Staff Portal
Ekram Habeeb Hasan Al-Daheri (Assistant Lecturer)

MSc in Computer Science - Network Security

General Science - Basic Education - Haditha
ekram.habeeb@uoanbar.edu.iq


Biography

 The Full Name: Ekram  Habeeb  Hasan Al-Dahri

 Place of Residence:Al_ Anbar - Haditha - Bani Daher

 Place of work: - Ministry of Higher Education and Scientific Research - University of Anbar - College of Basic Education / Haditha

 G-mail: ekram.habeeb@uoanbar.edu.iq

 General specialization: - Computer science

  Specialization: Network Security

 Position: - Teaching

 Academic Degree: - Assistant  Teacher

Publication

The year

place of publication

Search Name

No.

2013

 

i-manager’s Journal on Information Technology, Vol. 2 ,No. 2

Biometric-Based Authentication and Key Management Scheme for WBANs

1

April 2014

 

First Scientific conference, University of Human Development

Development and Simulation of Enhanced Key Management Scheme for WBANs

2

Lectures


No. Subjects Lectures Stage File Video
1 Computer introduction to computer sience First
2 Computer haraware First
3 Computer outputdevices and memory First
4 Computer storage devices First
5 Computer software First
6 Computer numerical system First
7 Computer operating system First
8 Computer dealing with windows First
9 Computer files and folders First
10 Computer References First
11 Computer network and internet Third
12 Computer protocols and web adress Third
13 Computer search by internet Third
14 Computer email and it's using Third
15 Computer power point Third
16 Computer texts proccing in slides Third
17 Computer slides design Third
18 Computer transions effects Third
19 Computer slide view Third
20 Computer References Third
21 Computer Run Word Application And Identify It's Parts Second
22 Computer Format Texts Tools Second
23 Computer Texts Numbering Second
24 Computer Find And Replace Second
25 Computer Insert Elements Second
26 Computer Format Pages Second
27 Computer Networks and Internets Second
28 Computer Protocols and Websites Second
29 Computer Research in Internet Second
30 Computer G-Mail Second
31 Computer References Second
32 Computer describe sheets Fourth
33 Computer entering data end deal with it Fourth
34 Computer dealing with column and rows Fourth
35 Computer sorting data Fourth
36 Computer find and replace Fourth
37 Computer mathematic formla Fourth
38 Computer functions Fourth
39 Computer function 2 Fourth
40 Computer if function Fourth
41 Computer Charts Fourth
42 Computer References Fourth

Other

Security ,Wireless Network,ETL , Data Warehouse, Cryptography,