Your search returned 29 results. Subscribe to this search

|
1. Secrets and Lies : Digital Security in a Networked World / by Schneier, Bruce . Publication: MA,U.S.A : John Wiley&Sons,Inc./U, 2004 . 414 P. Date: 2004 Availability: Items available: (2),

2. Principles of Information Security / by Whitman, Michael E. . Publication: MA,U.S.A : Thomson /Course Technology, 2005 . 576 P. Date: 2005 Availability: Items available: (2),

3. Information Security :Principles and Practices / by Merkow, Mark S. . Publication: NJ,U.S.A : Prentice Hall /Pearson Education, 2006 . 420 P. Date: 2006 Availability: Items available: (1),

4. Practical Cryptography / by Ferguson, Niels . Publication: MA,U.S.A : Wiley Publishing,Inc.,, 2003 . 410 P. Date: 2003 Availability: Items available: (4),

5. Security in Computing / by pfleeger, Charles P. . Publication: NJ,U.S.A : Prentice Hall/PTR, 2003 . 746 P. Date: 2003 Availability: Items available: (2),

6. Applied Cryptography : Protocols,Algorithms,and Source Code in C / by Schneier, Bruce . Publication: NY ,U.S.A : John Wiley&Sons,Inc./U, 1996 . 758 P. Date: 1996 Availability: Items available: (2),

7. Crytography Demystified / by Hershey, John E. . Publication: NY, U.S.A : McGraw-Hill/Irwin, 2003 . 356 P. Date: 2003 Availability: Items available: (2),

8. Cryptography: An Introduction / by Smart, Nigel . Publication: London, England : McGraw Hill/ E, 2003 . 433 P. Date: 2003 Availability: Items available: (4),

9. Introduction to Computer Security / by Bishop, Matt . Publication: MA,U.S.A : Addison-Wesley/Pearson. U, 2005 . 747 P. Date: 2005 Availability: Items available: (4),

10. Design Secure E-Voting Scheme / by Hnaity, Omar Al . Publication: Amman : 2008 Date: 2008 Availability: No items available:

11. Secure Designated Signature Scneme / by Hamdan, Ala`a Ali . Publication: Amman : 2008 . 68 P. Date: 2008 Availability: No items available:

12. Percluding Software Piracy Using Asymmetric Cryptography / by Jabber, Zeana Satter . Publication: عمان : 2009 . 64 P. Date: 2009 Availability: No items available:

13. Cryptography and Network Security. / by A.Forouzan, Behrouz . Publication: New York : McGraw Hill/ E, 2008 . 720 P. Date: 2008 Availability: Items available: (1),

14. Cryptography and information security / by Pachghare, V. k. . Publication: New Delhi : PHI, 2009 . 367 P. Date: 2009 Availability: Items available: (1),

15. Introduction to Cryptography with Coding Theory / by Trappe, Wade . Publication: New Jersey : Prentice Hall /Pearson Education, 2006 . 576 P. Date: 2006 Availability: Items available: (2),

16. Designing A Secure E- Payment protocol / by Al, Mahmmoud Muslem Ishtean . Publication: Amman : 2009 . 43 P. Date: 2009 Availability: No items available:

17. Anonymous and non-repudiation E-cash scheme based on partially blind sigature / by almatari, hani M. . Publication: . 130 P. Availability: No items available:

18. Mobile Trade Agent Security / by alqudsy, zainab nouman yousif . Publication: . 74 P. Availability: No items available:

19. enhancing the bellovin and cheswick's algorithm by adding dummy values and reoder process / by eshtaiwi, fadi yousef ali . Publication: . 103 P. Availability: No items available:

20. Enhancing open space method in data hiding technique - text under text / by abdallah, yaman fakhri issa . Publication: . 98 P. Availability: No items available:

Powered by Koha