استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
A method for improving the Bluetooth key exchange security /
Managing information systems security and privacy /
IoT-Based Remote HealthCare Monitoring System for the Pilgrims /
Development of a network-based intrusion prevention system using data mining approach \
E-health, assistive technologies and applications for assisted living : challenges and solutions /
Risk Assessment in Cyber-Physical System /
Principles of information systems security : text and cases /
Introduction to wireless and mobile systems /
IoT Based Solution for Tracking, Locating and Monitoring the Pilgrim's Health During Hajj /
Arabic Health And Fitness Mobile Apps And The Utilization Of Ai Technologies : Ethical Issues /
Image encryption based on chaos technique \
Development and performance analysis of hybrid IPSec SSL VPN technology \
Health information management technology : an applied approach /
An Extended UTAUT2 model to Explain the Adoption of Virtual Reality Technology in Health Centers : An Empirical Study Based in Riyadh /
Handbook of research on instructional systems and technology /
High-performance and Secure Software Implementations for Elliptic Curve Crypto-System /
Next generation information technologies and systems : 6th international conference, NGITS 2006, Kibbutz Shefayim, Israel, July 4-6, 2006 : proceedings /
Modern public information technology systems : issues and challenges /
Introduction to health science technology /
Principles of information security /
Integrating security and software engineering : advances and future visions /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Information security : principles and practice /
Encyclopedia of information ethics and security /
Information hiding technique in digital image using transform domain \
Foundations of computer science : from data manipulation to theory of computation /
Network security : private communication in a public world /
Bi-directional transition mechanism between IPv4 and IPv6 \
The art of software security assessment : identifying and preventing software vulnerabilities /
Foundations of computer security /
Information security fundamentals /
A hybrid fingerprint identification & verification algorithm \
Computer security : principles and practice /
Information security : a strategic approach /
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /
Information security : principles and practices /
Security in computing /
Mobile health monitoring system via Bluetooth technology \
Investigating wavelet transform technique for transmitting video information over mobile devices \
Diseased iris recognition technique based on image enhancement \
Design and implementation of intelligent traffic congestion system : Monitoring and analysis approach \
Enhanced method for handwritten signature recognition \
Gait Recognition Based On Angles Measurement \