JavaScript & Security: An Introduction
Ahmed Khelfa Obeid Al-Ajeli
Cybersecurity Department
Stage: third
the study: Morning
05/6/2023
16
Lecture3
Shahad A. Hussein
Cybersecurity Department
Stage: third
the study: Morning
30/5/2023
15
Linear Regression-Lab
Noor Fadel Hussain
Cybersecurity Department
Stage: fourth
the study: Morning
30/5/2023
6
laboratory of the K-Means clustering algorithm
Noor Fadel Hussain
Cybersecurity Department
Stage: fourth
the study: Morning
30/5/2023
6
Protection Rings
Wesam Sameer AbdAli Bhaya
Cybersecurity Department
Stage: third
the study: Morning
29/5/2023
7
OS Protection 2
Wesam Sameer AbdAli Bhaya
Cybersecurity Department
Stage: third
the study: Morning
29/5/2023
7
Protection and Security of OS
Wesam Sameer AbdAli Bhaya
Cybersecurity Department
Stage: third
the study: Morning
29/5/2023
7
Introduction to Security Intelligence
Mohammed Ibrahim Kareem
Cybersecurity Department
Stage: fourth
the study: Morning
29/5/2023
17
Introduction to Cryptographic Algorithms
Alharith A. Abdullah
Cybersecurity Department
Stage: second
the study: Morning
29/5/2023
25
Logic Design / Lecture Seven
Rasim Azeez Kadhim
Cybersecurity Department
Stage: first
the study: Morning
27/1/2023
44
Logic Design / Lecture Six
Rasim Azeez Kadhim
Cybersecurity Department
Stage: first
the study: Morning
27/1/2023
21
Logic Design / Lecture Five
Rasim Azeez Kadhim
Cybersecurity Department
Stage: first
the study: Morning
27/1/2023
23