Upload
others
View
3
Download
0
Embed Size (px)
Citation preview
Library Department
F343, Rev. a
Ref.: Deans' Council Session (19/2018-2019), Decision No.: 10, Date: 05/03/2019
1-10
دائرة المكتبة يفقائمة عناوين الكتب التي وصلت حديثاً
كلية العلوم الحاسوبية والمعلوماتية سنة النشر الناشر المؤلف الرقم
1. Modern Systems Analysis and Design
(textbook)
Joseph s.valacich
Joey f.george
2017
2. Software
Engineering Design : theory and practice
(textbook)
Carlos E. Otero 2012
3. Introduction to software testing
(textbook)
Paul Ammann
Jeff Offutt
2017
4. Software Architecture in Practice
(textbook)
Len Bass,
Paul Clements
Rick Kazman
2013
5. Data Structures and algorithms analysis
in C++ (textbook)
Mark allen Weiss 2013
6. Operating System Concepts (textbook) A. Silberschatz,
P. Galvin,
G. Gagne
2013
7. Hands-On Mobile App Testing: A Guide
for Mobile Testers and Anyone Involved
in the Mobile App Business (textbook)
Daniel Knott 2015
8. Google Flutter Mobile Development
Quick Start Guide. Giordano (textbook)
Prajyot Mainkar,
Salvatore.
2019
Library Department
F343, Rev. a
Ref.: Deans' Council Session (19/2018-2019), Decision No.: 10, Date: 05/03/2019
2-10
9. Internet and World Wide Web How To
Program (textbook)
Deitel & Deitel 2012
10. Software Engineering (textbook) Sommerville 2016
11. Interaction Design: Beyond Human-
Computer Interaction
(text book)
Helen sharp 2019
12. Software Requirements (Developer Best
Practices) (textbook)
Karl Wiegers 2013
13. complete virtual reality and augmented
reality development with unity: levarge
the power of unity and become a pro at
creating mixed reality applications
Jonathan linowes,
jesses Glover
2019
14. data warehouse automation : a pragmatic
guide to the easiest and fastest
development of your data warehouse
martin gandalson 2018
15. Artificial intelligence Kaleb Stirling. 2019
16. Mobile computing principles Reza B’FAR 2005
17. Headfirst android development
development: a brain – friendly guide.
Dawn Griffiths.
2017
2018
18. 5g nr: architecture, technology,
implementation, and operation of 3gpp
new radio standards.
Sassan Ahmadi 2019
19. Introduction to algorithms for data
mining and machine learning
Xin-she yang 2019
20. Python scripting for computational
science
Hans’s petter Langtangen. 2008
21. fundamentals of information system
security
David Kim Michael
G.solomon
2016
2017
22. Fundamentals of database systems Remez elmasri 2017
Library Department
F343, Rev. a
Ref.: Deans' Council Session (19/2018-2019), Decision No.: 10, Date: 05/03/2019
3-10
23. Database system concept Abraham silberschatz 2019
2020
24. Logic and computer design fundamentals Charles R.kime and moris
mano.
2016
25. C++ programming: from problem
analysis to program design
D.S Malik.
2017
26. C++how to program. Paul dietel and Harvey
dietel.
2017
27. Unity in action: multiplatform game
development in c# with unity 5
Joseph hocking 2019
28. Android programming: the big nerd
ranch guide
Bill Philips, Chris Stewart.
Brian hardy and Kristin
marsicano.
2017
29. Multi clouds for architects. Florian klaffenbach, Markus
lien and Suresh sundaresan.
2019
30. Implementing cloud design patterns for
aws
Sean keery, Clive harber,
Marcus young
2019
31. Microsoft azure SQL data warehouse a
complete guide
geradus blokdyk 2018
32. Introduction to algorithms Thomas h.corman 2009
Library Department
F343, Rev. a
Ref.: Deans' Council Session (19/2018-2019), Decision No.: 10, Date: 05/03/2019
4-10
الامن السبيراني
1. Wireless Communication Networks and Systems Cory Beard, William Stallings 2015
2. Emerging Wireless Communication and Network Technologies (Principle, Paradigm and Performance)
Arya, Karm Veer, Bhadoria, Robin Singh, Chaudhari, Narendra S 2018
3. Wireless Networking Principles: From Terrestrial to Underwater Acoustic
Gordon Colbach
2017
4. Wireless Networking: Introduction to Bluetooth and WiFi
Gordon Colbach
2017
5. Wireless Communication Networks and Internet of Things
Adamu Murtala ZungeruS SubashiniP Vetrivelan
2019
6. The Wireless Internet of Things: A Guide to the Lower Layers Daniel Chew 2018
7.
