الفهرس الإلكتروني - السجلات المسترجعة
جامعة   فيلادلفـــــيا
المكتبة ومصادر المعلومات
 

قسم الخدمات الفنية
الفهرس الإلكتروني - السجلات المسترجعة

 
التاريخ:


أنماط التوثيق

كتاب/ مرجع

Practical unix and internet security

APA 

(1996). Practical unix and internet security, Bonn: O'Reilly and associates, Inc..

MLA 

Practical unix and internet security. Bonn: O'Reilly and associates, Inc., 1996.

Harvard 

1996. Practical unix and internet security. O'Reilly and associates, Inc.,

Chicago 

Practical unix and internet security. O'Reilly and associates, Inc., 1996.

كتاب/ مرجع

Computer security handbook

APA 

(1988). Computer security handbook, New York: Macmillan.

MLA 

Computer security handbook. New York: Macmillan, 1988.

Harvard 

1988. Computer security handbook. Macmillan,

Chicago 

Computer security handbook. Macmillan, 1988.

كتاب/ مرجع

Computer security basics

APA 

(1991). Computer security basics, Sebastopol: O'Reilly & Associates.

MLA 

Computer security basics. Sebastopol: O'Reilly & Associates, 1991.

Harvard 

1991. Computer security basics. O'Reilly & Associates,

Chicago 

Computer security basics. O'Reilly & Associates, 1991.

كتاب/ مرجع

Unix system security: how to protect your data and prevent intruders

APA 

(1990). Unix system security: how to protect your data and prevent intruders, Reading, Massachusetts: Addison-Wesley.

MLA 

Unix system security: how to protect your data and prevent intruders. Reading, Massachusetts: Addison-Wesley, 1990.

Harvard 

1990. Unix system security: how to protect your data and prevent intruders. Addison-Wesley,

Chicago 

Unix system security: how to protect your data and prevent intruders. Addison-Wesley, 1990.

كتاب/ مرجع

applied cryptography: protocols, algorithms, and source code in C

APA 

(1996). applied cryptography: protocols, algorithms, and source code in C, N.Y: John Wiley & Sons.

MLA 

applied cryptography: protocols, algorithms, and source code in C. N.Y: John Wiley & Sons, 1996.

Harvard 

1996. applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons,

Chicago 

applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons, 1996.

كتاب/ مرجع

The stephen cobb complete book of PC and LAN security

APA 

(1990). The stephen cobb complete book of PC and LAN security, N.Y: Windcrest.

MLA 

The stephen cobb complete book of PC and LAN security. N.Y: Windcrest, 1990.

Harvard 

1990. The stephen cobb complete book of PC and LAN security. Windcrest,

Chicago 

The stephen cobb complete book of PC and LAN security. Windcrest, 1990.

كتاب/ مرجع

Unix security for the organization

APA 

(1994). Unix security for the organization, Indianapolis: Sams publishing.

MLA 

Unix security for the organization. Indianapolis: Sams publishing, 1994.

Harvard 

1994. Unix security for the organization. Sams publishing,

Chicago 

Unix security for the organization. Sams publishing, 1994.

كتاب/ مرجع

Java security

APA 

(1996). Java security, New York: John Wiley & Sons.

MLA 

Java security. New York: John Wiley & Sons, 1996.

Harvard 

1996. Java security. John Wiley & Sons,

Chicago 

Java security. John Wiley & Sons, 1996.

كتاب/ مرجع

Fundamentals of computer security technology

APA 

(1994). Fundamentals of computer security technology, New Jersey: Prentice Hall.

MLA 

Fundamentals of computer security technology. New Jersey: Prentice Hall, 1994.

Harvard 

1994. Fundamentals of computer security technology. Prentice Hall,

Chicago 

Fundamentals of computer security technology. Prentice Hall, 1994.

كتاب/ مرجع

Security in computing

APA 

(1997). Security in computing, Upper Saddle River, New Jersey: Prentice Hall.

MLA 

Security in computing. Upper Saddle River, New Jersey: Prentice Hall, 1997.

Harvard 

1997. Security in computing. Prentice Hall,

Chicago 

Security in computing. Prentice Hall, 1997.

كتاب/ مرجع

Cryptography and network security : principles and practice

APA 

(1998). Cryptography and network security : principles and practice, Upper Saddle River, New Jersey: Prentice Hall.

MLA 

Cryptography and network security : principles and practice. Upper Saddle River, New Jersey: Prentice Hall, 1998.

Harvard 

1998. Cryptography and network security : principles and practice. Prentice Hall,

Chicago 

Cryptography and network security : principles and practice. Prentice Hall, 1998.

كتاب/ مرجع

Introduction to data security and controls

APA 

(1982). Introduction to data security and controls, Wellesley, Massachusetts: Q.E.D. Information Science, INC..

MLA 

Introduction to data security and controls. Wellesley, Massachusetts: Q.E.D. Information Science, INC., 1982.

Harvard 

1982. Introduction to data security and controls. Q.E.D. Information Science, INC.,

Chicago 

Introduction to data security and controls. Q.E.D. Information Science, INC., 1982.

كتاب/ مرجع

Information and communications security: conference proceedings held in Beijing, China, 11 - 14, November, 1997

APA 

(1997). Information and communications security: conference proceedings held in Beijing, China, 11 - 14, November, 1997, Berlin: Springer - Verlag.

MLA 

Information and communications security: conference proceedings held in Beijing, China, 11 - 14, November, 1997. Berlin: Springer - Verlag, 1997.

Harvard 

1997. Information and communications security: conference proceedings held in Beijing, China, 11 - 14, November, 1997. Springer - Verlag,

Chicago 

Information and communications security: conference proceedings held in Beijing, China, 11 - 14, November, 1997. Springer - Verlag, 1997.

كتاب/ مرجع

Security protocols: workshop proceedings held in Cambridge, United Kingdom, 10 - 12 April, 1996

APA 

(1997). Security protocols: workshop proceedings held in Cambridge, United Kingdom, 10 - 12 April, 1996, Berlin: Springer - Verlag.

MLA 

Security protocols: workshop proceedings held in Cambridge, United Kingdom, 10 - 12 April, 1996. Berlin: Springer - Verlag, 1997.

Harvard 

1997. Security protocols: workshop proceedings held in Cambridge, United Kingdom, 10 - 12 April, 1996. Springer - Verlag,

Chicago 

Security protocols: workshop proceedings held in Cambridge, United Kingdom, 10 - 12 April, 1996. Springer - Verlag, 1997.

كتاب/ مرجع

Information security and privacy: conference proceedings held in Brisbane, Australia, 13 - 15 July, 1998

APA 

(1998). Information security and privacy: conference proceedings held in Brisbane, Australia, 13 - 15 July, 1998, Berlin: Springer - Verlag.

MLA 

Information security and privacy: conference proceedings held in Brisbane, Australia, 13 - 15 July, 1998. Berlin: Springer - Verlag, 1998.

Harvard 

1998. Information security and privacy: conference proceedings held in Brisbane, Australia, 13 - 15 July, 1998. Springer - Verlag,

Chicago 

Information security and privacy: conference proceedings held in Brisbane, Australia, 13 - 15 July, 1998. Springer - Verlag, 1998.

كتاب/ مرجع

Digital signature schemes: general framework and fail-stop signatures

APA 

(1996). Digital signature schemes: general framework and fail-stop signatures, Berlin: Springer - Verlag.

