استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
Managing digital rights : a practitioner's guide /
Information hiding technique in digital image using transform domain \
Digital borders and real rights : effective remedies for third-country nationals in the Schengen Information System /
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /
Security in computing /
Human rights in urban areas
Human rights watch world report 2003 : events of 2002 (November 2001-November 2002)
Digital preservation /
Developing a robust digital image watermark by using frequency and spatial domains \
Digital copyright /
The Right to information : legal questions and policy issues /
Digital computer applications to process control : proceedings of the 6th IFAC/IFIP Conference, Dusseldorf, F.R. Germany, 14-17 October 1980 /
Digital libraries : implementing strategies and sharing experiences : 8th International Conference on Asian Digital Libraries, ICADL 2005, Bangkok, Thailand, December 12-15, 2005 : proceedings /
Pervasive information security and privacy developments : trends and advancements /
Theory of cryptography : 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007 : proceedings /
Human rights in Denmark : status 2002
The new politics of human rights /
Human rights in Islam /
Research and advanced technology for digital libraries : 9th European conference, ECDL 2005, Vienna, Austria, September 18-23, 2005 : proceedings /
Principles of information security /
Integrating security and software engineering : advances and future visions /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Information security : principles and practice /
Encyclopedia of information ethics and security /
Foundations of computer science : from data manipulation to theory of computation /
Network security : private communication in a public world /
Bi-directional transition mechanism between IPv4 and IPv6 \
The art of software security assessment : identifying and preventing software vulnerabilities /
Risk Assessment in Cyber-Physical System /
Foundations of computer security /
Information security fundamentals /
A method for improving the Bluetooth key exchange security /
A hybrid fingerprint identification & verification algorithm \
Computer security : principles and practice /
Information security : a strategic approach /
Information security : principles and practices /
Staying legal : a guide to issues and practice affecting the library, information, and publishing sectors /
Digital rights management : technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised selected papers /