Automatic Intrusion Prevention Technique to Improve Network Security: Intrusion Detection System (IDS), Intrusion Prevention System (IPS) and Firewall to secure the network
Diyar Salah Fadhil Samir Al-Khayatt 2016
8. Network Traffic Anomaly Detection and Prevention: Concepts, Techniques, and Tools (Computer Communications and Networks)
Monowar H. Bhuyan , Dhruba K. Bhattacharyya, Jugal K. Kalita
2018
9. Guide to Computer Network Security (Computer Communications and Networks) Joseph Migga Kizza
10. Network Security Essentials: Applications and Standards William Stallings 2016
11. Handbook of e-Business Security
João Manuel R.S. Tavares, Brojo Kishore Mishra, 2018
Library Department
F343, Rev. a
Ref.: Deans' Council Session (19/2018-2019), Decision No.: 10, Date: 05/03/2019
5-10
Raghvendra Kumar, Noor Zaman, Manju Khari
12. Secure Enough?: 20 Questions on Cybersecurity for Business Owners and Executives Hardcover Bryce Austin 2017
13. Fundamentals of Information Systems Security
David Kim, Michael G. Solomon 2016
14. Management of Information Security
Michael Whitman, Herbert Mattord 2016
15. Foundations of Information Security: A Straightforward Introduction Jason Andress 2019
16.
Information Security Management Principles
Andy Taylor, David Alexander, Amanda Finch, David Sutton 2020
17. Cybersecurity Is Everybody's Business: Solve the Security Puzzle for Your Small Business and Home
Scott N Schober, Craig W Schober 2019
18.
Cybersecurity Essentials
Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short 2018
19. Effective Cybersecurity: A Guide to Using Best Practices and Standards 1st Edition William Stallings 2018
20. Principles of Cybersecurity Linda Lavender 2018
21. Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Dr. Erdal Ozkaya 2019
22. Cybersecurity for Beginners 2nd Edition Raef Meeuwisse 2017
23. Introduction to Cryptography
Sahadeo Padhye, Rajeev A. Sahu, Vishal Saraswat 2018
24. Serious Cryptography: A Practical Introduction to Modern Encryption Jean-Philippe Aumasson 2017
Library Department
F343, Rev. a
Ref.: Deans' Council Session (19/2018-2019), Decision No.: 10, Date: 05/03/2019
6-10
25. Introduction to Certificateless Cryptography
Hu Xiong, Zhen Qin, Athanasios V. Vasilakos 2016
26. Practical Cryptography in Python: Learning Correct Cryptography by Example
Seth James Nielson, Christopher K. Monson 2019
27.
Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction
Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller, Steven Goldfeder 2016
28. Transformation of Cryptography: Fundamental concepts of Encryption, Milestones, Mega-Trends and sustainable Change in regard to Secret Communications and its Nomenclatura
Linda A. Bertram, Gunther van Dooble
2019
29. Beginning Ethical Hacking with Kali Linux : Computational Techniques for Resolving Security Issues Sanjib Sinha 2018
30. Ethical Hacking: A Comprehensive Beginner's Guide to Learn About the Effective Strategies of Ethical Hacking Elijah Lewis 2020
31. Certified Ethical Hacker (CEH) Version 10 Cert Guide Omar Santos, Michael Gregg 2019
32. CEH Certified Ethical Hacker Bundle, Fourth Edition Matt Walker 2019
33. Network Monitoring and Control A Complete Guide - 2020 Edition Gerardus Blokdyk 2019
34. The Practice of Network Security Monitoring: Understanding Incident Detection and Response Richard Bejtlich 2013
35. Defending IoT Infrastructures with the Raspberry Pi: Monitoring and Detecting Nefarious Behavior in Real Time Chet Hosmer 2018
Library Department
F343, Rev. a
Ref.: Deans' Council Session (19/2018-2019), Decision No.: 10, Date: 05/03/2019
7-10
36. TCP/IP Illustrated, Volume 1: The Protocols
Kevin R. Fall, W Richard Stevens 2011
37. Python: Cyber Security and Python
Programming Step-by-Step Guides Hacking Studios 2017
38. Computer Programming and Cyber Security
for Beginners: This Book Includes: Python
Machine Learning, SQL, Linux, Hacking
with Kali Linux, Ethical Hacking. Coding
and Cybersecurity Fundamentals
Zach Codings
2019
39. Cracking Codes with Python: An
Introduction to Building and Breaking
Ciphers
Al Sweigart
2018
40. Hacking: World Class Hacking, Python and
Cyber Security Strategies for Up-and-
Coming Hackers
Hacking Studios
2017
41. PYTHON & HACKING BUNDLE: 3
BOOKS IN 1: THE BLUEPRINT:
Everything You Need to Know For Python
Programming and Hacking!