MLA 

Digital signature schemes: general framework and fail-stop signatures. Berlin: Springer - Verlag, 1996.

Harvard 

1996. Digital signature schemes: general framework and fail-stop signatures. Springer - Verlag,

Chicago 

Digital signature schemes: general framework and fail-stop signatures. Springer - Verlag, 1996.

كتاب/ مرجع

Hacking exposed: network security, secrets and solutions

APA 

(2001). Hacking exposed: network security, secrets and solutions, Berkeley: Osborne/ McGraw - Hill.

MLA 

Hacking exposed: network security, secrets and solutions. Berkeley: Osborne/ McGraw - Hill, 2001.

Harvard 

2001. Hacking exposed: network security, secrets and solutions. Osborne/ McGraw - Hill,

Chicago 

Hacking exposed: network security, secrets and solutions. Osborne/ McGraw - Hill, 2001.

كتاب/ مرجع

MCSE: windows 2000 network security design: exam notes

APA 

(2001). MCSE: windows 2000 network security design: exam notes, San Francisco: SYBEX.

MLA 

MCSE: windows 2000 network security design: exam notes. San Francisco: SYBEX, 2001.

Harvard 

2001. MCSE: windows 2000 network security design: exam notes. SYBEX,

Chicago 

MCSE: windows 2000 network security design: exam notes. SYBEX, 2001.

كتاب/ مرجع

Windows 2000 security handbook

APA 

(2001). Windows 2000 security handbook, Berkeley, California: Osborne/ McGraw - Hill.

MLA 

Windows 2000 security handbook. Berkeley, California: Osborne/ McGraw - Hill, 2001.

Harvard 

2001. Windows 2000 security handbook. Osborne/ McGraw - Hill,

Chicago 

Windows 2000 security handbook. Osborne/ McGraw - Hill, 2001.

كتاب/ مرجع

Java security handbook

APA 

(2000). Java security handbook, Indianapolis, Indiana: SAMS.

MLA 

Java security handbook. Indianapolis, Indiana: SAMS, 2000.

Harvard 

2000. Java security handbook. SAMS,

Chicago 

Java security handbook. SAMS, 2000.

كتاب/ مرجع

Windows 2000 user management

APA 

(2000). Windows 2000 user management, Indianapolis, Indiana: New Riders.

MLA 

Windows 2000 user management. Indianapolis, Indiana: New Riders, 2000.

Harvard 

2000. Windows 2000 user management. New Riders,

Chicago 

Windows 2000 user management. New Riders, 2000.

كتاب/ مرجع

Hacker attack

APA 

(2000). Hacker attack, San Francisco: SYBEX.

MLA 

Hacker attack. San Francisco: SYBEX, 2000.

Harvard 

2000. Hacker attack. SYBEX,

Chicago 

Hacker attack. SYBEX, 2000.

كتاب/ مرجع

Protecting your web site with firewalls

APA 

(1997). Protecting your web site with firewalls, Upper Saddle River, New Jersey: Prentice - Hall.

MLA 

Protecting your web site with firewalls. Upper Saddle River, New Jersey: Prentice - Hall, 1997.

Harvard 

1997. Protecting your web site with firewalls. Prentice - Hall,

Chicago 

Protecting your web site with firewalls. Prentice - Hall, 1997.

كتاب/ مرجع

Firewalls : a complete guide

APA 

(2000). Firewalls : a complete guide, New York: McGraw - Hill.

MLA 

Firewalls : a complete guide. New York: McGraw - Hill, 2000.

Harvard 

2000. Firewalls : a complete guide. McGraw - Hill,

Chicago 

Firewalls : a complete guide. McGraw - Hill, 2000.

كتاب/ مرجع

Practical firewalls

APA 

(2000). Practical firewalls, Indianapolis, Indiana: Que.

MLA 

Practical firewalls. Indianapolis, Indiana: Que, 2000.

Harvard 

2000. Practical firewalls. Que,

Chicago 

Practical firewalls. Que, 2000.

كتاب/ مرجع

Developing secure applications with Visual Basic

APA 

(2000). Developing secure applications with Visual Basic, Indianapolis, Indiana: SAMS.

MLA 

Developing secure applications with Visual Basic. Indianapolis, Indiana: SAMS, 2000.

Harvard 

2000. Developing secure applications with Visual Basic. SAMS,

Chicago 

Developing secure applications with Visual Basic. SAMS, 2000.

كتاب/ مرجع

Database nation : the death of privacy in the 21st century

APA 

(2000). Database nation : the death of privacy in the 21st century, Beijing: O'Reilly.

MLA 

Database nation : the death of privacy in the 21st century. Beijing: O'Reilly, 2000.

Harvard 

2000. Database nation : the death of privacy in the 21st century. O'Reilly,

Chicago 

Database nation : the death of privacy in the 21st century. O'Reilly, 2000.

كتاب/ مرجع

Decrypted secrets: methods and maxims of cryptography

APA 

(2000). Decrypted secrets: methods and maxims of cryptography, Berlin: Springer - Verlag.

MLA 

Decrypted secrets: methods and maxims of cryptography. Berlin: Springer - Verlag, 2000.

Harvard 

2000. Decrypted secrets: methods and maxims of cryptography. Springer - Verlag,

Chicago 

Decrypted secrets: methods and maxims of cryptography. Springer - Verlag, 2000.

كتاب/ مرجع

Information hiding: first international workshop, Cambridge, U.K., May 30 - June 1, 1996: Proceedings

APA 

(1996). Information hiding: first international workshop, Cambridge, U.K., May 30 - June 1, 1996: Proceedings, Berlin: Springer.

MLA 

Information hiding: first international workshop, Cambridge, U.K., May 30 - June 1, 1996: Proceedings. Berlin: Springer, 1996.

Harvard 

1996. Information hiding: first international workshop, Cambridge, U.K., May 30 - June 1, 1996: Proceedings. Springer,

Chicago 

Information hiding: first international workshop, Cambridge, U.K., May 30 - June 1, 1996: Proceedings. Springer, 1996.

كتاب/ مرجع

Advances in cryptology, 1981-1997: electronic proceedings and index of the crypto and Eurocrypt conferences 1981-1997

APA 

(1998). Advances in cryptology, 1981-1997: electronic proceedings and index of the crypto and Eurocrypt conferences 1981-1997, Berlin: Springer.

MLA 

Advances in cryptology, 1981-1997: electronic proceedings and index of the crypto and Eurocrypt conferences 1981-1997. Berlin: Springer, 1998.

Harvard 

1998. Advances in cryptology, 1981-1997: electronic proceedings and index of the crypto and Eurocrypt conferences 1981-1997. Springer,

Chicago 

Advances in cryptology, 1981-1997: electronic proceedings and index of the crypto and Eurocrypt conferences 1981-1997. Springer, 1998.

كتاب/ مرجع

Configuring Windows 2000 server security

APA 

(2000). Configuring Windows 2000 server security, Rockland, MA: Syngress Media.

MLA 

Configuring Windows 2000 server security. Rockland, MA: Syngress Media, 2000.

Harvard 

2000. Configuring Windows 2000 server security. Syngress Media,

Chicago 

Configuring Windows 2000 server security. Syngress Media, 2000.

كتاب/ مرجع

IT manager's guide to virtual private networks

APA 

(1999). IT manager's guide to virtual private networks, New York: McGraw - Hill.

