Explore our comprehensive collection of books, articles, digital media, and more
Mobile health monitoring system via Bluetooth technology \
Principles of information security /
Management of information security /
Information security : principles and practices /
The History of information security : A Comprehensive Handbook /
Improving the performance of naïve nayes algorithm for Arabic text categorization \
Computer security : principles and practice /
Security program and policies principles and practices /
Network security : private communication in a public world /
Managing information systems security and privacy /
A steganography-based SMS and MMS services for secure messages exchange on mobile networks \
Wireless network security : a beginner's guide /
Network security essentials : applications and standards /
Information security and IT risk management /
Network security : how to plan for it and achieve it /
Information security : a strategic approach /
Information security and ethics : concepts, methodologies, tools, and applications /
Integrating security and software engineering : advances and future visions /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Information security : principles and practice /
Encyclopedia of information ethics and security /
Information hiding technique in digital image using transform domain \
Foundations of computer science : from data manipulation to theory of computation /
Bi-directional transition mechanism between IPv4 and IPv6 \
The art of software security assessment : identifying and preventing software vulnerabilities /
Risk Assessment in Cyber-Physical System /
Foundations of computer security /
Information security fundamentals /
A method for improving the Bluetooth key exchange security /
A hybrid fingerprint identification & verification algorithm \
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /
Security in computing /
Web application security of E-Money transfer systems \
Developing a robust digital image watermark by using frequency and spatial domains \
Enhanced Method for RSA cryptoststem algorithm \
Investigating distributed database deadlock based on attribute level \
Estimation of null value in relational data base system using K-nearest neighbor and decision tree \
Proposed method of factorization analysis to break the RSA algorithm \
Improving the watermarking performance using combined redundant discrete wavelet transform and contourlet transform scheme \