استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
Enhancement of IEEE 802.11 layer handoff process and protocol \
Secure roaming in 802.11 networks /
Fundamentals of WiMAX : understanding broadband wireless networking /
Enhanced secured voice over internet protocol \
Efficient Mac protocols for Next-Generation Wireless Lan /
Histology protocols /
Security Investigation and Analysis of OpenID: Problems and Enhancements /
Network protocol handbook /
Improving cross-domain using Current Certificate Status Protocol (CCSP) /
Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /
Telephone triage protocols for nurses. /
PCR mutation detection protocols
Pocket guide to chemotherapy protocols /
RT-PCR protocols / edited by Nicola King
A location - aided routing - probabilistic protocol for flooding optimization in mobile ad hoc networks \
Protocols for high-risk pregnancies : an evidence-based approach /
Wireless network traffic and quality of service support : trends and standards /
Wireless network security : a beginner's guide /
Soil design protocols for landscape architects and contractors/
Library and information networks in the United Kingdom /
Principles of information security /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Development and performance analysis of hybrid IPSec SSL VPN technology \
Building the knowledge society on the Internet : sharing and exchanging knowledge in networked environments /
E-business /
E-Commerce systems architecture and applications
Electronic finance : a new approach to financial sector development? /
The effects of time triggered Ethernet on the network \
AN INTRODUCTION TO OSI / INCHOLAS HEAP
Introduction to E-business : Management and strategy /
Design and analysis of computer communication networks /
Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /
Networking in easy steps /
Computer networks : principles, technologies, and protocols for network design /
Cumputer Networks Lab /
Making search work : implementing Web, intranet, and enterprise search /
Introduction to information systems /
Enhancement of IEEE 802.11 maclayer handoff process and protocol \
Improving software requirements gathering using workshops techniques \
Branch and bound and A* search using fuzzy underestimates \
Branch and Bound and A Search Using Fuzzy Underestimates /
New leader election algorithms in hypercube networks \
Applying object oriented design methodology for e-government web based applications \