الفهرس الإلكتروني - السجلات المسترجعة
جامعة   فيلادلفـــــيا
المكتبة ومصادر المعلومات
 

قسم الخدمات الفنية
الفهرس الإلكتروني - السجلات المسترجعة

 
التاريخ:


أنماط التوثيق

كتاب/ مرجع

The stephen cobb complete book of PC and LAN security

APA 

(1990). The stephen cobb complete book of PC and LAN security, N.Y: Windcrest.

MLA 

The stephen cobb complete book of PC and LAN security. N.Y: Windcrest, 1990.

Harvard 

1990. The stephen cobb complete book of PC and LAN security. Windcrest,

Chicago 

The stephen cobb complete book of PC and LAN security. Windcrest, 1990.

كتاب/ مرجع

Cryptography and network security : principles and practice

APA 

(1998). Cryptography and network security : principles and practice, Upper Saddle River, New Jersey: Prentice Hall.

MLA 

Cryptography and network security : principles and practice. Upper Saddle River, New Jersey: Prentice Hall, 1998.

Harvard 

1998. Cryptography and network security : principles and practice. Prentice Hall,

Chicago 

Cryptography and network security : principles and practice. Prentice Hall, 1998.

كتاب/ مرجع

Hacking exposed: network security, secrets and solutions

APA 

(2001). Hacking exposed: network security, secrets and solutions, Berkeley: Osborne/ McGraw - Hill.

MLA 

Hacking exposed: network security, secrets and solutions. Berkeley: Osborne/ McGraw - Hill, 2001.

Harvard 

2001. Hacking exposed: network security, secrets and solutions. Osborne/ McGraw - Hill,

Chicago 

Hacking exposed: network security, secrets and solutions. Osborne/ McGraw - Hill, 2001.

كتاب/ مرجع

Windows 2000 security handbook

APA 

(2001). Windows 2000 security handbook, Berkeley, California: Osborne/ McGraw - Hill.

MLA 

Windows 2000 security handbook. Berkeley, California: Osborne/ McGraw - Hill, 2001.

Harvard 

2001. Windows 2000 security handbook. Osborne/ McGraw - Hill,

Chicago 

Windows 2000 security handbook. Osborne/ McGraw - Hill, 2001.

كتاب/ مرجع

Windows 2000 user management

APA 

(2000). Windows 2000 user management, Indianapolis, Indiana: New Riders.

MLA 

Windows 2000 user management. Indianapolis, Indiana: New Riders, 2000.

Harvard 

2000. Windows 2000 user management. New Riders,

Chicago 

Windows 2000 user management. New Riders, 2000.

كتاب/ مرجع

Firewalls : a complete guide

APA 

(2000). Firewalls : a complete guide, New York: McGraw - Hill.

MLA 

Firewalls : a complete guide. New York: McGraw - Hill, 2000.

Harvard 

2000. Firewalls : a complete guide. McGraw - Hill,

Chicago 

Firewalls : a complete guide. McGraw - Hill, 2000.

كتاب/ مرجع

Practical firewalls

APA 

(2000). Practical firewalls, Indianapolis, Indiana: Que.

MLA 

Practical firewalls. Indianapolis, Indiana: Que, 2000.

Harvard 

2000. Practical firewalls. Que,

Chicago 

Practical firewalls. Que, 2000.

كتاب/ مرجع

Configuring Windows 2000 server security

APA 

(2000). Configuring Windows 2000 server security, Rockland, MA: Syngress Media.

MLA 

Configuring Windows 2000 server security. Rockland, MA: Syngress Media, 2000.

Harvard 

2000. Configuring Windows 2000 server security. Syngress Media,

Chicago 

Configuring Windows 2000 server security. Syngress Media, 2000.

كتاب/ مرجع

IT manager's guide to virtual private networks

APA 

(1999). IT manager's guide to virtual private networks, New York: McGraw - Hill.

MLA 

IT manager's guide to virtual private networks. New York: McGraw - Hill, 1999.

Harvard 

1999. IT manager's guide to virtual private networks. McGraw - Hill,

Chicago 

IT manager's guide to virtual private networks. McGraw - Hill, 1999.

كتاب/ مرجع

Cisco network security

APA 

(2001). Cisco network security, Upper Saddle River, New Jersey: Prentice - Hall.

MLA 

Cisco network security. Upper Saddle River, New Jersey: Prentice - Hall, 2001.