MLA 

IT manager's guide to virtual private networks. New York: McGraw - Hill, 1999.

Harvard 

1999. IT manager's guide to virtual private networks. McGraw - Hill,

Chicago 

IT manager's guide to virtual private networks. McGraw - Hill, 1999.

كتاب/ مرجع

Cisco network security

APA 

(2001). Cisco network security, Upper Saddle River, New Jersey: Prentice - Hall.

MLA 

Cisco network security. Upper Saddle River, New Jersey: Prentice - Hall, 2001.

Harvard 

2001. Cisco network security. Prentice - Hall,

Chicago 

Cisco network security. Prentice - Hall, 2001.

كتاب/ مرجع

Security complete

APA 

(2001). Security complete, San Francisco: SYBEX.

MLA 

Security complete. San Francisco: SYBEX, 2001.

Harvard 

2001. Security complete. SYBEX,

Chicago 

Security complete. SYBEX, 2001.

كتاب/ مرجع

Modern cryptography, probabilistic proofs and pseudorandomness

APA 

(1999). Modern cryptography, probabilistic proofs and pseudorandomness, Berlin: Springer.

MLA 

Modern cryptography, probabilistic proofs and pseudorandomness. Berlin: Springer, 1999.

Harvard 

1999. Modern cryptography, probabilistic proofs and pseudorandomness. Springer,

Chicago 

Modern cryptography, probabilistic proofs and pseudorandomness. Springer, 1999.

كتاب/ مرجع

Coding theory, cryptography, and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998

APA 

(2000). Coding theory, cryptography, and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998, Berlin: Springer.

MLA 

Coding theory, cryptography, and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998. Berlin: Springer, 2000.

Harvard 

2000. Coding theory, cryptography, and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998. Springer,

Chicago 

Coding theory, cryptography, and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998. Springer, 2000.

كتاب/ مرجع

Lectures on data security: modern cryptology in theory and practice

APA 

(1999). Lectures on data security: modern cryptology in theory and practice, Berlin: Springer.

MLA 

Lectures on data security: modern cryptology in theory and practice. Berlin: Springer, 1999.

Harvard 

1999. Lectures on data security: modern cryptology in theory and practice. Springer,

Chicago 

Lectures on data security: modern cryptology in theory and practice. Springer, 1999.

كتاب/ مرجع

Financial cryptography : First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings

APA 

(1997). Financial cryptography : First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings, Berlin: Springer.

MLA 

Financial cryptography : First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings. Berlin: Springer, 1997.

Harvard 

1997. Financial cryptography : First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings. Springer,

Chicago 

Financial cryptography : First International Conference, FC '97, Anguilla, British West Indies, February 24-28, 1997 : proceedings. Springer, 1997.

كتاب/ مرجع

Information security: first international workshop, ISW'97, Tatsunokuchi, Ishikawa, Japan, September 17-19, 1997: Proceedings

APA 

(1998). Information security: first international workshop, ISW'97, Tatsunokuchi, Ishikawa, Japan, September 17-19, 1997: Proceedings, Berlin: Springer.

MLA 

Information security: first international workshop, ISW'97, Tatsunokuchi, Ishikawa, Japan, September 17-19, 1997: Proceedings. Berlin: Springer, 1998.

Harvard 

1998. Information security: first international workshop, ISW'97, Tatsunokuchi, Ishikawa, Japan, September 17-19, 1997: Proceedings. Springer,

Chicago 

Information security: first international workshop, ISW'97, Tatsunokuchi, Ishikawa, Japan, September 17-19, 1997: Proceedings. Springer, 1998.

كتاب/ مرجع

Information security and privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999: Proceedings

APA 

(1999). Information security and privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999: Proceedings, Berlin: Springer.

MLA 

Information security and privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999: Proceedings. Berlin: Springer, 1999.

Harvard 

1999. Information security and privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999: Proceedings. Springer,

Chicago 

Information security and privacy: 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999: Proceedings. Springer, 1999.

كتاب/ مرجع

Selected areas in cryptography: 5th annual international workshop, SAC'98, Kingstone, Ontario, Canada, August 17-18, 1998: Proceedings

APA 

(1998). Selected areas in cryptography: 5th annual international workshop, SAC'98, Kingstone, Ontario, Canada, August 17-18, 1998: Proceedings, Berlin: Springer.

MLA 

Selected areas in cryptography: 5th annual international workshop, SAC'98, Kingstone, Ontario, Canada, August 17-18, 1998: Proceedings. Berlin: Springer, 1998.

Harvard 

1998. Selected areas in cryptography: 5th annual international workshop, SAC'98, Kingstone, Ontario, Canada, August 17-18, 1998: Proceedings. Springer,

Chicago 

Selected areas in cryptography: 5th annual international workshop, SAC'98, Kingstone, Ontario, Canada, August 17-18, 1998: Proceedings. Springer, 1998.

كتاب/ مرجع

State of the art in applied cryptography:"course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997: revised lectures

APA 

(1998). State of the art in applied cryptography:"course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997: revised lectures , Berlin: Springer.

MLA 

State of the art in applied cryptography:"course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997: revised lectures . Berlin: Springer, 1998.

Harvard 

1998. State of the art in applied cryptography:"course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997: revised lectures. Springer,

Chicago 

State of the art in applied cryptography:"course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997: revised lectures. Springer, 1998.

كتاب/ مرجع

Public key cryptography: second international workshop on practice and theory in public key cryptography, PKC'99, Kamakura, Japan, March, 1-3, 1999: Proc

APA 

(1999). Public key cryptography: second international workshop on practice and theory in public key cryptography, PKC'99, Kamakura, Japan, March, 1-3, 1999: Proc, Berlin: Springer.

MLA 

Public key cryptography: second international workshop on practice and theory in public key cryptography, PKC'99, Kamakura, Japan, March, 1-3, 1999: Proc. Berlin: Springer, 1999.

Harvard 

1999. Public key cryptography: second international workshop on practice and theory in public key cryptography, PKC'99, Kamakura, Japan, March, 1-3, 1999: Proc. Springer,

Chicago 

Public key cryptography: second international workshop on practice and theory in public key cryptography, PKC'99, Kamakura, Japan, March, 1-3, 1999: Proc. Springer, 1999.

كتاب/ مرجع

Information hiding:"second international workshop, IH'98: Portland, Oregon, USA, April 14-17, 1998: Proceedings

APA 

(1998). Information hiding:"second international workshop, IH'98: Portland, Oregon, USA, April 14-17, 1998: Proceedings, Berlin: Springer.

MLA 

Information hiding:"second international workshop, IH'98: Portland, Oregon, USA, April 14-17, 1998: Proceedings. Berlin: Springer, 1998.

Harvard 

1998. Information hiding:"second international workshop, IH'98: Portland, Oregon, USA, April 14-17, 1998: Proceedings. Springer,

Chicago 

Information hiding:"second international workshop, IH'98: Portland, Oregon, USA, April 14-17, 1998: Proceedings. Springer, 1998.

كتاب/ مرجع

Security protocols: 6th international workshop, Cambridge, UK, April 15-17, 1998: proceedings

APA 

(1999). Security protocols: 6th international workshop, Cambridge, UK, April 15-17, 1998: proceedings, Berlin: Springer.

MLA 

Security protocols: 6th international workshop, Cambridge, UK, April 15-17, 1998: proceedings. Berlin: Springer, 1999.

