Etihad IT HU
قناة خاصة بفريق الاتحاد-الجامعة الهاشمية تسعى للاهتمام بأمور الطلبة في كلية تكنولوجيا المعلومات

Web mid revision (Part 1) || By Anas Alnsour

Web mid revision (Part 2) || By Anas Alnsour

Web mid revision (Part 3) || By Anas Alnsour

Git/Github with Ahmad Hattab

How to Create a Professional Profile and Network Effectively in LinkedIn || With Khaled ElAhmad

Analysis || chapter 7 part5

Information Systems Security ( Security CIS ) || Modern Block Ciphers part3

Information Systems Security (Security CIS) || Key Management part4 & Message Authentication part1

Information Systems Security(Security CIS)||Computer and Network security part2&Classical Encryption

Information Systems Security (Security CIS) || Classical Encryption Techniques part4

Information Systems Security (Security CIS) || Computer and Network security concepts part1

Information Systems Security (Security CIS) || Classical Encryption Techniques part3

Information Systems Security (Security CIS) || Message Authentication and Hash Functions part3

Information Systems Security (Security CIS) || Modern Block Ciphers part4

Information Systems Security (Security CIS) || Message Authentication and Hash Functions part2

Information Systems Security (Security CIS) || Modern Block Ciphers part2

Information Systems Security (Security CIS) || Classical Encryption Techniques part5

Information Systems Security (Security CIS) || Key Management part2

Information Systems Security (Security CIS) || Key Management part3

Information Systems Security (Security CIS) || Modern Block Ciphers part1

Information Systems Security (Security CIS) || Classical Encryption Techniques part2

Information Systems Security (Security CIS) || Cryptography and Network Security #2&Key Management#1

Information Systems Security (Security CIS) || Cryptography and Network Security part1

Computer Organization || Chapter 12 part 1

How to Find Internship and Prepare CV (With Alaa Al-Muhsen)

Computer Organization || Chapter 9 part 2

Computer Organization || Chapter 1

Information Security Protocols || Application Layer part1

Information Security Protocols || SSL/TLS: Security Protocols at the Transport Layer part1

Information Security Protocols || Transport Layer part3