تخطي إلى المحتوى
VuFind
  • شاركنا بملاحظاتك!
  • سلة الكتب: 0 مادة (ممتلئ)
  • تسجيل الدخول
    • العربية
    • الإنجليزية

اكتشف مناهل المعرفة!

استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها

بحث متقدم
  • الكل
  • فهرس المكتبة
  • المستودع الرقمي
  • القنوات
  • Computer security :
البحث عن المزيد من القنوات:

مواد مشابهة: Computer security :

Computer security : principles and practice /

Computer security : principles and practice /

Principles of computer security : Security+ TM and beyond /

Cryptography and network security : principles and practice /

Network security essentials : applications and standards /

Network security essentials : applications and standards /

Information security : principles and practices /

Security in computing /

Computer and information security handbook /

Principles of data security /

Security program and policies principles and practices /

Principles of information security /

Principles of information security /

Security in computing /

Computer security /

Network security : private communication in a public world /

Data and computer communications /

Principles of information systems security : text and cases /

Computer security : art and science /

CCNA : Cisco Certified Network Associate study guide/

موضوع: Computer networks

Library and information networks in the United Kingdom /

Principles of information security /

Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \

Development and performance analysis of hybrid IPSec SSL VPN technology \

Building the knowledge society on the Internet : sharing and exchanging knowledge in networked environments /

Enhancement of IEEE 802.11 layer handoff process and protocol \

E-business /

E-Commerce systems architecture and applications

Electronic finance : a new approach to financial sector development? /

Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /

The effects of time triggered Ethernet on the network \

AN INTRODUCTION TO OSI / INCHOLAS HEAP

Introduction to E-business : Management and strategy /

Design and analysis of computer communication networks /

Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /

Networking in easy steps /

Computer networks : principles, technologies, and protocols for network design /

Cumputer Networks Lab /

Making search work : implementing Web, intranet, and enterprise search /

Introduction to information systems /

موضوع: Computer security

  • موضوع: Electronic data processing personnel
  • موضوع: Security measures
  • موضوع: Examinations
  • موضوع: Certification

Principles of information security /

Integrating security and software engineering : advances and future visions /

Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \

Information security : principles and practice /

Encyclopedia of information ethics and security /

Information hiding technique in digital image using transform domain \

Foundations of computer science : from data manipulation to theory of computation /

Network security : private communication in a public world /

Bi-directional transition mechanism between IPv4 and IPv6 \

The art of software security assessment : identifying and preventing software vulnerabilities /

Risk Assessment in Cyber-Physical System /

Foundations of computer security /

Information security fundamentals /

A method for improving the Bluetooth key exchange security /

A hybrid fingerprint identification & verification algorithm \

Computer security : principles and practice /

Information security : a strategic approach /

Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /

Information security : principles and practices /

Security in computing /

المؤلف: Stallings, William

Operating systems : internals and design principles /

Operating systems : internals and design principles /

Computer security : principles and practice /

Computer organization and architecture : designing for performance /

Computer organization and architecture : designing for performance /

Network security essentials : applications and standards /

Operating systems : internals and design principles /

Cryptography and network security : principles and practice /

Network security essentials : applications and standards /

Computer organization and architecture : designing for performance /

Computer security : principles and practice /

Data and computer communications /

Computer security : principles and practice /

Business data communications /

Computer organization and architecture : designing for performance /

Computer organization and architecture : designing for performance /

Operating systems : internals and design principles /

Computer organization and architecture : designing for performance /

المؤلف: Brown, Lawrie

Computer security : principles and practice /

Computer security : principles and practice /

اكتشف المعرفة مع بوابة الاكتشاف الرقمي لجامعة الإمام محمد بن سعود الإسلامية

اطلع على آلاف الموارد الأكاديمية، والمواد البحثية، والمنشورات العلمية

ابدأ الاستكشاف الآن
Imam University Team
Imam University Logo

جامعة الإمام محمد بن سعود الإسلامية

الرياض، المملكة العربية السعودية
+966 11 259 5000
info@imamu.edu.sa

الموارد

  • استعراض الفهرس
  • استعرض أبجدياً
  • اكتشف القنوات
  • الحجز الأكاديمي
  • مواد جديدة
  • موارد تعليمية
  • ImamU API

البحث والمساعدة

  • بحث بسيط
  • بحث متقدم
  • سجل البحث
  • شاركنا بملاحظاتك!
  • إرشادات حول معاملات البحث
  • إسأل أخصائي مكتبات
  • مساعدة
  • الأسئلة الشائعة
  • اتفاقية مستوى الخدمة
  • اتفاقية المستخدم

تواصل معنا

© 2026 جامعة الإمام محمد بن سعود الإسلامية. جميع الحقوق محفوظة.

VuFind