Explore our comprehensive collection of books, articles, digital media, and more
Role-based access control /
Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /
Information security : 9th international conference, ISC 2006, Samos Island, Greece, August 30-September 2, 2006 : proceedings /
Risk Assessment in Cyber-Physical System /
Soil mechanics /
Development and performance analysis of hybrid IPSec SSL VPN technology \
The mechanics of erosion/
Enhanced secured voice over internet protocol \
Transition to higher mathematics : structure and proof /
Network security : private communication in a public world /
Transition zoning
Transitions Workbook /
In the direction of the Persian Gulf : the Soviet Union and the Persian Gulf /
Mechanical design : an integrated approach /
Mechanics of materials : SI version /
Mechanics of materials; S1 Version /
Public internet access in libraries and information services /
The web application hacker's handbook : finding and exploiting security flaws /
The effect of weight factors characters in selecting word & password \
Directions in geography /
Principles of information security /
Integrating security and software engineering : advances and future visions /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Information security : principles and practice /
Encyclopedia of information ethics and security /
Information hiding technique in digital image using transform domain \
Foundations of computer science : from data manipulation to theory of computation /
Bi-directional transition mechanism between IPv4 and IPv6 \
The art of software security assessment : identifying and preventing software vulnerabilities /
Foundations of computer security /
Information security fundamentals /
A method for improving the Bluetooth key exchange security /
A hybrid fingerprint identification & verification algorithm \
Computer security : principles and practice /
Information security : a strategic approach /
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /
Information security : principles and practices /
Security in computing /
Computing concepts with C++ essentials /
International Computing Symposium, 1977 : proceedings of the International Computing Symposium, 1977, Liege, Belgium, 4-7 April 1977 /
Data processing, an introduction with BASIC /
Basic English for computing: Teacher's book/
The information age /
INSPEC thesaurus /
Introduction to computers and basic programming /
Data processing contracts : structure, contents, and negotiation /
Computing : a dictionary of terms, concepts and ideas /
Computer concepts 2012.
The Al-Kilani dictionary of computer & internet terminology : English-English-Arabic, with illustrations /
Predictors of success in self-instruction courses on micro-computer application software /
Computer confluence : exploring tomorrows technology /
Inspec thesaurus
Computers : information technology in perspective /
Computer confluence : tomorrows technology and you : introductory /
SOFSEM 2007 : theory and practice of computer science : 33rd Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 20-26, 2007 : proceedings /
Mobile health monitoring system via Bluetooth technology \
Investigating wavelet transform technique for transmitting video information over mobile devices \
Diseased iris recognition technique based on image enhancement \
Image encryption based on chaos technique \
Design and implementation of intelligent traffic congestion system : Monitoring and analysis approach \
Enhanced method for handwritten signature recognition \
Gait Recognition Based On Angles Measurement \