Harvard 

1999. Security protocols: 6th international workshop, Cambridge, UK, April 15-17, 1998: proceedings. Springer,

Chicago 

Security protocols: 6th international workshop, Cambridge, UK, April 15-17, 1998: proceedings. Springer, 1999.

كتاب/ مرجع

Maximum Windows 2000 security

APA 

(2002). Maximum Windows 2000 security, Indianapolis, Indiana: Sams.

MLA 

Maximum Windows 2000 security. Indianapolis, Indiana: Sams, 2002.

Harvard 

2002. Maximum Windows 2000 security. Sams,

Chicago 

Maximum Windows 2000 security. Sams, 2002.

كتاب/ مرجع

Maximum security

APA 

(2001). Maximum security, Indianapolis, Indiana: Sams.

MLA 

Maximum security. Indianapolis, Indiana: Sams, 2001.

Harvard 

2001. Maximum security. Sams,

Chicago 

Maximum security. Sams, 2001.

كتاب/ مرجع

.NET framework security

APA 

(2002). .NET framework security, Boston: Addison - Wesley.

MLA 

.NET framework security. Boston: Addison - Wesley, 2002.

Harvard 

2002. .NET framework security. Addison - Wesley,

Chicago 

.NET framework security. Addison - Wesley, 2002.

كتاب/ مرجع

Information security architecture: an integrated approach to security in the organization

APA 

(2000). Information security architecture: an integrated approach to security in the organization, Boca Raton: Auerbach.

MLA 

Information security architecture: an integrated approach to security in the organization. Boca Raton: Auerbach, 2000.

Harvard 

2000. Information security architecture: an integrated approach to security in the organization. Auerbach,

Chicago 

Information security architecture: an integrated approach to security in the organization. Auerbach, 2000.

كتاب/ مرجع

Information security risk analysis

APA 

(2001). Information security risk analysis, Boca Raton: Auerbach.

MLA 

Information security risk analysis. Boca Raton: Auerbach, 2001.

Harvard 

2001. Information security risk analysis. Auerbach,

Chicago 

Information security risk analysis. Auerbach, 2001.

كتاب/ مرجع

Security management: an introduction

APA 

(2002). Security management: an introduction, Upper Saddle River, New Jersey: Prentice-Hall.

MLA 

Security management: an introduction. Upper Saddle River, New Jersey: Prentice-Hall, 2002.

Harvard 

2002. Security management: an introduction. Prentice-Hall,

Chicago 

Security management: an introduction. Prentice-Hall, 2002.

كتاب/ مرجع

Security and privacy for e-business

APA 

(2001). Security and privacy for e-business, New York: John Wiley and Sons, Inc..

MLA 

Security and privacy for e-business. New York: John Wiley and Sons, Inc., 2001.

Harvard 

2001. Security and privacy for e-business. John Wiley and Sons, Inc.,

Chicago 

Security and privacy for e-business. John Wiley and Sons, Inc., 2001.

مشروع تخرج

Digital signature

APA 

(2002). Digital signature. (مشروع تخرج (بكالوريوس Philadelphia University).

MLA 

. Digital signature. مشروع تخرج (بكالوريوس) Philadelphia University, 2002,

Harvard 

2002, Digital signature (مشروع تخرج (بكالوريوس)، Philadelphia University).

Chicago 

"Digital signature." مشروع تخرج (بكالوريوس)، Philadelphia University, 2002.

مشروع تخرج

Investigation into : data and system security

APA 

(1997). Investigation into : data and system security. (مشروع تخرج (بكالوريوس Philadelphia University).

MLA 

. Investigation into : data and system security. مشروع تخرج (بكالوريوس) Philadelphia University, 1997,

Harvard 

1997, Investigation into : data and system security (مشروع تخرج (بكالوريوس)، Philadelphia University).

Chicago 

"Investigation into : data and system security." مشروع تخرج (بكالوريوس)، Philadelphia University, 1997.

مشروع تخرج

Encrypt message using RSA and El gamal schemes

APA 

(2003). Encrypt message using RSA and El gamal schemes. (مشروع تخرج (بكالوريوس Philadelphia University).

MLA 

. Encrypt message using RSA and El gamal schemes. مشروع تخرج (بكالوريوس) Philadelphia University, 2003,

Harvard 

2003, Encrypt message using RSA and El gamal schemes (مشروع تخرج (بكالوريوس)، Philadelphia University).

Chicago 

"Encrypt message using RSA and El gamal schemes." مشروع تخرج (بكالوريوس)، Philadelphia University, 2003.

مشروع تخرج

Identification method

APA 

([199-]). Identification method. (مشروع تخرج (بكالوريوس Philadelphia University).

MLA 

. Identification method. مشروع تخرج (بكالوريوس) Philadelphia University, [199-],

Harvard 

[199-], Identification method (مشروع تخرج (بكالوريوس)، Philadelphia University).

Chicago 

"Identification method." مشروع تخرج (بكالوريوس)، Philadelphia University, [199-].

مشروع تخرج

Juevara encryption method

APA 

(2002). Juevara encryption method. (مشروع تخرج (بكالوريوس Philadelphia University).

MLA 

. Juevara encryption method. مشروع تخرج (بكالوريوس) Philadelphia University, 2002,

Harvard 

2002, Juevara encryption method (مشروع تخرج (بكالوريوس)، Philadelphia University).

Chicago 

"Juevara encryption method." مشروع تخرج (بكالوريوس)، Philadelphia University, 2002.

مشروع تخرج

Encryption and decryption

APA 

(1999). Encryption and decryption. (مشروع تخرج (بكالوريوس Philadelphia University).

MLA 

. Encryption and decryption. مشروع تخرج (بكالوريوس) Philadelphia University, 1999,

Harvard 

1999, Encryption and decryption (مشروع تخرج (بكالوريوس)، Philadelphia University).

Chicago 

"Encryption and decryption." مشروع تخرج (بكالوريوس)، Philadelphia University, 1999.

كتاب/ مرجع

Security in computing

APA 

(2003). Security in computing, Upper Saddle River, New Jersey: Prentice Hall.

MLA 

Security in computing. Upper Saddle River, New Jersey: Prentice Hall, 2003.

Harvard 

2003. Security in computing. Prentice Hall,

Chicago 

Security in computing. Prentice Hall, 2003.

كتاب/ مرجع

How secure is your wireless network? safeguarding your Wi-Fi Lan

APA 

(2004). How secure is your wireless network? safeguarding your Wi-Fi Lan, Upper Saddle River, New Jersey: Prentice Hall.

MLA 

How secure is your wireless network? safeguarding your Wi-Fi Lan. Upper Saddle River, New Jersey: Prentice Hall, 2004.

Harvard 

2004. How secure is your wireless network? safeguarding your Wi-Fi Lan. Prentice Hall,

Chicago 

How secure is your wireless network? safeguarding your Wi-Fi Lan. Prentice Hall, 2004.

كتاب/ مرجع

PDA security: incorporating handhelds into the enterprise

APA 

(2003). PDA security: incorporating handhelds into the enterprise, New York: McGraw-Hill.

MLA 

PDA security: incorporating handhelds into the enterprise. New York: McGraw-Hill, 2003.

Harvard 

2003. PDA security: incorporating handhelds into the enterprise. McGraw-Hill,

Chicago 

PDA security: incorporating handhelds into the enterprise. McGraw-Hill, 2003.