Harvard 

2001. Cisco network security. Prentice - Hall,

Chicago 

Cisco network security. Prentice - Hall, 2001.

كتاب/ مرجع

Security complete

APA 

(2001). Security complete, San Francisco: SYBEX.

MLA 

Security complete. San Francisco: SYBEX, 2001.

Harvard 

2001. Security complete. SYBEX,

Chicago 

Security complete. SYBEX, 2001.

كتاب/ مرجع

Financial cryptography : First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings

APA 

(1997). Financial cryptography : First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings, Berlin: Springer.

MLA 

Financial cryptography : First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings. Berlin: Springer, 1997.

Harvard 

1997. Financial cryptography : First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings. Springer,

Chicago 

Financial cryptography : First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings. Springer, 1997.

كتاب/ مرجع

Maximum security

APA 

(2001). Maximum security, Indianapolis, Indiana: Sams.

MLA 

Maximum security. Indianapolis, Indiana: Sams, 2001.

Harvard 

2001. Maximum security. Sams,

Chicago 

Maximum security. Sams, 2001.

كتاب/ مرجع

Information security risk analysis

APA 

(2001). Information security risk analysis, Boca Raton: Auerbach.

MLA 

Information security risk analysis. Boca Raton: Auerbach, 2001.

Harvard 

2001. Information security risk analysis. Auerbach,

Chicago 

Information security risk analysis. Auerbach, 2001.

كتاب/ مرجع

Security and privacy for e-business

APA 

(2001). Security and privacy for e-business, New York: John Wiley and Sons, Inc..

MLA 

Security and privacy for e-business. New York: John Wiley and Sons, Inc., 2001.

Harvard 

2001. Security and privacy for e-business. John Wiley and Sons, Inc.,

Chicago 

Security and privacy for e-business. John Wiley and Sons, Inc., 2001.

كتاب/ مرجع

How secure is your wireless network? safeguarding your Wi-Fi Lan

APA 

(2004). How secure is your wireless network? safeguarding your Wi-Fi Lan, Upper Saddle River, New Jersey: Prentice Hall.

MLA 

How secure is your wireless network? safeguarding your Wi-Fi Lan. Upper Saddle River, New Jersey: Prentice Hall, 2004.

Harvard 

2004. How secure is your wireless network? safeguarding your Wi-Fi Lan. Prentice Hall,

Chicago 

How secure is your wireless network? safeguarding your Wi-Fi Lan. Prentice Hall, 2004.

كتاب/ مرجع

Wireless operational security

APA 

(2004). Wireless operational security, Amsterdam: Elsevier.

MLA 

Wireless operational security. Amsterdam: Elsevier, 2004.

Harvard 

2004. Wireless operational security. Elsevier,

Chicago 

Wireless operational security. Elsevier, 2004.

كتاب/ مرجع

Public key infrastructure: building trusted applications and web services

APA 

(2004). Public key infrastructure: building trusted applications and web services , Bocca Raton: Auerbach Publications.

MLA 

Public key infrastructure: building trusted applications and web services . Bocca Raton: Auerbach Publications, 2004.

Harvard 

2004. Public key infrastructure: building trusted applications and web services. Auerbach Publications,

Chicago 

Public key infrastructure: building trusted applications and web services. Auerbach Publications, 2004.

كتاب/ مرجع

Defend I.T. : security by example

APA 

(2004). Defend I.T. : security by example, Boston: Addison-Wesley.

MLA 

Defend I.T. : security by example. Boston: Addison-Wesley, 2004.

Harvard 

2004. Defend I.T. : security by example. Addison-Wesley,

Chicago 

Defend I.T. : security by example. Addison-Wesley, 2004.

كتاب/ مرجع

Designing network security

APA 

(2004). Designing network security, Indianapolis, Indiana: Cisco Press.

MLA 

Designing network security. Indianapolis, Indiana: Cisco Press, 2004.

Harvard 

2004. Designing network security. Cisco Press,

Chicago 

Designing network security. Cisco Press, 2004.

كتاب/ مرجع

Cisco network security troubleshooting handbook

APA 

(2006). Cisco network security troubleshooting handbook, Indianapolis, Indiana: Cisco Press.

MLA 

Cisco network security troubleshooting handbook. Indianapolis, Indiana: Cisco Press, 2006.

Harvard 

2006. Cisco network security troubleshooting handbook. Cisco Press,

Chicago 

Cisco network security troubleshooting handbook. Cisco Press, 2006.

