
1998
|
45. |
كتاب
|
Security protocols: 6th international workshop, Cambridge, UK, April 15-17, 1998: proceedings
|
Christianson, Bruce ... [et al.]
|
1999
|
46. |
كتاب
|
Maximum Windows 2000 security
|
Sams
|
2002
|
47. |
كتاب
|
Maximum security
|
Sams
|
2001
|
48. |
كتاب
|
.NET framework security
|
LaMacchia, Brian A....[et al.]
|
2002
|
49. |
كتاب
|
Information security architecture: an integrated approach to security in the organization
|
Tudor, Jan Killmeyer
|
2000
|
50. |
كتاب
|
Information security risk analysis
|
Peltier, Thomas R.
|
2001
|
51. |
كتاب
|
Security management: an introduction
|
P. J. Ortmeier
|
2002
|
52. |
كتاب
|
Security and privacy for e-business
|
Ghosh, Anup K.
|
2001
|
53. |
مشروع تخرج
|
Digital signature
|
Ashraf AL-Khateeb, Noor Al-Qatnani ; supervised by Sattar J. Aboud
|
2002
|
54. |
مشروع تخرج
|
Investigation into : data and system security
|
by Ayman Minawi ; supervisor Souhail Sa'adallah
|
1997
|
55. |
مشروع تخرج
|
Encrypt message using RSA and El gamal schemes
|
prepared by Mohammad Jawarneh, Sa'id Abd Al-Raheem Al-Issa ; supervised by Sattar J. Aboud
|
2003
|
56. |
مشروع تخرج
|
Identification method
|
team work Ahlam Arabiat, Shehab Tamer, Arwa Abdel Rahman ; supervised by Sattar J. Aboud
|
[199-]
|
57. |
مشروع تخرج
|
Juevara encryption method
|
project team Shatha A-Faqeeh, Samer Al-Faqeeh, Ibrahiem Abu-Zer ; supervised by Sattar J. Aboud
|
2002
|
58. |
مشروع تخرج
|
Encryption and decryption
|
Ahmed Alfaleh ... [et al]. ; supervisor Sattar Aboud
|
1999
|
59. |
كتاب
|
Security in computing
|
Charles P. Pfleeger, Shari Lawrence Pfleeger
|
2003
|
60. |
كتاب
|
How secure is your wireless network? safeguarding your Wi-Fi Lan
|
Barken, Lee
|
2004
|
61. |
كتاب
|
PDA security: incorporating handhelds into the enterprise
|
Melnick, David ... [et al.]
|
2003
|
62. |
مجلة أكاديمية
|
Information Management and Computer Security
|
MCB University Press
|
v. 1 (1993)-
|
63. |
كتاب
|
Wireless operational security
|
Rittinghouse, John W.
Ransome, James F.
|
2004
|
64. |
كتاب
|
Public key infrastructure: building trusted applications and web services
|
John R. Vacca
|
2004
|
65. |
كتاب
|
Defend I.T. : security by example
|
Ajay Gupta, Scott Laliberte
|
2004
|
66. |
كتاب
|
Designing network security
|
Merike Kaeo
|
2004
|
67. |
كتاب
|
Software forensics: collecting evidence from the scene of a digital crime
|
Robert M. Slade
|
2004
|
68. |
كتاب
|
ISA server 2004 unleashed
|
Michael Noel
|
2006
|
69. |
كتاب
|
Cisco network security troubleshooting handbook
|
Mynul Hoda
|
2006
|
70. |
كتاب
|
Core security patterns: best practices and strategies for J2EE, Web services and identity management
|
Christopher Steel, Ramesh Nagappan, Ray Lai
|
2005
|
71. |
كتاب
|
A simple guide to security and privacy on your PC
|
Manon Cassade
|
2000
|
72. |
كتاب
|
Administering Windows Vista security: the big surprises
|
Mark Minasi, Byron Hynes
|
2007
|
73. |
كتاب
|
Hacking the Xbox: an introduction to reverse engineering
|
Andrew "Bunnie" Huang
|
2003
|
74. |
كتاب
|
Reversing: secrets of reverse engineering
|
Eldad Eilam
|
2005
|
75. |
كتاب
|
Data protection and information lifecycle management
|
Tom Petrocelli
|
2006
|
76. |
كتاب
|
Microsoft Windows XP networking and security: inside out: also covers Windows 2000
|
Ed Bott, Carl Siechert
|
2006
|
77. |
كتاب
|
Network security: a practical approach
|
Jan L. Harrington
|
2006
|
78. |
كتاب
|
IT governance: a manager's guide to data security and BS 7799-ISO 17799
|
Alan Calder, Steve Watkins
|
2005
|
79. |
كتاب
|
Internet security: a jumpstart for systems administrators and IT managers
|
Tim Speed, Juanita Ellis
|
2003
|
80. |
كتاب
|
Wireless security: models, threats, and solutions
|
Randall K. Nichols, Panos C. Lekkas
|
2006
|
81. |
كتاب
|
Network security: current status and future directions
|
edited by Christos Douligeris, Dimitrios N. Serpanos
|
2007
|
82. |
كتاب
|
Cryptography and network security: principles and practice
|
William Stallings
|
2006
|
83. |
مجلة أكاديمية
|
Security and communication networks
|
John Wiley & Sons, Ltd.