CyberPunk Architects
2018
42. Digital Forensics André Årnes
2017
43.
Digital Forensics
Anders Flaglien Inger Marie Sunde Ausra Dilijonaite Jeff Hamm Jens Petter Sandvik Petter Bjelland Katrin Franke Stefan Axelsson
2017
44. Fundamentals of Digital Forensics Theory, Methods, and Real-Life Applications Joakim Kävrestad
45. Cybercrime and Digital Forensics: An Introduction
Thomas J. Holt, Adam M. Bossler, Kathryn C. Seigfried-Spellar
2017
46. Wireless Network Security A Beginner's Guide Tyler Wrightson 2012
Library Department
F343, Rev. a
Ref.: Deans' Council Session (19/2018-2019), Decision No.: 10, Date: 05/03/2019
8-10
47. Wireless and Mobile Device Security Jim Doherty
2015
48. Hacking Exposed Wireless, Third Edition: Wireless Security Secrets & Solutions
Joshua Wright, Johnny Cache
2015
49. Wireless Networks Technology and Cybersecurity
Sarhan M. Musa
2020
50. Hacking Wireless Networks - The
ultimate hands-on guide Mr Andreas Kolokithas 2015
51. IoT Security: Advances in Authentication
Madhusanka Liyanage, An Braeken, Pardeep Kumar, Mika Ylianttila 2020
52. Practical Internet of Things Security -
Drew Van Duren, Brian Russell 2016
53. Practical Internet of Things Security
Brian Russell, Drew Van Duren
2016
54. The IoT Hacker's Handbook: A Practical Guide to Hacking the Internet of Things
Aditya Gupta
2019
55. The IoT Architect's Guide to Attainable Security and Privacy
Damilare D. Fagbemi, David M Wheeler, JC Wheeler
2019
56. Practical Industrial Internet of Things Security: A practitioner's guide to securing connected industries Sravani Bhattacharjee
2018
57. Cloud Computing Security: Foundations and Challenges
John R. Vacca
2016
58. Practical Cloud Security: A Guide for Secure Design and Deployment
Chris Dotson
2019
Library Department
F343, Rev. a
Ref.: Deans' Council Session (19/2018-2019), Decision No.: 10, Date: 05/03/2019
9-10
59. Enterprise Cloud Security and Governance: Efficiently set data protection and privacy principles
Zeal Vora
2017
60. Security, Privacy, and Digital Forensics in the Cloud
Lei Chen, Hassan Takabi, Nhien-An Le-Khac 2019
61. Securing the Cloud: Security Strategies for the Ubiquitous Data Center
Curtis Franklin Jr., Brian Chee
2019
62. Cloud Security: A Comprehensive Guide to Secure Cloud Computing
Ronald L. Krutz, Russell Dean Vines
2010
63. Security Designs for the Cloud, IoT, and Social Networking
: Dac‐Nhuong, Le Chintan Bhatt, Mani Madhukar 2019
64.
Analyzing and Securing Social Networks
Bhavani Thuraisingham, Satyen Abrol, Raymond Heatherly, Murat Kantarcioglu, Vaibhav Khadilkar, Latifur Khan
2016
65. Security, Privacy, and Anonymization in Social Networks: Emerging Research and Opportunities (Advances in Information Security, Privacy, and Ethics) B. K. Tripathy, Kiran Baktha
2018
66. Protocols for Secure Electronic Commerce Mostafa Hashem Sherif 2016
67. Cryptographic Solutions for Secure Online Banking and Commerce
Kannan Balasubramanian, K. Mala, M. Rajakani 2016
68. Elementary Information Security: With Navigate Premier Package Richard E. Smith 2019
69. Foundations of Security, Protocols, and Equational Reasoning: Essays Dedicated to Catherine A. Meadows (Security and Cryptology Book 11565)
Joshua D. Guttman, Carl E. Landwehr, José Meseguer, Dusko Pavlovic 2019
Library Department
F343, Rev. a
Ref.: Deans' Council Session (19/2018-2019), Decision No.: 10, Date: 05/03/2019
10-10
70. Wireless Networking Principles: From Terrestrial to Underwater Acoustic
Gordon Colbach
2018