استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
Using short message service (SMS) to support business continuity \
Network security : how to plan for it and achieve it /
Network security essentials : applications and standards /
A threshold secret sharing scheme for self-securing noisy mobile ad hoc networks \
Collaborative Caching for Efficient and Robust Certificate Authority Services in Mobile Ad-Hoc Networks /
Salp Swarm-Based Feature Selection Algorithms for Anomaly Detection in Network Security /
Cryptography and network security : principles and practice /
Developing MMS applications : multimedia messaging services for wireless networks /
Network security : private communication in a public world /
A location - aided routing - probabilistic protocol for flooding optimization in mobile ad hoc networks \
Wireless and mobile network architectures /
Cognitive radio technology applications for wireless and mobile ad hoc networks
Web services security and e-business /
Video Compression Techniques' Performance in Altering Steganography Messages /
Quality of service routing for multimedia multicast over Ad Hoc networks \
Evaluating networked information services : techniques, policy, and issues /
Quality of Service Routing in Communication Networks : Algorithm and Partitioning Thechniques /
Network-based language teaching : concepts and practice /
Building a model for determining the factors affecting mobile marketing acceptance and adoption \
Library and information networks in the United Kingdom /
Principles of information security /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Development and performance analysis of hybrid IPSec SSL VPN technology \
Building the knowledge society on the Internet : sharing and exchanging knowledge in networked environments /
Enhancement of IEEE 802.11 layer handoff process and protocol \
E-business /
E-Commerce systems architecture and applications
Electronic finance : a new approach to financial sector development? /
Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /
The effects of time triggered Ethernet on the network \
AN INTRODUCTION TO OSI / INCHOLAS HEAP
Introduction to E-business : Management and strategy /
Design and analysis of computer communication networks /
Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /
Networking in easy steps /
Computer networks : principles, technologies, and protocols for network design /
Cumputer Networks Lab /
Making search work : implementing Web, intranet, and enterprise search /
Introduction to information systems /
Comparison of two teaching methods for learning a computer-programming language /
Principles of data mining /
A computational introduction to number theory and algebra
Extending the horizons : advances in computing, optimization and decision technologies /
Understanding cryptography : a textbook for students and practitioners /
Drivers and challenges of applying green iT in Saudi Arabia s private sector A case study /
Probability and statistics for computer science /
Computer science : a modern introduction /
Mathematical foundations of computer science 2006 : 31th international symposium, MFCS 2006, StaraLesna, Slovakia, August 28- September 1, 2006 : proceedings /
Invitation to discrete mathematics /
A novel multi-layer virtual memory system to solve memory leak problem /
Discrete mathematics and its applications /
An adaptive bit-level text compression scheme based on the HCDC algorithm \
Bi-directional transition mechanism between IPv4 and IPv6 \
An Intelligent Database System Using Natural Language Processing with Typed or Spoken Sentences / Hessa Abdulrahman Alawwad ; Supervisor Emdad Khan
Understanding computation /
The Al-Kilani dictionary of computer & internet terminology : English-English-Arabic, with illustrations /
Computer careers; planning, prerequisites, potential
A steganography-based SMS and MMS services for secure messages exchange on mobile networks \
Improving the delay in voice over internet protocol (VOIP) wireless Lan \
Development of a network-based intrusion prevention system using data mining approach \
A technique for concealing confidential information inside an image over an unsecure network \
Data and knowledge protection in data mining \
The role of coordination between research and development (R&D) and marketing in a chieving competitive advantage in the pharmaceutical industry \