|
Vol. 1, no. 1 (Jan.- Feb. 2008)-
|
84. |
كتاب
|
Cisco ASA, PIX, and FWSM firewall handbook
|
David Hucaby
|
2008
|
85. |
كتاب
|
The security development lifecycle : SDL, a process for developing demonstrably more secure software
|
Michael Howard and Steve Lipner
|
2006
|
86. |
كتاب
|
Software security : building security in
|
Gary McGraw
|
2006
|
87. |
كتاب
|
CEH : certified ethical hacker study guide
|
Kimberly Graves
|
2010
|
88. |
كتاب
|
Gray hat hacking : the ethical hacker’s handbook
|
Allen Harper ... [et al.].
|
2011
|
89. |
كتاب
|
Computer security: principles and practice
|
William Stallings, Lawrie Brown; with contributions by Mick Bauer, Michael Howard
|
2008
|
90. |
مصدر الكتروني
|
Best antivirus collection [electronic resource]
|
[s.n]
|
[-2000]
|
91. |
كتاب
|
Information security and cyber laws
|
Pankaj Sharma, Ashwin Perti
|
2010
|
92. |
كتاب
|
Information security and cyber laws
|
Pankaj Sharma
|
2011
|
93. |
كتاب
|
The art of enterprise information architecture: a systems-based approach for unlocking business insight
|
Mario Godinez ... [et al.]
|
2010
|
94. |
كتاب
|
Information security: principles and practice
|
Mark Stamp
|
2011
|
95. |
كتاب
|
Business data networks and security
|
Raymond R. Panko, Julia L. Panko
|
2013
|
96. |
كتاب
|
Principles of information security
|
Michael E. Whitman, Herbert J. Mattord
|
2013
|
97. |
كتاب
|
Security and computer: management strategy
|
Union of Arab Banks
|
1987
|
98. |
كتاب
|
Network security
|
Neha Ghai
|
2012
|
99. |
كتاب
|
Network security : private communication in a public world
|
Charlie Kaufman, Radia Perlman, Mike Speciner
|
2013
|
100. |
كتاب
|
Core banking solution : evaluation of security and controls
|
M. Revathy Sriram
|
2013
|
101. |
كتاب
|
Information security and cyber laws
|
Sanjeev Puri
|
2014
|
102. |
كتاب
|
Computer and information security handbook
|
edited by John R. Vacca
|
2013
|
103. |
كتاب
|
Introduction to computer security
|
Michael Goodrich, Roberto Tamassia
|
2014
|
104. |
كتاب
|
Network security essentials : applications and standards
|
William Stallings
|
2014
|
105. |
كتاب
|
Computer forensics : infoSec Pro guide
|
David Cowen
|
2013
|
106. |
كتاب
|
Security + guide to network security fundamentals
|
Mark Ciampa
|
2012
|
107. |
كتاب
|
Handbook of research on emerging developments in data privacy
|
Manish Gupta, editor
|
2015
|
108. |
كتاب
|
Securing the virtual environment : how to defend the enterprise against attack
|
Davi Ottenheimer, Matthew Wallace
|
2012
|
109. |
كتاب
|
CompTIA security + (Exam SYO-301) : training kit
|
David Seidl, Mike Chapple, James Michael
|
2014
|
110. |
كتاب
|
Network security
|
Neha Ghai
|
2013
|
111. |
كتاب
|
Information security management handbook
|
edited by Harold F. Tipton, Micki Krause Nozaki
|
2012
|
112. |
كتاب
|
Computer security: principles and practice
|
William Stallings, Lawrie Brown
|
2015
|
113. |
كتاب
|
Cryptography and network security: principles and practice
|
William Stallings; international edition contributions by Mohit P. Tahiliani
|
2014
|
114. |
كتاب
|
Core software security : security at the source
|
James Ransome and Anmol Misra
|
2014
|
115. |
كتاب
|
Secure and resilient software development
|
Mark S. Merkow, Lakshmikanth Raghavan
|
2010
|
116. |
كتاب
|
Secure software design
|
Theodor Richardson, Charles N. Thies
|
2013
|
117. |
كتاب
|
Principles of information security
|
Michael E. Whitman, Herbert J. Mattord
|
2016
|
118. |
كتاب
|
The web application : hacker's handbook
|
Dafydd Stuttard, Marcus Pinto
|
2011
|
119. |
كتاب
|
Computer security fundamentals
|
Chuck Easttom
|
2016
|
120. |
كتاب
|
Security + guide to network security fundamentals
|
Mark Ciampa
|
2018
|
121. |
كتاب
|
Foundations of information security : a straightforward introduction
|
Jason Andress
|
2019
|
122. |
كتاب
|
Security of web developers
|
John Paul Mueller
|
2016
|
123. |
كتاب
|
Security + guide to network security fundamentals
|
Mark Ciampa
|
2012
|
124. |
كتاب
|
Fintech law in a nutshell
|
Chris Brummer
|
2020
|
125. |
كتاب
|
Cybersecurity risk management : mastering the fundamentals using the NIST cybersecurity framework
|
Cynthia Brumfield, Brian Haugli
|
2022
|
126. |
كتاب
|
Information security: principles and practice
|
Mark Stamp
|
2022
|
127. |
كتاب
|
Cryptography and network security: principles and practice
|
William Stallings; international edition contributions by Mohit P. Tahiliani
|
2023
|
128. |
كتاب
|
Fintech : hacking, blockchain, big data, cryptocurrency (financial technology, smart contracts, digital banking, Internet technology)
|
Eliot P. Reznor
|
2017
|
129. |
كتاب
|
Fundamentals of information systems security
|
David Kim, Michael G. Solomon
|
2023
|
|