استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
Practical digital preservation : a how-to guide for organizations of any size /
Digital curation : a how-to-do-it manual /
Anonymization of Host-Based Logs for Preserving Data Privacy and Security Monitoring Utility /
Digital design : principles and practices /
Digital rights management : technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised selected papers /
Digital imaging : a practical handbook /
Digital communications /
Developing a robust digital image watermark by using frequency and spatial domains \
The Role of digital storytelling in the language learning \
Information hiding technique in digital image using transform domain \
Food analysis and preservation : current research topics /
Digital fundamentals /
Digital cinematography & directing /
Introduction to digital communications /
The design of digital systems
Introduction to digital systems /
Digital design /
Digital electronics : an introduction to theory and practice /
Digital systems : principles and Design /
Digital signal processing : a computer-based approach /
Information rights in practice: the non-legal professionals guide/
Information security fundamentals /
Digital borders and real rights : effective remedies for third-country nationals in the Schengen Information System /
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /
Information security : principles and practices /
Security in computing /
Developing a Cybersecurity Risk Assessment Tool for Saudi Government Organizations /
Information assurance for the enterprise : a roadmap to information security /
Staying legal : a guide to issues and practice affecting the library, information, and publishing sectors /
Information security management handbook /
The History of information security : A Comprehensive Handbook /
Essential law for information professionals /
Self-Sovereign Identity Management : A Comparative Study and Technical Enhancements /
Digital preservation /
Pervasive information security and privacy developments : trends and advancements /
Data and knowledge protection in data mining \
A Mapping Framework for the Saudi Cybersecurity and Privacy Controls to MITRE ATT&CK Techniques /