كتاب/ مرجع

A simple guide to security and privacy on your PC

APA 

(2000). A simple guide to security and privacy on your PC, Harlow: Prentice Hall.

MLA 

A simple guide to security and privacy on your PC. Harlow: Prentice Hall, 2000.

Harvard 

2000. A simple guide to security and privacy on your PC. Prentice Hall,

Chicago 

A simple guide to security and privacy on your PC. Prentice Hall, 2000.

كتاب/ مرجع

Microsoft Windows XP networking and security: inside out: also covers Windows 2000

APA 

(2006). Microsoft Windows XP networking and security: inside out: also covers Windows 2000, New Delhi: Prentice Hall of India.

MLA 

Microsoft Windows XP networking and security: inside out: also covers Windows 2000. New Delhi: Prentice Hall of India, 2006.

Harvard 

2006. Microsoft Windows XP networking and security: inside out: also covers Windows 2000. Prentice Hall of India,

Chicago 

Microsoft Windows XP networking and security: inside out: also covers Windows 2000. Prentice Hall of India, 2006.

كتاب/ مرجع

Network security: a practical approach

APA 

(2006). Network security: a practical approach, New Delhi: Elsevier.

MLA 

Network security: a practical approach. New Delhi: Elsevier, 2006.

Harvard 

2006. Network security: a practical approach. Elsevier,

Chicago 

Network security: a practical approach. Elsevier, 2006.

كتاب/ مرجع

IT governance: a manager's guide to data security and BS 7799-ISO 17799

APA 

(2005). IT governance: a manager's guide to data security and BS 7799-ISO 17799 , London: Kogan Page.

MLA 

IT governance: a manager's guide to data security and BS 7799-ISO 17799 . London: Kogan Page, 2005.

Harvard 

2005. IT governance: a manager's guide to data security and BS 7799-ISO 17799. Kogan Page,

Chicago 

IT governance: a manager's guide to data security and BS 7799-ISO 17799. Kogan Page, 2005.

كتاب/ مرجع

Internet security: a jumpstart for systems administrators and IT managers

APA 

(2003). Internet security: a jumpstart for systems administrators and IT managers , New Delhi: Digital Press.

MLA 

Internet security: a jumpstart for systems administrators and IT managers . New Delhi: Digital Press, 2003.

Harvard 

2003. Internet security: a jumpstart for systems administrators and IT managers. Digital Press,

Chicago 

Internet security: a jumpstart for systems administrators and IT managers. Digital Press, 2003.

كتاب/ مرجع

Network security: current status and future directions

APA 

(2007). Network security: current status and future directions, Hoboken, N.J.: John Wiley & Sons.

MLA 

Network security: current status and future directions. Hoboken, N.J.: John Wiley & Sons, 2007.

Harvard 

2007. Network security: current status and future directions. John Wiley & Sons,

Chicago 

Network security: current status and future directions. John Wiley & Sons, 2007.

كتاب/ مرجع

Cryptography and network security: principles and practice

APA 

(2006). Cryptography and network security: principles and practice, Upper Saddle River, New Jersey: Pearson Prentice Hall.

MLA 

Cryptography and network security: principles and practice. Upper Saddle River, New Jersey: Pearson Prentice Hall, 2006.

Harvard 

2006. Cryptography and network security: principles and practice. Pearson Prentice Hall,

Chicago 

Cryptography and network security: principles and practice. Pearson Prentice Hall, 2006.

كتاب/ مرجع

Cisco ASA, PIX, and FWSM firewall handbook

APA 

(2008). Cisco ASA, PIX, and FWSM firewall handbook, Indianapolis, Indiana: Cisco Press.

MLA 

Cisco ASA, PIX, and FWSM firewall handbook. Indianapolis, Indiana: Cisco Press, 2008.

Harvard 

2008. Cisco ASA, PIX, and FWSM firewall handbook. Cisco Press,

Chicago 

Cisco ASA, PIX, and FWSM firewall handbook. Cisco Press, 2008.

كتاب/ مرجع

Computer security: principles and practice

APA 

(2008). Computer security: principles and practice , Upper Saddle River, NJ.: Pearson/Prentice Hall.

MLA 

Computer security: principles and practice . Upper Saddle River, NJ.: Pearson/Prentice Hall, 2008.

Harvard 

2008. Computer security: principles and practice . Pearson/Prentice Hall,

Chicago 

Computer security: principles and practice . Pearson/Prentice Hall, 2008.

