Explore our comprehensive collection of books, articles, digital media, and more
Information warfare and security /
Risk Assessment in Cyber-Physical System /
Information warfare : concepts, boundaries and employment strategies /
Data Warehousing and Data Mining Techniques for Cyber Security /
Information security and IT risk management /
Information security : principles and practices /
Principles of information security /
Information assurance handbook : effective computer security and risk management strategies /
Security program and policies principles and practices /
Management of information security /
Computer security : principles and practice /
Network security essentials : applications and standards /
Network security : how to plan for it and achieve it /
Information security and ethics : concepts, methodologies, tools, and applications /
Principles of information systems security : text and cases /
Cryptography and network security : principles and practice /
Computer and information security handbook /
Library and information networks in the United Kingdom /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Development and performance analysis of hybrid IPSec SSL VPN technology \
Building the knowledge society on the Internet : sharing and exchanging knowledge in networked environments /
Enhancement of IEEE 802.11 layer handoff process and protocol \
E-business /
E-Commerce systems architecture and applications
Electronic finance : a new approach to financial sector development? /
Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /
The effects of time triggered Ethernet on the network \
AN INTRODUCTION TO OSI / INCHOLAS HEAP
Introduction to E-business : Management and strategy /
Design and analysis of computer communication networks /
Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /
Networking in easy steps /
Computer networks : principles, technologies, and protocols for network design /
Cumputer Networks Lab /
Making search work : implementing Web, intranet, and enterprise search /
Introduction to information systems /
Cyber warfare : techniques, tactics and tools for security practitioners /