Explore our comprehensive collection of books, articles, digital media, and more
Developing a host intrusion prevention system by using data mining \
Salp Swarm-Based Feature Selection Algorithms for Anomaly Detection in Network Security /
Network security : how to plan for it and achieve it /
Data communications and networking /
Network security essentials : applications and standards /
Computer networking : a top-down approach /
Computer networking : A TOP- DOWN APPROACH /
Data mining : practical machine learning tools and techniques /
Data Warehousing and Data Mining Techniques for Cyber Security /
Principles of data mining /
Business data networks and telecommunications /
A Technique For Face Recognition Using Approach Based On Artificial Neural Network And Principal Component Analysis \
Business data communications and networking /
Network security : private communication in a public world /
Fundamental networking in Java /
Computer networking and the Internet /
Data and knowledge protection in data mining \
Library and information networks in the United Kingdom /
Principles of information security /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Development and performance analysis of hybrid IPSec SSL VPN technology \
Building the knowledge society on the Internet : sharing and exchanging knowledge in networked environments /
Enhancement of IEEE 802.11 layer handoff process and protocol \
E-business /
E-Commerce systems architecture and applications
Electronic finance : a new approach to financial sector development? /
Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /
The effects of time triggered Ethernet on the network \
AN INTRODUCTION TO OSI / INCHOLAS HEAP
Introduction to E-business : Management and strategy /
Design and analysis of computer communication networks /
Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /
Networking in easy steps /
Computer networks : principles, technologies, and protocols for network design /
Cumputer Networks Lab /
Making search work : implementing Web, intranet, and enterprise search /
Introduction to information systems /
Dummies 101.
Information technology project management /
Quick Books pro 2006 : a complete course : with updates for 2007 /
Understanding 1-2-3, Release 2.3/
Supercritical wing sections III /
Web development & design foundations with XHTML /
Microsoft Access 2013 : a case approach /
New perspectives on Microsoft Office 2013 : first course /
How to build a digital library /
Information technology project management : providing measurable organizational value /
Teach yourself Microsoft Office 2000 /
Intelligent E-commerce system development using an intelligent agent and natural language understanding /
Digital copyright /
IT and office software /
Software for indexing /
Microsoft PowerPoint 2013 : Advanced /
FastSOA : The way to use native XML Technology to achieve Service Oriented Architecture governance, scalability, and performance /
Microsoft Office 2013 : introductory /
Some common Pascal programs : based on the book Some common BASIC programs
GO! with Microsoft PowerPoint 2010 : introductory /
Development of a network-based intrusion prevention system using data mining approach \
Improving the delay in voice over internet protocol (VOIP) wireless Lan \
A steganography-based SMS and MMS services for secure messages exchange on mobile networks \
A technique for concealing confidential information inside an image over an unsecure network \
The role of coordination between research and development (R&D) and marketing in a chieving competitive advantage in the pharmaceutical industry \