كتاب/ مرجع

Information security and cyber laws

APA 

(2010). Information security and cyber laws, New Delhi: S. K. Kataria & Sons.

MLA 

Information security and cyber laws. New Delhi: S. K. Kataria & Sons, 2010.

Harvard 

2010. Information security and cyber laws. S. K. Kataria & Sons,

Chicago 

Information security and cyber laws. S. K. Kataria & Sons, 2010.

كتاب/ مرجع

Information security and cyber laws

APA 

(2011). Information security and cyber laws, New Delhi: S. K. Kataria & Sons.

MLA 

Information security and cyber laws. New Delhi: S. K. Kataria & Sons, 2011.

Harvard 

2011. Information security and cyber laws. S. K. Kataria & Sons,

Chicago 

Information security and cyber laws. S. K. Kataria & Sons, 2011.

كتاب/ مرجع

The art of enterprise information architecture: a systems-based approach for unlocking business insight

APA 

(2010). The art of enterprise information architecture: a systems-based approach for unlocking business insight, Upper Saddle River, NJ: IBM Press, Pearson.

MLA 

The art of enterprise information architecture: a systems-based approach for unlocking business insight. Upper Saddle River, NJ: IBM Press, Pearson, 2010.

Harvard 

2010. The art of enterprise information architecture: a systems-based approach for unlocking business insight. IBM Press, Pearson,

Chicago 

The art of enterprise information architecture: a systems-based approach for unlocking business insight. IBM Press, Pearson, 2010.

كتاب/ مرجع

Business data networks and security

APA 

(2013). Business data networks and security, Boston: Pearson .

MLA 

Business data networks and security. Boston: Pearson , 2013.

Harvard 

2013. Business data networks and security. Pearson ,

Chicago 

Business data networks and security. Pearson , 2013.

كتاب/ مرجع

Principles of information security

APA 

(2013). Principles of information security, Delhi: Cengage Learning India.

MLA 

Principles of information security. Delhi: Cengage Learning India, 2013.

Harvard 

2013. Principles of information security. Cengage Learning India,

Chicago 

Principles of information security. Cengage Learning India, 2013.

كتاب/ مرجع

Network security

APA 

(2012). Network security, New Delhi: S. K. Kataria & Sons.

MLA 

Network security. New Delhi: S. K. Kataria & Sons, 2012.

Harvard 

2012. Network security. S. K. Kataria & Sons,

Chicago 

Network security. S. K. Kataria & Sons, 2012.

كتاب/ مرجع

Network security : private communication in a public world

APA 

(2013). Network security : private communication in a public world, New Delhi: PHI Learning Private Limited.

MLA 

Network security : private communication in a public world. New Delhi: PHI Learning Private Limited, 2013.

Harvard 

2013. Network security : private communication in a public world. PHI Learning Private Limited,

Chicago 

Network security : private communication in a public world. PHI Learning Private Limited, 2013.

كتاب/ مرجع

Information security and cyber laws

APA 

(2014). Information security and cyber laws, New Delhi: Technical Publications.

MLA 

Information security and cyber laws. New Delhi: Technical Publications, 2014.

Harvard 

2014. Information security and cyber laws. Technical Publications,

Chicago 

Information security and cyber laws. Technical Publications, 2014.

كتاب/ مرجع

Computer and information security handbook

APA 

(2013). Computer and information security handbook, Amsterdam: Elsevier.

MLA 

Computer and information security handbook. Amsterdam: Elsevier, 2013.

Harvard 

2013. Computer and information security handbook. Elsevier,

Chicago 

Computer and information security handbook. Elsevier, 2013.

كتاب/ مرجع

Network security essentials : applications and standards

APA 

(2014). Network security essentials : applications and standards, Harlow: Pearson Education Limited.

MLA 

Network security essentials : applications and standards. Harlow: Pearson Education Limited, 2014.

Harvard 

2014. Network security essentials : applications and standards. Pearson Education Limited,

Chicago 

Network security essentials : applications and standards. Pearson Education Limited, 2014.

كتاب/ مرجع

Security + guide to network security fundamentals

APA 

(2012). Security + guide to network security fundamentals, Australia: Course Technology.

MLA 

Security + guide to network security fundamentals. Australia: Course Technology, 2012.

Harvard 

2012. Security + guide to network security fundamentals. Course Technology,

Chicago 

Security + guide to network security fundamentals. Course Technology, 2012.

