استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
A proposed algorithm to hide text inside 3D colors images \
Evaluating networked information services : techniques, policy, and issues /
Library and information networks in the United Kingdom /
Building community information networks : strategies and experiences /
Library information technology and networks /
Information systems and networks : design and planning guidelines of informatics for managers, decision makers and systems analysts /
Quality of service routing for multimedia multicast over Ad Hoc networks \
Computer-based information services in science and technology: principles and techniques
A proposal for library and information network in saudi arabia /
Information hiding technique in digital image using transform domain \
Systems analysis and design using network techniques
Concepts and techniques of geographic information systems /
Information systems engineering : from data analysis to process networks /
Networks for networkers : critical issues in cooperative library development /
Investigating wavelet transform technique for transmitting video information over mobile devices \
Local area networks : the implications for library and information science /
Information architecture : designing information environments for purpose /
Introduction to information systems /
General introduction to the techniques of information and documentation work /
Selection of the appropriate cover to hide information in images \
Principles of information security /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Development and performance analysis of hybrid IPSec SSL VPN technology \
Building the knowledge society on the Internet : sharing and exchanging knowledge in networked environments /
Enhancement of IEEE 802.11 layer handoff process and protocol \
E-business /
E-Commerce systems architecture and applications
Electronic finance : a new approach to financial sector development? /
Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /
The effects of time triggered Ethernet on the network \
AN INTRODUCTION TO OSI / INCHOLAS HEAP
Introduction to E-business : Management and strategy /
Design and analysis of computer communication networks /
Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /
Networking in easy steps /
Computer networks : principles, technologies, and protocols for network design /
Cumputer Networks Lab /
Making search work : implementing Web, intranet, and enterprise search /
Information technology project management /
Information landscapes for a learning society : networking and the future of libraries 3 : an international conference held at the University of Bath, 29 June-1 July 1998 /
E-commerce : business, technology, society /
Handbook of research on computer mediated communication /
Handbook of research on global information technology management in the digital economy/
Drivers and challenges of applying green iT in Saudi Arabia s private sector A case study /
Investigating the status of Open Government Data initiatives in Saudi Arabia /
Digital libraries in knowledge management : proceedings of the 7th MANLIBNET Annual National Convention held at Indian Institute of Management, Kozhikode During May 5-7, 2005 /
Business driven technology /
Handbook of research on information communication technology policy : trends, issues and advancements /
Encyclopedia of developing regional communities with information and communication technology /
The impact of information and communication technology on developing students communication skills /
Information technology project management : providing measurable organizational value /
Encyclopedia of information ethics and security /
The East Asian miracle and information technology : strategic management of technological learning /
Management information systems : managing information technology in the business enterprise /
Digital library use : social practice in design and evaluation /
Executive's guide to IT governance : improving systems processes with service management, COBIT, and ITIL /
A technique for concealing confidential information inside an image over an unsecure network \
Improving the delay in voice over internet protocol (VOIP) wireless Lan \
Development of a network-based intrusion prevention system using data mining approach \
A steganography-based SMS and MMS services for secure messages exchange on mobile networks \
Data and knowledge protection in data mining \
The role of coordination between research and development (R&D) and marketing in a chieving competitive advantage in the pharmaceutical industry \