كتاب/ مرجع

Wireless operational security

APA 

(2004). Wireless operational security, Amsterdam: Elsevier.

MLA 

Wireless operational security. Amsterdam: Elsevier, 2004.

Harvard 

2004. Wireless operational security. Elsevier,

Chicago 

Wireless operational security. Elsevier, 2004.

كتاب/ مرجع

Public key infrastructure: building trusted applications and web services

APA 

(2004). Public key infrastructure: building trusted applications and web services , Bocca Raton: Auerbach Publications.

MLA 

Public key infrastructure: building trusted applications and web services . Bocca Raton: Auerbach Publications, 2004.

Harvard 

2004. Public key infrastructure: building trusted applications and web services. Auerbach Publications,

Chicago 

Public key infrastructure: building trusted applications and web services. Auerbach Publications, 2004.

كتاب/ مرجع

Defend I.T. : security by example

APA 

(2004). Defend I.T. : security by example, Boston: Addison-Wesley.

MLA 

Defend I.T. : security by example. Boston: Addison-Wesley, 2004.

Harvard 

2004. Defend I.T. : security by example. Addison-Wesley,

Chicago 

Defend I.T. : security by example. Addison-Wesley, 2004.

كتاب/ مرجع

Designing network security

APA 

(2004). Designing network security, Indianapolis, Indiana: Cisco Press.

MLA 

Designing network security. Indianapolis, Indiana: Cisco Press, 2004.

Harvard 

2004. Designing network security. Cisco Press,

Chicago 

Designing network security. Cisco Press, 2004.

كتاب/ مرجع

Software forensics: collecting evidence from the scene of a digital crime

APA 

(2004). Software forensics: collecting evidence from the scene of a digital crime , New York: McGraw-Hill.

MLA 

Software forensics: collecting evidence from the scene of a digital crime . New York: McGraw-Hill, 2004.

Harvard 

2004. Software forensics: collecting evidence from the scene of a digital crime. McGraw-Hill,

Chicago 

Software forensics: collecting evidence from the scene of a digital crime. McGraw-Hill, 2004.

كتاب/ مرجع

ISA server 2004 unleashed

APA 

(2006). ISA server 2004 unleashed, Indianapolis, Indiana: SAMS.

MLA 

ISA server 2004 unleashed. Indianapolis, Indiana: SAMS, 2006.

Harvard 

2006. ISA server 2004 unleashed. SAMS,

Chicago 

ISA server 2004 unleashed. SAMS, 2006.

كتاب/ مرجع

Cisco network security troubleshooting handbook

APA 

(2006). Cisco network security troubleshooting handbook, Indianapolis, Indiana: Cisco Press.

MLA 

Cisco network security troubleshooting handbook. Indianapolis, Indiana: Cisco Press, 2006.

Harvard 

2006. Cisco network security troubleshooting handbook. Cisco Press,

Chicago 

Cisco network security troubleshooting handbook. Cisco Press, 2006.

كتاب/ مرجع

Core security patterns: best practices and strategies for J2EE, Web services and identity management

APA 

(2005). Core security patterns: best practices and strategies for J2EE, Web services and identity management, Upper Saddle River, NJ: Prentice Hall.

MLA 

Core security patterns: best practices and strategies for J2EE, Web services and identity management. Upper Saddle River, NJ: Prentice Hall, 2005.

Harvard 

2005. Core security patterns: best practices and strategies for J2EE, Web services and identity management. Prentice Hall,

Chicago 

Core security patterns: best practices and strategies for J2EE, Web services and identity management. Prentice Hall, 2005.

كتاب/ مرجع

A simple guide to security and privacy on your PC

APA 

(2000). A simple guide to security and privacy on your PC, Harlow: Prentice Hall.

MLA 

A simple guide to security and privacy on your PC. Harlow: Prentice Hall, 2000.

Harvard 

2000. A simple guide to security and privacy on your PC. Prentice Hall,

Chicago 

A simple guide to security and privacy on your PC. Prentice Hall, 2000.

كتاب/ مرجع

Administering Windows Vista security: the big surprises

APA 

(2007). Administering Windows Vista security: the big surprises, Indianapolis, Indiana: Wiley Publishing, Inc..

MLA 

Administering Windows Vista security: the big surprises. Indianapolis, Indiana: Wiley Publishing, Inc., 2007.

Harvard 

2007. Administering Windows Vista security: the big surprises. Wiley Publishing, Inc.,

Chicago 

Administering Windows Vista security: the big surprises. Wiley Publishing, Inc., 2007.

كتاب/ مرجع

Hacking the Xbox: an introduction to reverse engineering

APA 

(2003). Hacking the Xbox: an introduction to reverse engineering, San Francisco: No Starch Press, Inc..

MLA 

Hacking the Xbox: an introduction to reverse engineering. San Francisco: No Starch Press, Inc., 2003.

Harvard 

2003. Hacking the Xbox: an introduction to reverse engineering. No Starch Press, Inc.,

Chicago 

Hacking the Xbox: an introduction to reverse engineering. No Starch Press, Inc., 2003.

كتاب/ مرجع

Reversing: secrets of reverse engineering

APA 

(2005). Reversing: secrets of reverse engineering, Indianapolis, Indiana: Wiley Publishing.

MLA 

Reversing: secrets of reverse engineering. Indianapolis, Indiana: Wiley Publishing, 2005.

Harvard 

2005. Reversing: secrets of reverse engineering. Wiley Publishing,

Chicago 

Reversing: secrets of reverse engineering. Wiley Publishing, 2005.

كتاب/ مرجع

Data protection and information lifecycle management

APA 

(2006). Data protection and information lifecycle management, Upper Saddle River, NJ: Prentice Hall.

MLA 

Data protection and information lifecycle management. Upper Saddle River, NJ: Prentice Hall, 2006.

Harvard 

2006. Data protection and information lifecycle management. Prentice Hall,

Chicago 

Data protection and information lifecycle management. Prentice Hall, 2006.

كتاب/ مرجع

Microsoft Windows XP networking and security: inside out: also covers Windows 2000

APA 

(2006). Microsoft Windows XP networking and security: inside out: also covers Windows 2000, New Delhi: Prentice Hall of India.

MLA 

Microsoft Windows XP networking and security: inside out: also covers Windows 2000. New Delhi: Prentice Hall of India, 2006.

Harvard 

2006. Microsoft Windows XP networking and security: inside out: also covers Windows 2000. Prentice Hall of India,

Chicago 

Microsoft Windows XP networking and security: inside out: also covers Windows 2000. Prentice Hall of India, 2006.

كتاب/ مرجع

Network security: a practical approach

APA 

(2006). Network security: a practical approach, New Delhi: Elsevier.

MLA 

Network security: a practical approach. New Delhi: Elsevier, 2006.

Harvard 

2006. Network security: a practical approach. Elsevier,

Chicago 

Network security: a practical approach. Elsevier, 2006.

كتاب/ مرجع

IT governance: a manager's guide to data security and BS 7799-ISO 17799

APA 

(2005). IT governance: a manager's guide to data security and BS 7799-ISO 17799 , London: Kogan Page.

MLA 

IT governance: a manager's guide to data security and BS 7799-ISO 17799 . London: Kogan Page, 2005.

Harvard 

2005. IT governance: a manager's guide to data security and BS 7799-ISO 17799. Kogan Page,

Chicago 

IT governance: a manager's guide to data security and BS 7799-ISO 17799. Kogan Page, 2005.

