استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
Building Web applications with UML /
Semantic Web services, processes and applications /
Semantic Web services : theory, tools, and applications /
Software engineering for modern Web applications : methodologies and technologies /
Web services security and e-business /
Strategic pervasive computing applications : emerging trends /
An introduction to XML and Web technologies /
Handbook of research on Web information systems quality /
Web engineering : a practitioner's approach /
Open source Web applications for libraries /
The web application hacker's handbook : finding and exploiting security flaws /
An introduction to databases with Web applications /
Web development & design foundations with XHTML /
Applying object oriented design methodology for e-government web based applications \
Web services in digital libraries /
Research and trends in data mining technologies and applications /
Web engineering advancements and trends : building new dimensions of information technology /
Software Engineering Research, Management and Applications : second international conference, SERA 2004, Los Angeles, CA, USA, May 5-7, 2004 : selected revised papers /
Advanced professional Web design : techniques & templates (CSS & XHTML) /
Arabic Sentiment Analysis Using Machine Learning Algorithms of Twitter Data Based on Spatial and Temporal Analysis - Case Study /
Seam Carving Based Two Levels Segmentation In Arabic Handwritten Documents /
Selecting the Best Open Source NoSQL Document DB for Handling Big Data in CMS : Evaluation and Selection by Using AHP Method /
Database design, application development, and administration /
Applying use cases : a practical guide /
Microsoft Office Professional 2013 /
Using Blockchain Technology to Enhance Reliability of the Online Hotels Reviews /
UML : a beginnerï1/2s guide /
Voice Command and Gesture Recognition using Multimodal Deep Learning /
Advances in machine learning applications in software engineering /
Unsupervised Feature Selection : A Data- Projection-Based Approach /
A reinforcement-based trust management scheme for VANETs using blockchain technology /
B-Droid: A static taint analysis framework for Android applications /
Integrating Agile methodology and user experience design process /
ASP. NET tips & techniques /
Developing a Framework for Cost-Benefit Analysis of Cloud Computing Adoption by Higher Education Institutions in KSA /
Web services research for emerging applications : discoveries and trends /
Principles of information security /
Integrating security and software engineering : advances and future visions /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Information security : principles and practice /
Encyclopedia of information ethics and security /
Information hiding technique in digital image using transform domain \
Foundations of computer science : from data manipulation to theory of computation /
Network security : private communication in a public world /
Bi-directional transition mechanism between IPv4 and IPv6 \
The art of software security assessment : identifying and preventing software vulnerabilities /
Risk Assessment in Cyber-Physical System /
Foundations of computer security /
Information security fundamentals /
A method for improving the Bluetooth key exchange security /
A hybrid fingerprint identification & verification algorithm \
Computer security : principles and practice /
Information security : a strategic approach /
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /
Information security : principles and practices /
Security in computing /