استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
Web commerce cookbook /
C++ cookbook /
IOS 7 programming cookbook /
Violent Python : a cookbook for hackers, forensic analysts, penetration testers and security engineers /
The robot builders cookbook /
Creo Parametric 2.0 tutorial and multimedia DVD /
A technique for software and systems design /
Software testing techniques /
Image encryption based on chaos technique \
Compilers : principles, techniques, & tools /
Code complete /
Data mining : practical machine learning tools and techniques /
Cyber warfare : techniques, tactics and tools for security practitioners /
Integrating security and software engineering : advances and future visions /
Improving software requirements gathering using workshops techniques \
Information security : principles and practice /
The art of software security assessment : identifying and preventing software vulnerabilities /
A software maintenance process model with feature-based tool and reliability metrics \
Computer security /
Adversarial Attacks against Malware Detectors and Defence Mechainsms /
Principles of information security /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Encyclopedia of information ethics and security /
Information hiding technique in digital image using transform domain \
Foundations of computer science : from data manipulation to theory of computation /
Network security : private communication in a public world /
Bi-directional transition mechanism between IPv4 and IPv6 \
Risk Assessment in Cyber-Physical System /
Foundations of computer security /
Information security fundamentals /
A method for improving the Bluetooth key exchange security /
A hybrid fingerprint identification & verification algorithm \
Computer security : principles and practice /
Information security : a strategic approach /
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /
Information security : principles and practices /
Security in computing /
Malware analyst's cookbook and DVD : tools and techniques for fighting malicious code /