Explore our comprehensive collection of books, articles, digital media, and more
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /
Information security : principles and practices /
Information security : principles and practice /
Management of information security /
Information security : a strategic approach /
Principles of information security /
Next generation information technologies and systems : 6th international conference, NGITS 2006, Kibbutz Shefayim, Israel, July 4-6, 2006 : proceedings /
Distributed computing and networking : 8th international conference, ICDCN 2006, Guwahati, India, December 27 - 30, 2006 ; proceedings /
Information security fundamentals /
Information security and IT risk management /
Managing information systems security and privacy /
Computer and information security handbook /
Mathematical foundations of computer science 2006 : 31th international symposium, MFCS 2006, StaraLesna, Slovakia, August 28- September 1, 2006 : proceedings /
Algorithmic aspects in information and management : second international conference, AAIM 2006, Hong Kong, China, June 20-22, 2006 : proceedings /
Principles of information systems security : text and cases /
Geographic information science : 4th international conference, GIScience 2006, Munster, Germany, September 20-23, 2006 : proceedings /
The History of information security : A Comprehensive Handbook /
Integrating security and software engineering : advances and future visions /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Encyclopedia of information ethics and security /
Information hiding technique in digital image using transform domain \
Foundations of computer science : from data manipulation to theory of computation /
Network security : private communication in a public world /
Bi-directional transition mechanism between IPv4 and IPv6 \
The art of software security assessment : identifying and preventing software vulnerabilities /
Risk Assessment in Cyber-Physical System /
Foundations of computer security /
A method for improving the Bluetooth key exchange security /
A hybrid fingerprint identification & verification algorithm \
Computer security : principles and practice /
Security in computing /
Computing concepts with C++ essentials /
International Computing Symposium, 1977 : proceedings of the International Computing Symposium, 1977, Liege, Belgium, 4-7 April 1977 /
Data processing, an introduction with BASIC /
Basic English for computing: Teacher's book/
The information age /
INSPEC thesaurus /
Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /
Introduction to computers and basic programming /
Data processing contracts : structure, contents, and negotiation /
Computing : a dictionary of terms, concepts and ideas /
Computer concepts 2012.
The Al-Kilani dictionary of computer & internet terminology : English-English-Arabic, with illustrations /
Predictors of success in self-instruction courses on micro-computer application software /
Computer confluence : exploring tomorrows technology /
Inspec thesaurus
Computers : information technology in perspective /
Computer confluence : tomorrows technology and you : introductory /
SOFSEM 2007 : theory and practice of computer science : 33rd Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 20-26, 2007 : proceedings /
Information security : 9th international conference, ISC 2006, Samos Island, Greece, August 30-September 2, 2006 : proceedings /