Your search returned 31 results. Subscribe to this search

|
1. Auditing Information Systems / by Champlain, Jack . Publication: MA,U.S.A : John Wiley&Sons,Inc./U, 2003 . 43 P. Date: 2003 Availability: Items available: (2),

2. Compuetr Security Fundamentals / by Easttom, Chuck . Publication: NJ,U.S.A : Prentice Hall /Pearson Education, 2006 . 345 P. Date: 2006 Availability: Items available: (1),

3. The Design of Rijndael :AES- The Advanced Encryption Standard / by Daemen, Joan . Publication: Berlin,Germany : Springer, 1998 . 238 P. Date: 1998 Availability: Items available: (2),

4. Classical and Contemporary Cryptology / by Spillman, Richard J. . Publication: NJ,U.S.A : Pearson/Prentice Hall, 2005 . 285 P. Date: 2005 Availability: Items available: (2),

5. Cryptography: An Introduction / by Smart, Nigel . Publication: London, England : McGraw Hill/ E, 2003 . 433 P. Date: 2003 Availability: Items available: (4),

6. Cryptography and Network Security : Principles and Practice / by Stallings, William . Publication: NJ, U.S.A : Prentice Hall /Pearson Education, 2006 . 680 P. Date: 2006 Availability: Items available: (2),

7. Percluding Software Piracy Using Asymmetric Cryptography / by Jabber, Zeana Satter . Publication: عمان : 2009 . 64 P. Date: 2009 Availability: No items available:

8. Encryption: protecting your data / by Fadia, Ankit . Publication: Delhi : Vikas Publishing House Pvt Ltd, 2007 . 284 P. Date: 2007 Availability: Items available: (2),

9. Anonymous and non-repudiation E-cash scheme based on partially blind sigature / by almatari, hani M. . Publication: . 130 P. Availability: No items available:

10. Secure Authentication Protocol and Key Agreement for Mobile Networks Using Public-Key Cryptography / by Fayoumi, Haneen Mohammed Al . Publication: Amman 2016 . 121 P. Date: 2016 Availability: No items available:

11. enhancing the bellovin and cheswick's algorithm by adding dummy values and reoder process / by eshtaiwi, fadi yousef ali . Publication: . 103 P. Availability: No items available:

12. An enhanced technique for segmentation and encrypt data to storing in cloud computing / by aldhaheri, talal abdulkarem . Publication: . 75 P. Availability: No items available:

13. Enhancing open space method in data hiding technique - text under text / by abdallah, yaman fakhri issa . Publication: . 98 P. Availability: No items available:

14. Text Hiding in (RGBA) Images Using the Alpha Channel and Indicator Method / by Sarayreh, Ghaith Salem . Publication: Amman : 2014 . 60 P. Date: 2014 Availability: No items available:

15. New Method for Image Inside Image Steganography / by Faleh, Ahmad . Publication: Amman : 2014 . 68 P. Date: 2014 Availability: No items available:

16. new techniqure to embed encrypted or code in colored image by using first and third lsb / by abdulrahman, muataz safauldeen . Publication: amman : 2001 . 73 P. Date: 2001 Availability: No items available:

17. An Enhanced Classifier for an Authentication in Keystroke Dynamics Using Experimental Data / by Al, Abdullah Osamah . Publication: Amman : 2014 . 80 P. Date: 2014 Availability: No items available:

18. A secure Home Appliiances Remote Control Model / by Jasim, Mohammed Mohammed . Publication: Amman : 2014 . 65 P. Date: 2014 Availability: No items available:

19. Comparative Analysis of the Performance for Cloud Computing Hypervisors with Encrypted Algorithms / by Abdulraheem, Waleed Khaled Amin . Publication: Amman : 2014 . 100 P. Date: 2014 Availability: No items available:

20. Hiding Secrete Images within RG B Images Using an Enhanced L S B Method / by Qasem, Mohamed Zeyad Al Haj . Publication: Amman : 2014 Date: 2014 Availability: No items available:

Powered by Koha