Channel Avatar

Etihad IT HU @UClNIhs0blvx7xw9cYCUSs6A@youtube.com

6.1K subscribers - no pronouns :c

قناة خاصة بفريق الاتحاد-الجامعة الهاشمية تسعى للاهتمام بأمور


32:02
Analysis || chapter 7 part5
06:51
Information Systems Security ( Security CIS ) || Modern Block Ciphers part3
28:31
Information Systems Security (Security CIS) || Key Management part4 & Message Authentication part1
44:20
Information Systems Security(Security CIS)||Computer and Network security part2&Classical Encryption
32:11
Information Systems Security (Security CIS) || Classical Encryption Techniques part4
12:19
Information Systems Security (Security CIS) || Computer and Network security concepts part1
47:58
Information Systems Security (Security CIS) || Classical Encryption Techniques part3
27:25
Information Systems Security (Security CIS) || Message Authentication and Hash Functions part3
30:48
Information Systems Security (Security CIS) || Modern Block Ciphers part4
33:59
Information Systems Security (Security CIS) || Message Authentication and Hash Functions part2
44:13
Information Systems Security (Security CIS) || Modern Block Ciphers part2
30:40
Information Systems Security (Security CIS) || Classical Encryption Techniques part5
29:25
Information Systems Security (Security CIS) || Key Management part2
31:39
Information Systems Security (Security CIS) || Key Management part3
50:13
Information Systems Security (Security CIS) || Modern Block Ciphers part1
48:59
Information Systems Security (Security CIS) || Classical Encryption Techniques part2
31:55
Information Systems Security (Security CIS) || Cryptography and Network Security #2&Key Management#1
37:04
Information Systems Security (Security CIS) || Cryptography and Network Security part1
01:05:02
Computer Organization || Chapter 12 part 1
01:01:59
How to Find Internship and Prepare CV (With Alaa Al-Muhsen)
01:02:41
Computer Organization || Chapter 9 part 2
01:05:43
Computer Organization || Chapter 1
54:31
Information Security Protocols || Application Layer part1
44:23
Information Security Protocols || SSL/TLS: Security Protocols at the Transport Layer part1
33:52
Information Security Protocols || Transport Layer part3
38:54
Information Security Protocols || Transport Layer part2
34:30
Information Security Protocols || Transport Layer part1
51:01
Information Security Protocols || Network Layer Protocols part1
01:08:27
Information Security Protocols || Transport Layer part4
54:55
Information Security Protocols || Introduction Revision & Modern Network Security Threats part1
52:00
Information Security Protocols || Network Layer part2
33:52
Information Security Protocols || Transport Layer part3
56:29
Information Security Protocols || Mobile Internet Protocol (Mobile IP) part2
01:00:22
Information Security Protocols Layer 2 Security Threats part2
40:58
Information Security Protocols || SSL/TLS: Security Protocols at the Transport Layer part4
01:02:56
Information Security Protocols || SSL/TLS: Security Protocols at the Transport Layer part2
54:56
Information Security Protocols || SSL/TLS: Security Protocols at the Transport Layer part3
54:12
Information Security Protocols || Network Layer Protocols part2 & Mobile Internet Protocol part1
59:15
Information Security Protocols || Network Layer part1
51:58
Information Security Protocols || Application Layer part2
01:02:55
Information Security Protocols || Network standards & the OSI model
01:08:31
Information Security Protocols || Layer 2 Security Threats part1
49:01
Information Security Protocols Modern Network Security Threats part2
37:54
Information Security Protocols || Application Layer part3
06:18
كيفية التعامل مع مصادر المواد
01:08:52
Numerical || Interpolating polynomial
45:47
Database || Relational Model part 4
14:12
Learn VB net In Arabic 2021 || 14 || nested Loop
38:42
Learn VB net In Arabic 2021 || 10 part 2 || formatting output
59:10
Database || Normalization
22:12
Database || Normalization - GuideLines part 2
43:43
Database || Normalization - GuideLines part 1
43:42
Database || Functional Dependency part 2
32:59
Database || Functional Dependency part 1
35:37
Database || SQL part 6
14:02
Database || SQL part 5
55:49
Database || SQL part 4
53:26
Database || SQL part 3
46:18
Database || SQL part 2
30:17
Database || SQL part 1