استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
Development and performance analysis of a probabilistic flooding algorithm in noisy mobile Ad Hoc networks \
Development and performance analysis of optimal multipoint relaying algorithm for noisy mobile Ad Hoc networks \
Cognitive radio technology applications for wireless and mobile ad hoc networks
Collaborative Caching for Efficient and Robust Certificate Authority Services in Mobile Ad-Hoc Networks /
A location - aided routing - probabilistic protocol for flooding optimization in mobile ad hoc networks \
Quality of service routing for multimedia multicast over Ad Hoc networks \
A steganography-based SMS and MMS services for secure messages exchange on mobile networks \
Wireless ad hoc and sensor networks : a cross-layer design perspective /
Computer security : principles and practice /
Network security : how to plan for it and achieve it /
Network security essentials : applications and standards /
Information security and IT risk management /
The secrets of the self = Asrar-i khudi : a philosophical poem /
The Secrets of the self (Asrar-i khudi) a philosophical poem,
Principles of information security /
Principles of information systems security : text and cases /
Computer and information security handbook /
AN INTRODUCTION TO OSI / INCHOLAS HEAP
Routing in today's internetworks : the routing protocols of IP, DECnet, Netware, and AppleTalk /
Network routing : algorithms, protocols, and architectures /
Communication networks : fundamental concepts and key architectures /
A threshold secret sharing scheme for self-securing noisy mobile ad hoc networks \
Library and information networks in the United Kingdom /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Development and performance analysis of hybrid IPSec SSL VPN technology \
Building the knowledge society on the Internet : sharing and exchanging knowledge in networked environments /
Enhancement of IEEE 802.11 layer handoff process and protocol \
E-business /
E-Commerce systems architecture and applications
Electronic finance : a new approach to financial sector development? /
Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /
The effects of time triggered Ethernet on the network \
Introduction to E-business : Management and strategy /
Design and analysis of computer communication networks /
Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /
Networking in easy steps /
Computer networks : principles, technologies, and protocols for network design /
Cumputer Networks Lab /
Making search work : implementing Web, intranet, and enterprise search /
Introduction to information systems /