كتاب/ مرجع

Internet security: a jumpstart for systems administrators and IT managers

APA 

(2003). Internet security: a jumpstart for systems administrators and IT managers , New Delhi: Digital Press.

MLA 

Internet security: a jumpstart for systems administrators and IT managers . New Delhi: Digital Press, 2003.

Harvard 

2003. Internet security: a jumpstart for systems administrators and IT managers. Digital Press,

Chicago 

Internet security: a jumpstart for systems administrators and IT managers. Digital Press, 2003.

كتاب/ مرجع

Wireless security: models, threats, and solutions

APA 

(2006). Wireless security: models, threats, and solutions, New Delhi: Tata McGraw-Hill.

MLA 

Wireless security: models, threats, and solutions. New Delhi: Tata McGraw-Hill, 2006.

Harvard 

2006. Wireless security: models, threats, and solutions. Tata McGraw-Hill,

Chicago 

Wireless security: models, threats, and solutions. Tata McGraw-Hill, 2006.

كتاب/ مرجع

Network security: current status and future directions

APA 

(2007). Network security: current status and future directions, Hoboken, N.J.: John Wiley & Sons.

MLA 

Network security: current status and future directions. Hoboken, N.J.: John Wiley & Sons, 2007.

Harvard 

2007. Network security: current status and future directions. John Wiley & Sons,

Chicago 

Network security: current status and future directions. John Wiley & Sons, 2007.

كتاب/ مرجع

Cryptography and network security: principles and practice

APA 

(2006). Cryptography and network security: principles and practice, Upper Saddle River, New Jersey: Pearson Prentice Hall.

MLA 

Cryptography and network security: principles and practice. Upper Saddle River, New Jersey: Pearson Prentice Hall, 2006.

Harvard 

2006. Cryptography and network security: principles and practice. Pearson Prentice Hall,

Chicago 

Cryptography and network security: principles and practice. Pearson Prentice Hall, 2006.

كتاب/ مرجع

Cisco ASA, PIX, and FWSM firewall handbook

APA 

(2008). Cisco ASA, PIX, and FWSM firewall handbook, Indianapolis, Indiana: Cisco Press.

MLA 

Cisco ASA, PIX, and FWSM firewall handbook. Indianapolis, Indiana: Cisco Press, 2008.

Harvard 

2008. Cisco ASA, PIX, and FWSM firewall handbook. Cisco Press,

Chicago 

Cisco ASA, PIX, and FWSM firewall handbook. Cisco Press, 2008.

كتاب/ مرجع

The security development lifecycle : SDL, a process for developing demonstrably more secure software

APA 

(2006). The security development lifecycle : SDL, a process for developing demonstrably more secure software, Redmond, Washington: Microsoft Press.

MLA 

The security development lifecycle : SDL, a process for developing demonstrably more secure software. Redmond, Washington: Microsoft Press, 2006.

Harvard 

2006. The security development lifecycle : SDL, a process for developing demonstrably more secure software. Microsoft Press,

Chicago 

The security development lifecycle : SDL, a process for developing demonstrably more secure software. Microsoft Press, 2006.

كتاب/ مرجع

Software security : building security in

APA 

(2006). Software security : building security in, Upper Saddle River, NJ : Addison-Wesley.

MLA 

Software security : building security in. Upper Saddle River, NJ : Addison-Wesley, 2006.

Harvard 

2006. Software security : building security in. Addison-Wesley,

Chicago 

Software security : building security in. Addison-Wesley, 2006.

كتاب/ مرجع

CEH : certified ethical hacker study guide

APA 

(2010). CEH : certified ethical hacker study guide, Indianapolis, Ind.: Wiley Publishing, Inc..

MLA 

CEH : certified ethical hacker study guide. Indianapolis, Ind.: Wiley Publishing, Inc., 2010.

Harvard 

2010. CEH : certified ethical hacker study guide. Wiley Publishing, Inc.,

Chicago 

CEH : certified ethical hacker study guide. Wiley Publishing, Inc., 2010.

كتاب/ مرجع

Gray hat hacking : the ethical hacker’s handbook

APA 

(2011). Gray hat hacking : the ethical hacker’s handbook, New York: McGraw-Hill.

MLA 

Gray hat hacking : the ethical hacker’s handbook. New York: McGraw-Hill, 2011.

Harvard 

2011. Gray hat hacking : the ethical hacker’s handbook. McGraw-Hill,

Chicago 

Gray hat hacking : the ethical hacker’s handbook. McGraw-Hill, 2011.

كتاب/ مرجع

Computer security: principles and practice

APA 

(2008). Computer security: principles and practice , Upper Saddle River, NJ.: Pearson/Prentice Hall.

MLA 

Computer security: principles and practice . Upper Saddle River, NJ.: Pearson/Prentice Hall, 2008.

Harvard 

2008. Computer security: principles and practice . Pearson/Prentice Hall,

Chicago 

Computer security: principles and practice . Pearson/Prentice Hall, 2008.

كتاب/ مرجع

Best antivirus collection [electronic resource]

APA 

([-2000]). Best antivirus collection [electronic resource], [s.l]: [s.n].

MLA 

Best antivirus collection [electronic resource]. [s.l]: [s.n], [-2000].

Harvard 

[-2000]. Best antivirus collection [electronic resource]. [s.n],

Chicago 

Best antivirus collection [electronic resource]. [s.n], [-2000].

كتاب/ مرجع

Information security and cyber laws

APA 

(2010). Information security and cyber laws, New Delhi: S. K. Kataria & Sons.

MLA 

Information security and cyber laws. New Delhi: S. K. Kataria & Sons, 2010.

Harvard 

2010. Information security and cyber laws. S. K. Kataria & Sons,

Chicago 

Information security and cyber laws. S. K. Kataria & Sons, 2010.

كتاب/ مرجع

Information security and cyber laws

APA 

(2011). Information security and cyber laws, New Delhi: S. K. Kataria & Sons.

MLA 

Information security and cyber laws. New Delhi: S. K. Kataria & Sons, 2011.

Harvard 

2011. Information security and cyber laws. S. K. Kataria & Sons,

Chicago 

Information security and cyber laws. S. K. Kataria & Sons, 2011.

كتاب/ مرجع

The art of enterprise information architecture: a systems-based approach for unlocking business insight

APA 

(2010). The art of enterprise information architecture: a systems-based approach for unlocking business insight, Upper Saddle River, NJ: IBM Press, Pearson.

MLA 

The art of enterprise information architecture: a systems-based approach for unlocking business insight. Upper Saddle River, NJ: IBM Press, Pearson, 2010.

Harvard 

2010. The art of enterprise information architecture: a systems-based approach for unlocking business insight. IBM Press, Pearson,

Chicago 

The art of enterprise information architecture: a systems-based approach for unlocking business insight. IBM Press, Pearson, 2010.

كتاب/ مرجع

Information security: principles and practice

APA 

(2011). Information security: principles and practice, Hoboken, New Jersey: Wiley .

MLA 

Information security: principles and practice. Hoboken, New Jersey: Wiley , 2011.

Harvard 

2011. Information security: principles and practice. Wiley ,

Chicago 

Information security: principles and practice. Wiley , 2011.

كتاب/ مرجع

Business data networks and security

APA 

(2013). Business data networks and security, Boston: Pearson .