كتاب/ مرجع

Securing the virtual environment : how to defend the enterprise against attack

APA 

(2012). Securing the virtual environment : how to defend the enterprise against attack, New Delhi: Wiley India Pvt. Ltd.

MLA 

Securing the virtual environment : how to defend the enterprise against attack. New Delhi: Wiley India Pvt. Ltd, 2012.

Harvard 

2012. Securing the virtual environment : how to defend the enterprise against attack . Wiley India Pvt. Ltd,

Chicago 

Securing the virtual environment : how to defend the enterprise against attack . Wiley India Pvt. Ltd, 2012.

كتاب/ مرجع

CompTIA security + (Exam SYO-301) : training kit

APA 

(2014). CompTIA security + (Exam SYO-301) : training kit, New Delhi: PHI Learning Private Limited.

MLA 

CompTIA security + (Exam SYO-301) : training kit. New Delhi: PHI Learning Private Limited, 2014.

Harvard 

2014. CompTIA security + (Exam SYO-301) : training kit. PHI Learning Private Limited,

Chicago 

CompTIA security + (Exam SYO-301) : training kit. PHI Learning Private Limited, 2014.

كتاب/ مرجع

Network security

APA 

(2013). Network security, New Delhi: S. K. Kataria & Sons.

MLA 

Network security. New Delhi: S. K. Kataria & Sons, 2013.

Harvard 

2013. Network security. S. K. Kataria & Sons,

Chicago 

Network security. S. K. Kataria & Sons, 2013.

كتاب/ مرجع

Computer security: principles and practice

APA 

(2015). Computer security: principles and practice , Boston: Pearson Education Limited.

MLA 

Computer security: principles and practice . Boston: Pearson Education Limited, 2015.

Harvard 

2015. Computer security: principles and practice . Pearson Education Limited,

Chicago 

Computer security: principles and practice . Pearson Education Limited, 2015.

كتاب/ مرجع

Cryptography and network security: principles and practice

APA 

(2014). Cryptography and network security: principles and practice, Boston: Pearson Education Limited.

MLA 

Cryptography and network security: principles and practice. Boston: Pearson Education Limited, 2014.

Harvard 

2014. Cryptography and network security: principles and practice. Pearson Education Limited,

Chicago 

Cryptography and network security: principles and practice. Pearson Education Limited, 2014.

كتاب/ مرجع

Principles of information security

APA 

(2016). Principles of information security, Boston: Cengage Learning.

MLA 

Principles of information security. Boston: Cengage Learning, 2016.

Harvard 

2016. Principles of information security. Cengage Learning,

Chicago 

Principles of information security. Cengage Learning, 2016.

كتاب/ مرجع

Computer security fundamentals

APA 

(2016). Computer security fundamentals, Indianapolis: Pearson Education.

MLA 

Computer security fundamentals. Indianapolis: Pearson Education, 2016.

Harvard 

2016. Computer security fundamentals. Pearson Education,

Chicago 

Computer security fundamentals. Pearson Education, 2016.

كتاب/ مرجع

Security + guide to network security fundamentals

APA 

(2018). Security + guide to network security fundamentals, Australia: Cengage Learning.

MLA 

Security + guide to network security fundamentals. Australia: Cengage Learning, 2018.

Harvard 

2018. Security + guide to network security fundamentals. Cengage Learning,

Chicago 

Security + guide to network security fundamentals. Cengage Learning, 2018.

كتاب/ مرجع

Security + guide to network security fundamentals

APA 

(2012). Security + guide to network security fundamentals, Australia: Course Technology.

MLA 

Security + guide to network security fundamentals. Australia: Course Technology, 2012.

Harvard 

2012. Security + guide to network security fundamentals. Course Technology,

Chicago 

Security + guide to network security fundamentals. Course Technology, 2012.

كتاب/ مرجع

Cryptography and network security: principles and practice

APA 

(2023). Cryptography and network security: principles and practice, Boston: Pearson Education Limited.

MLA 

Cryptography and network security: principles and practice. Boston: Pearson Education Limited, 2023.

Harvard 

2023. Cryptography and network security: principles and practice. Pearson Education Limited,

Chicago 

Cryptography and network security: principles and practice. Pearson Education Limited, 2023.


للمزيد من المعلومات.:  هاتف: 4799000   قسم الخدمات الفنية / فرعي: 2377  بريد إلكتروني: Circ_Library@philadelphia.edu.jo