Explore our comprehensive collection of books, articles, digital media, and more
Information hiding technique in digital image using transform domain \
Digital image processing /
Improving the watermarking performance using combined redundant discrete wavelet transform and contourlet transform scheme \
Digital image processing algorithms and applications /
Digital image processing and analysis : human and computer vision applications with CVIPtools /
Digital imaging : a practical handbook /
Image Processing Applications Using Matlab /
Image processing : the fundamentals /
Digital imaging and communications in medicine (DICOM): a practical introduction and survival guide /
Improving cross-domain using Current Certificate Status Protocol (CCSP) /
The filmmaker's guide to digital imaging : for cinematographers, digital imaging technicians, and camera assistants /
Image encryption based on chaos technique \
Arabic Image Caption Generator Using Deep Learning Techniques /
Color image segmentation based on region growing algorithm \
Digital preservation /
Image segmentation and identification in X-rayed teeth /
Principles of information security /
Integrating security and software engineering : advances and future visions /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Information security : principles and practice /
Encyclopedia of information ethics and security /
Foundations of computer science : from data manipulation to theory of computation /
Network security : private communication in a public world /
Bi-directional transition mechanism between IPv4 and IPv6 \
The art of software security assessment : identifying and preventing software vulnerabilities /
Risk Assessment in Cyber-Physical System /
Foundations of computer security /
Information security fundamentals /
A method for improving the Bluetooth key exchange security /
A hybrid fingerprint identification & verification algorithm \
Computer security : principles and practice /
Information security : a strategic approach /
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /
Information security : principles and practices /
Security in computing /
Information rights in practice: the non-legal professionals guide/
Digital borders and real rights : effective remedies for third-country nationals in the Schengen Information System /
Developing a Cybersecurity Risk Assessment Tool for Saudi Government Organizations /
Developing a robust digital image watermark by using frequency and spatial domains \
Information assurance for the enterprise : a roadmap to information security /
Staying legal : a guide to issues and practice affecting the library, information, and publishing sectors /
Information security management handbook /
Digital rights management : technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised selected papers /
The History of information security : A Comprehensive Handbook /
Essential law for information professionals /
Self-Sovereign Identity Management : A Comparative Study and Technical Enhancements /
Pervasive information security and privacy developments : trends and advancements /
Data and knowledge protection in data mining \
A Mapping Framework for the Saudi Cybersecurity and Privacy Controls to MITRE ATT&CK Techniques /
Web application security of E-Money transfer systems \
Enhanced Method for RSA cryptoststem algorithm \
Investigating distributed database deadlock based on attribute level \
Estimation of null value in relational data base system using K-nearest neighbor and decision tree \
Proposed method of factorization analysis to break the RSA algorithm \