Your search returned 6 results. Subscribe to this search

|
1. Introduction to Computer Security / by Bishop, Matt . Publication: MA,U.S.A : Addison-Wesley/Pearson. U, 2005 . 747 P. Date: 2005 Availability: Items available: (4),

2. Percluding Software Piracy Using Asymmetric Cryptography / by Jabber, Zeana Satter . Publication: عمان : 2009 . 64 P. Date: 2009 Availability: No items available:

3. Introduction to Cryptography with Coding Theory / by Trappe, Wade . Publication: New Jersey : Prentice Hall /Pearson Education, 2006 . 576 P. Date: 2006 Availability: Items available: (2),

4. Mobile Trade Agent Security / by alqudsy, zainab nouman yousif . Publication: . 74 P. Availability: No items available:

5. Secure Authentication Protocol and Key Agreement for Mobile Networks Using Public-Key Cryptography / by Fayoumi, Haneen Mohammed Al . Publication: Amman 2016 . 121 P. Date: 2016 Availability: No items available:

6. Image Steganography Based on Discrete Wavelet Transform and Enhancing Resilient Backpropogation Neural Network / by Al, Ahmed Shihab Ahmed . Publication: Amman : 2015 . 96 P. Date: 2015 Availability: No items available:

Powered by Koha