استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
Information security : principles and practices /
Management of information security /
Principles of information security /
Information security management handbook /
Computer and information security handbook /
Managing information systems security and privacy /
Pervasive information security and privacy developments : trends and advancements /
Information security fundamentals /
Information security : a strategic approach /
Principles of information systems security : text and cases /
Encyclopedia of information ethics and security /
Information security and IT risk management /
Information assurance for the enterprise : a roadmap to information security /
Information security and ethics : concepts, methodologies, tools, and applications /
Web services security and e-business /
Security program and policies principles and practices /
Network security : private communication in a public world /
Introduction to information systems /
E-business : organizational and technical foundations /
E-business /
Advanced strategies in taxation /
Introduction to E-business : Management and strategy /
Schaum's outline of financial management/
Fundamentals of financial management /
Making search work : implementing Web, intranet, and enterprise search /
Towards Increasing The Customers' Loyalty in Social Networks' Small Businesses in Saudi Arabia /
IT strategy : issues and practices/
Internet strategy : the road to web services solutions /
Business : an introduction to American enterprise /
Study guide to accompany Principles of managerial finance /
Papers of the 17th Annual Conference : Electronic transactions (E-commerce & E-government), on 19-20 May 2009 = مؤتمر المعاملات الإلكترونية /
Principles of managerial finance /
Business and law in Saudi Arabia /
Semantic web technologies and e-business : toward the integrated virtual organization and business process automation /
Macrofinance : the financial system and the economy /
Cases in financial management /
Corporate financial management /
Integrating security and software engineering : advances and future visions /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Information security : principles and practice /
Information hiding technique in digital image using transform domain \
Foundations of computer science : from data manipulation to theory of computation /
Bi-directional transition mechanism between IPv4 and IPv6 \
The art of software security assessment : identifying and preventing software vulnerabilities /
Risk Assessment in Cyber-Physical System /
Foundations of computer security /
A method for improving the Bluetooth key exchange security /
A hybrid fingerprint identification & verification algorithm \
Computer security : principles and practice /
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /
Security in computing /
The History of information security : A Comprehensive Handbook /