MLA 

Business data networks and security. Boston: Pearson , 2013.

Harvard 

2013. Business data networks and security. Pearson ,

Chicago 

Business data networks and security. Pearson , 2013.

كتاب/ مرجع

Principles of information security

APA 

(2013). Principles of information security, Delhi: Cengage Learning India.

MLA 

Principles of information security. Delhi: Cengage Learning India, 2013.

Harvard 

2013. Principles of information security. Cengage Learning India,

Chicago 

Principles of information security. Cengage Learning India, 2013.

كتاب/ مرجع

Security and computer: management strategy

APA 

(1987). Security and computer: management strategy , Beirut: Union of Arab Banks.

MLA 

Security and computer: management strategy . Beirut: Union of Arab Banks, 1987.

Harvard 

1987. Security and computer: management strategy . Union of Arab Banks,

Chicago 

Security and computer: management strategy . Union of Arab Banks, 1987.

كتاب/ مرجع

Network security

APA 

(2012). Network security, New Delhi: S. K. Kataria & Sons.

MLA 

Network security. New Delhi: S. K. Kataria & Sons, 2012.

Harvard 

2012. Network security. S. K. Kataria & Sons,

Chicago 

Network security. S. K. Kataria & Sons, 2012.

كتاب/ مرجع

Network security : private communication in a public world

APA 

(2013). Network security : private communication in a public world, New Delhi: PHI Learning Private Limited.

MLA 

Network security : private communication in a public world. New Delhi: PHI Learning Private Limited, 2013.

Harvard 

2013. Network security : private communication in a public world. PHI Learning Private Limited,

Chicago 

Network security : private communication in a public world. PHI Learning Private Limited, 2013.

كتاب/ مرجع

Core banking solution : evaluation of security and controls

APA 

(2013). Core banking solution : evaluation of security and controls, New Delhi: PHI Learning Private Limited.

MLA 

Core banking solution : evaluation of security and controls. New Delhi: PHI Learning Private Limited, 2013.

Harvard 

2013. Core banking solution : evaluation of security and controls. PHI Learning Private Limited,

Chicago 

Core banking solution : evaluation of security and controls. PHI Learning Private Limited, 2013.

كتاب/ مرجع

Information security and cyber laws

APA 

(2014). Information security and cyber laws, New Delhi: Technical Publications.

MLA 

Information security and cyber laws. New Delhi: Technical Publications, 2014.

Harvard 

2014. Information security and cyber laws. Technical Publications,

Chicago 

Information security and cyber laws. Technical Publications, 2014.

كتاب/ مرجع

Computer and information security handbook

APA 

(2013). Computer and information security handbook, Amsterdam: Elsevier.

MLA 

Computer and information security handbook. Amsterdam: Elsevier, 2013.

Harvard 

2013. Computer and information security handbook. Elsevier,

Chicago 

Computer and information security handbook. Elsevier, 2013.

كتاب/ مرجع

Introduction to computer security

APA 

(2014). Introduction to computer security, Harlow: Pearson Education Limited.

MLA 

Introduction to computer security. Harlow: Pearson Education Limited, 2014.

Harvard 

2014. Introduction to computer security. Pearson Education Limited,

Chicago 

Introduction to computer security. Pearson Education Limited, 2014.

كتاب/ مرجع

Network security essentials : applications and standards

APA 

(2014). Network security essentials : applications and standards, Harlow: Pearson Education Limited.

MLA 

Network security essentials : applications and standards. Harlow: Pearson Education Limited, 2014.

Harvard 

2014. Network security essentials : applications and standards. Pearson Education Limited,

Chicago 

Network security essentials : applications and standards. Pearson Education Limited, 2014.

كتاب/ مرجع

Computer forensics : infoSec Pro guide

APA 

(2013). Computer forensics : infoSec Pro guide, New York: McGraw-Hill.

MLA 

Computer forensics : infoSec Pro guide. New York: McGraw-Hill, 2013.

Harvard 

2013. Computer forensics : infoSec Pro guide. McGraw-Hill,

Chicago 

Computer forensics : infoSec Pro guide. McGraw-Hill, 2013.

كتاب/ مرجع

Security + guide to network security fundamentals

APA 

(2012). Security + guide to network security fundamentals, Australia: Course Technology.

MLA 

Security + guide to network security fundamentals. Australia: Course Technology, 2012.

Harvard 

2012. Security + guide to network security fundamentals. Course Technology,

Chicago 

Security + guide to network security fundamentals. Course Technology, 2012.

كتاب/ مرجع

Handbook of research on emerging developments in data privacy

APA 

(2015). Handbook of research on emerging developments in data privacy, USA: IGI Global.

MLA 

Handbook of research on emerging developments in data privacy. USA: IGI Global, 2015.

Harvard 

2015. Handbook of research on emerging developments in data privacy. IGI Global,

Chicago 

Handbook of research on emerging developments in data privacy. IGI Global, 2015.

كتاب/ مرجع

Securing the virtual environment : how to defend the enterprise against attack

APA 

(2012). Securing the virtual environment : how to defend the enterprise against attack, New Delhi: Wiley India Pvt. Ltd.

MLA 

Securing the virtual environment : how to defend the enterprise against attack. New Delhi: Wiley India Pvt. Ltd, 2012.

Harvard 

2012. Securing the virtual environment : how to defend the enterprise against attack . Wiley India Pvt. Ltd,

Chicago 

Securing the virtual environment : how to defend the enterprise against attack . Wiley India Pvt. Ltd, 2012.

كتاب/ مرجع

CompTIA security + (Exam SYO-301) : training kit

APA 

(2014). CompTIA security + (Exam SYO-301) : training kit, New Delhi: PHI Learning Private Limited.

MLA 

CompTIA security + (Exam SYO-301) : training kit. New Delhi: PHI Learning Private Limited, 2014.

Harvard 

2014. CompTIA security + (Exam SYO-301) : training kit. PHI Learning Private Limited,

Chicago 

CompTIA security + (Exam SYO-301) : training kit. PHI Learning Private Limited, 2014.

كتاب/ مرجع

Network security

APA 

(2013). Network security, New Delhi: S. K. Kataria & Sons.

MLA 

Network security. New Delhi: S. K. Kataria & Sons, 2013.

Harvard 

2013. Network security. S. K. Kataria & Sons,

Chicago 

Network security. S. K. Kataria & Sons, 2013.

كتاب/ مرجع

Information security management handbook

APA 

(2012). Information security management handbook, London: CRC Press/ Taylor & Francis.

MLA 

Information security management handbook. London: CRC Press/ Taylor & Francis, 2012.

Harvard 

2012. Information security management handbook. CRC Press/ Taylor & Francis,

Chicago 

Information security management handbook. CRC Press/ Taylor & Francis, 2012.

كتاب/ مرجع

Computer security: principles and practice

APA 

(2015). Computer security: principles and practice , Boston: Pearson Education Limited.

MLA 

Computer security: principles and practice . Boston: Pearson Education Limited, 2015.

Harvard 

2015. Computer security: principles and practice . Pearson Education Limited,

Chicago 

Computer security: principles and practice . Pearson Education Limited, 2015.

كتاب/ مرجع

Cryptography and network security: principles and practice

APA 

(2014). Cryptography and network security: principles and practice, Boston: Pearson Education Limited.

MLA 

Cryptography and network security: principles and practice. Boston: Pearson Education Limited, 2014.

