Explore our comprehensive collection of books, articles, digital media, and more
Development and performance analysis of a probabilistic flooding algorithm in noisy mobile Ad Hoc networks \
Development and performance analysis of optimal multipoint relaying algorithm for noisy mobile Ad Hoc networks \
A hybrid fingerprint identification & verification algorithm \
High-performance and Secure Software Implementations for Elliptic Curve Crypto-System /
Improving the performance of naïve nayes algorithm for Arabic text categorization \
Proposed method of factorization analysis to break the RSA algorithm \
Development of a network-based intrusion prevention system using data mining approach \
Risk Assessment in Cyber-Physical System /
Mobile health monitoring system via Bluetooth technology \
Enhancement of IEEE 802.11 layer handoff process and protocol \
Enhanced secured voice over internet protocol \
Developing a Performance-based Tool for Arabic Text Steganography /
Information security : principles and practices /
The web application hacker's handbook : finding and exploiting security flaws /
Information security and IT risk management /
Computer security : principles and practice /
Principles of information systems security : text and cases /
Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /
Developing a host intrusion prevention system by using data mining \
Library and information networks in the United Kingdom /
Principles of information security /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Development and performance analysis of hybrid IPSec SSL VPN technology \
Building the knowledge society on the Internet : sharing and exchanging knowledge in networked environments /
E-business /
E-Commerce systems architecture and applications
Electronic finance : a new approach to financial sector development? /
The effects of time triggered Ethernet on the network \
AN INTRODUCTION TO OSI / INCHOLAS HEAP
Introduction to E-business : Management and strategy /
Design and analysis of computer communication networks /
Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /
Networking in easy steps /
Computer networks : principles, technologies, and protocols for network design /
Cumputer Networks Lab /
Making search work : implementing Web, intranet, and enterprise search /
Introduction to information systems /
Basic Internet fundamentals
A Tool for Privacy-Aware Online Personal Photo Sharing Using Deep Learning Technique /
The effect of online discussion groups on the pedagogical and professional development of novice female EFL instructors \
PrivCheck: tool for simulation and enhancement of users' privacy in facebook online social network/
New infrastructures for knowledge production : understanding E-science /
The Internet for library and information service professionals /
Archiving websites : a practical guide for information management professionals /
Safety and security on the Internet : challenges and advances in member states : based on the findings of the second global survey on eHealth
The Al-Kilani dictionary of computer & internet terminology : English-English-Arabic, with illustrations /
Internet of Things for the Purpose of Smart Crowd Management and Personalized Recommendations in Large Public Spaces /
The Harvard Conference on the Internet & Society /
Computer networking : a top-down approach /
The Internet for dummies /
Handbook of Internet and multimedia systems and applications /
Semantic web technologies and e-business : toward the integrated virtual organization and business process automation /
Managing your Internet and intranet services : the information professional's guide to strategy /
Computer networking : a topï12down approach
Improving cross-domain using Current Certificate Status Protocol (CCSP) /
A threshold secret sharing scheme for self-securing noisy mobile ad hoc networks \