Explore our comprehensive collection of books, articles, digital media, and more
A technique for concealing confidential information inside an image over an unsecure network \
Selection of the appropriate cover to hide information in images \
Text book of 3-D coicoids /
Text book of 3-D : sphere, cone and cylinder /
Color image segmentation based on region growing algorithm \
Proposed method of factorization analysis to break the RSA algorithm \
3D motion graphics for 2D artists : conquering the 3rd dimension /
Improving the performance of naïve nayes algorithm for Arabic text categorization \
3D computer graphics /
Foundations of 3D graphics programming : using JOGL and Java3D /
Digital image processing algorithms and applications /
Computer graphics using Java 2D and 3D /
Information hiding technique in digital image using transform domain \
Text book of 3-D co-ordinate systems and straight lines\
Inside reading 3 : the academic word list in context /
3D studio MAX 2 fundamentals /
Color atlas and text of clinical medicine /
Text in sociology (level 3) : level 3 /
AutoCAD Civil 3D 2008 : procedures and applications /
Library and information networks in the United Kingdom /
Principles of information security /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Development and performance analysis of hybrid IPSec SSL VPN technology \
Building the knowledge society on the Internet : sharing and exchanging knowledge in networked environments /
Enhancement of IEEE 802.11 layer handoff process and protocol \
E-business /
E-Commerce systems architecture and applications
Electronic finance : a new approach to financial sector development? /
Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /
The effects of time triggered Ethernet on the network \
AN INTRODUCTION TO OSI / INCHOLAS HEAP
Introduction to E-business : Management and strategy /
Design and analysis of computer communication networks /
Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /
Networking in easy steps /
Computer networks : principles, technologies, and protocols for network design /
Cumputer Networks Lab /
Making search work : implementing Web, intranet, and enterprise search /
Introduction to information systems /
Comparison of two teaching methods for learning a computer-programming language /
Principles of data mining /
A computational introduction to number theory and algebra
Extending the horizons : advances in computing, optimization and decision technologies /
Understanding cryptography : a textbook for students and practitioners /
Drivers and challenges of applying green iT in Saudi Arabia s private sector A case study /
Probability and statistics for computer science /
Computer science : a modern introduction /
Mathematical foundations of computer science 2006 : 31th international symposium, MFCS 2006, StaraLesna, Slovakia, August 28- September 1, 2006 : proceedings /
Invitation to discrete mathematics /
A novel multi-layer virtual memory system to solve memory leak problem /
Discrete mathematics and its applications /
An adaptive bit-level text compression scheme based on the HCDC algorithm \
Bi-directional transition mechanism between IPv4 and IPv6 \
An Intelligent Database System Using Natural Language Processing with Typed or Spoken Sentences / Hessa Abdulrahman Alawwad ; Supervisor Emdad Khan
Understanding computation /
The Al-Kilani dictionary of computer & internet terminology : English-English-Arabic, with illustrations /
Computer careers; planning, prerequisites, potential
A proposed algorithm to hide text inside 3D colors images \