Harvard 

2014. Cryptography and network security: principles and practice. Pearson Education Limited,

Chicago 

Cryptography and network security: principles and practice. Pearson Education Limited, 2014.

كتاب/ مرجع

Core software security : security at the source

APA 

(2014). Core software security : security at the source, London: CRC Press, Taylor & Francis Group .

MLA 

Core software security : security at the source. London: CRC Press, Taylor & Francis Group , 2014.

Harvard 

2014. Core software security : security at the source. CRC Press, Taylor & Francis Group ,

Chicago 

Core software security : security at the source. CRC Press, Taylor & Francis Group , 2014.

كتاب/ مرجع

Secure and resilient software development

APA 

(2010). Secure and resilient software development, London: CRC Press/Taylor & Francis Group.

MLA 

Secure and resilient software development. London: CRC Press/Taylor & Francis Group, 2010.

Harvard 

2010. Secure and resilient software development. CRC Press/Taylor & Francis Group,

Chicago 

Secure and resilient software development. CRC Press/Taylor & Francis Group, 2010.

كتاب/ مرجع

Secure software design

APA 

(2013). Secure software design, Burlington: Johnes & Bartlett Learning.

MLA 

Secure software design. Burlington: Johnes & Bartlett Learning, 2013.

Harvard 

2013. Secure software design. Johnes & Bartlett Learning,

Chicago 

Secure software design. Johnes & Bartlett Learning, 2013.

كتاب/ مرجع

Principles of information security

APA 

(2016). Principles of information security, Boston: Cengage Learning.

MLA 

Principles of information security. Boston: Cengage Learning, 2016.

Harvard 

2016. Principles of information security. Cengage Learning,

Chicago 

Principles of information security. Cengage Learning, 2016.

كتاب/ مرجع

The web application : hacker's handbook

APA 

(2011). The web application : hacker's handbook, Indianapolis: Wiley Publishing , Inc..

MLA 

The web application : hacker's handbook. Indianapolis: Wiley Publishing , Inc., 2011.

Harvard 

2011. The web application : hacker's handbook. Wiley Publishing , Inc.,

Chicago 

The web application : hacker's handbook. Wiley Publishing , Inc., 2011.

كتاب/ مرجع

Computer security fundamentals

APA 

(2016). Computer security fundamentals, Indianapolis: Pearson Education.

MLA 

Computer security fundamentals. Indianapolis: Pearson Education, 2016.

Harvard 

2016. Computer security fundamentals. Pearson Education,

Chicago 

Computer security fundamentals. Pearson Education, 2016.

كتاب/ مرجع

Security + guide to network security fundamentals

APA 

(2018). Security + guide to network security fundamentals, Australia: Cengage Learning.

MLA 

Security + guide to network security fundamentals. Australia: Cengage Learning, 2018.

Harvard 

2018. Security + guide to network security fundamentals. Cengage Learning,

Chicago 

Security + guide to network security fundamentals. Cengage Learning, 2018.

كتاب/ مرجع

Foundations of information security : a straightforward introduction

APA 

(2019). Foundations of information security : a straightforward introduction, San Francisco: No Starch Press.

MLA 

Foundations of information security : a straightforward introduction. San Francisco: No Starch Press, 2019.

Harvard 

2019. Foundations of information security : a straightforward introduction. No Starch Press,

Chicago 

Foundations of information security : a straightforward introduction. No Starch Press, 2019.

كتاب/ مرجع

Security of web developers

APA 

(2016). Security of web developers, Beijing: O'Reilly Media.

MLA 

Security of web developers. Beijing: O'Reilly Media, 2016.

Harvard 

2016. Security of web developers. O'Reilly Media,

Chicago 

Security of web developers. O'Reilly Media, 2016.

كتاب/ مرجع

Security + guide to network security fundamentals

APA 

(2012). Security + guide to network security fundamentals, Australia: Course Technology.

MLA 

Security + guide to network security fundamentals. Australia: Course Technology, 2012.

Harvard 

2012. Security + guide to network security fundamentals. Course Technology,

Chicago 

Security + guide to network security fundamentals. Course Technology, 2012.

كتاب/ مرجع

Fintech law in a nutshell

APA 

(2020). Fintech law in a nutshell, Paul, MN.: West Academic Publishing.

MLA 

Fintech law in a nutshell. Paul, MN.: West Academic Publishing, 2020.

Harvard 

2020. Fintech law in a nutshell. West Academic Publishing,

Chicago 

Fintech law in a nutshell. West Academic Publishing, 2020.

كتاب/ مرجع

Cybersecurity risk management : mastering the fundamentals using the NIST cybersecurity framework

APA 

(2022). Cybersecurity risk management : mastering the fundamentals using the NIST cybersecurity framework, Hoboken: John Wiley & Sons.

MLA 

Cybersecurity risk management : mastering the fundamentals using the NIST cybersecurity framework. Hoboken: John Wiley & Sons, 2022.

Harvard 

2022. Cybersecurity risk management : mastering the fundamentals using the NIST cybersecurity framework. John Wiley & Sons,

Chicago 

Cybersecurity risk management : mastering the fundamentals using the NIST cybersecurity framework. John Wiley & Sons, 2022.

كتاب/ مرجع

Information security: principles and practice

APA 

(2022). Information security: principles and practice, Hoboken, New Jersey: Wiley .

MLA 

Information security: principles and practice. Hoboken, New Jersey: Wiley , 2022.

Harvard 

2022. Information security: principles and practice. Wiley ,

Chicago 

Information security: principles and practice. Wiley , 2022.

كتاب/ مرجع

Cryptography and network security: principles and practice

APA 

(2023). Cryptography and network security: principles and practice, Boston: Pearson Education Limited.

MLA 

Cryptography and network security: principles and practice. Boston: Pearson Education Limited, 2023.

Harvard 

2023. Cryptography and network security: principles and practice. Pearson Education Limited,

Chicago 

Cryptography and network security: principles and practice. Pearson Education Limited, 2023.

كتاب/ مرجع

Fintech : hacking, blockchain, big data, cryptocurrency (financial technology, smart contracts, digital banking, Internet technology)

APA 

(2017). Fintech : hacking, blockchain, big data, cryptocurrency (financial technology, smart contracts, digital banking, Internet technology) , UK: EPR Bublishing.

MLA 

Fintech : hacking, blockchain, big data, cryptocurrency (financial technology, smart contracts, digital banking, Internet technology) . UK: EPR Bublishing, 2017.

Harvard 

2017. Fintech : hacking, blockchain, big data, cryptocurrency (financial technology, smart contracts, digital banking, Internet technology) . EPR Bublishing,

Chicago 

Fintech : hacking, blockchain, big data, cryptocurrency (financial technology, smart contracts, digital banking, Internet technology) . EPR Bublishing, 2017.

كتاب/ مرجع

Fundamentals of information systems security

APA 

(2023). Fundamentals of information systems security, Burlington: Jones & Bartlett Learning.

MLA 

Fundamentals of information systems security. Burlington: Jones & Bartlett Learning, 2023.

Harvard 

2023. Fundamentals of information systems security. Jones & Bartlett Learning,

Chicago 

Fundamentals of information systems security. Jones & Bartlett Learning, 2023.


للمزيد من المعلومات.:  هاتف: 4799000   قسم الخدمات الفنية / فرعي: 2377  بريد إلكتروني: Circ_Library@philadelphia.edu.jo