استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
Developing a robust digital image watermark by using frequency and spatial domains \
Linear difference equations with discrete transform methods /
Information hiding technique in digital image using transform domain \
Investigating wavelet transform technique for transmitting video information over mobile devices \
Wavelets : from math to practice /
The geometry of schemes /
Developing a Performance-based Tool for Arabic Text Steganography /
Discrete mathematics /
The Laplace transform : theory and applications /
Discrete mathematics for engineering students /
Signals, systems, and transforms /
Invitation to discrete mathematics /
Discrete mathematical structures /
Discrete mathematical structures \
Discrete mathematics by example /
Transformational grammar : a first course /
Discrete mathematics : an introduction to proofs and combinatorics /
Information rights in practice: the non-legal professionals guide/
Information security fundamentals /
Digital borders and real rights : effective remedies for third-country nationals in the Schengen Information System /
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /
Information security : principles and practices /
Security in computing /
Developing a Cybersecurity Risk Assessment Tool for Saudi Government Organizations /
Information assurance for the enterprise : a roadmap to information security /
Staying legal : a guide to issues and practice affecting the library, information, and publishing sectors /
Information security management handbook /
Digital rights management : technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised selected papers /
The History of information security : A Comprehensive Handbook /
Essential law for information professionals /
Self-Sovereign Identity Management : A Comparative Study and Technical Enhancements /
Digital preservation /
Pervasive information security and privacy developments : trends and advancements /
Data and knowledge protection in data mining \
A Mapping Framework for the Saudi Cybersecurity and Privacy Controls to MITRE ATT&CK Techniques /
Computer vision : algorithms and applications /
Digital image processing /
Elements of photogrammetry : with applications in GI /
Adobe After Effects Release 2021 /
Image processing and analysis : variational, PDE, wavelet, and stochastic methods /
Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /
Semantic-based visual information retrieval /
Adobe After Effects 7 : includes exercise files and demo movies /
Adobe Photoshop CC : 2019 release /
Adobe digital video how-tos : 100 essential techniques with Adobe production studio /
Arabic Image Caption Generator Using Deep Learning Techniques /
Image Processing Applications Using Matlab /
Image encryption based on chaos technique \
Digital image processing and analysis : human and computer vision applications with CVIPtools /
Computer graphics : theory and practice /
An improved method of cardiac imaging based on coronary angiography \
Color image segmentation based on region growing algorithm \
Improving the watermarking performance using combined redundant discrete wavelet transform and contourlet transform scheme \
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Web application security of E-Money transfer systems \
A method for improving the Bluetooth key exchange security /
Enhanced Method for RSA cryptoststem algorithm \
Investigating distributed database deadlock based on attribute level \
Estimation of null value in relational data base system using K-nearest neighbor and decision tree \
Proposed method of factorization analysis to break the RSA algorithm \