Your search returned 10 results. Subscribe to this search

|
1. Cryptography and Network Security : Principles and Practice / by Stallings, William . Publication: NJ, U.S.A : Prentice Hall /Pearson Education, 2006 . 680 P. Date: 2006 Availability: Items available: (2),

2. Percluding Software Piracy Using Asymmetric Cryptography / by Jabber, Zeana Satter . Publication: عمان : 2009 . 64 P. Date: 2009 Availability: No items available:

3. An enhanced technique for segmentation and encrypt data to storing in cloud computing / by aldhaheri, talal abdulkarem . Publication: . 75 P. Availability: No items available:

4. Enhancing open space method in data hiding technique - text under text / by abdallah, yaman fakhri issa . Publication: . 98 P. Availability: No items available:

5. An Enhanced Classifier for an Authentication in Keystroke Dynamics Using Experimental Data / by Al, Abdullah Osamah . Publication: Amman : 2014 . 80 P. Date: 2014 Availability: No items available:

6. A secure Home Appliiances Remote Control Model / by Jasim, Mohammed Mohammed . Publication: Amman : 2014 . 65 P. Date: 2014 Availability: No items available:

7. Comparative Analysis of the Performance for Cloud Computing Hypervisors with Encrypted Algorithms / by Abdulraheem, Waleed Khaled Amin . Publication: Amman : 2014 . 100 P. Date: 2014 Availability: No items available:

8. Hiding Secrete Images within RG B Images Using an Enhanced L S B Method / by Qasem, Mohamed Zeyad Al Haj . Publication: Amman : 2014 Date: 2014 Availability: No items available:

9. New Technique for Cross - Platform Availability Control over Electronic Messages / by Al, Ward Ahmed . Publication: Amman : 2015 . 100 P. Date: 2015 Availability: No items available:

10. Cryptography and network security : principles and practices / by Stallings, William . Publication: N.J. : Pearson/Prentice Hall, 2006 . 680 P. Date: 2006 Availability: Items available: (1),

Powered by Koha