استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
Social Mobile Payment Adoption : An Empirical Investigation of Consumers Perspectives in Saudi Arabia /
Building mobile library applications /
Factors which affect investorsïdecisions in Arab financial markets : comparative Study \
Factors Affecting the Adoption and Implementation of Data Mining Techniques to Harness Big Data in Saudi Banks /
A steganography-based SMS and MMS services for secure messages exchange on mobile networks \
Encyclopedia of mobile computing and commerce /
Exploring Factors Influencing The Adoption of online Shopping by Saudi Females With E-Shops /
Model building in mathematical programming /
Mobile robots : the evolutionary approach /
Identifying the Factors Affecting the Intention to Use Virtual Stores : the Perspectives of Consumers in Saudi Arabia /
Mobile computing /
Building Institutions for Markets : World developing report 2002
A location - aided routing - probabilistic protocol for flooding optimization in mobile ad hoc networks \
Smart phone and next generation mobile computing /
Mobile communications/
Factors Influencing the Adoption of Cloud Computing by Saudi University Hospitals /
Building the knowledge society on the Internet : sharing and exchanging knowledge in networked environments /
Cognitive radio technology applications for wireless and mobile ad hoc networks
The effect of weight factors characters in selecting word & password \
Development and performance analysis of a probabilistic flooding algorithm in noisy mobile Ad Hoc networks \
Library and information networks in the United Kingdom /
Principles of information security /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Development and performance analysis of hybrid IPSec SSL VPN technology \
Enhancement of IEEE 802.11 layer handoff process and protocol \
E-business /
E-Commerce systems architecture and applications
Electronic finance : a new approach to financial sector development? /
Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /
The effects of time triggered Ethernet on the network \
AN INTRODUCTION TO OSI / INCHOLAS HEAP
Introduction to E-business : Management and strategy /
Design and analysis of computer communication networks /
Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /
Networking in easy steps /
Computer networks : principles, technologies, and protocols for network design /
Cumputer Networks Lab /
Making search work : implementing Web, intranet, and enterprise search /
Introduction to information systems /
Building a model for determining the factors affecting mobile marketing acceptance and adoption \
Designing for the iPad : building applications that sell /
IOS 7 programming cookbook /
User Authentication Based on a Combination of Face Image and Device Identity in Mobile Ecosystem /