استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
Gray's anatomy for students /
Gray's atlas of anatomy /
Gray's anatomy : the anatomical basis of clinical practice /
Narcissism in Oscar wildes the picture of dorian gray /
Oscar wilde's aesthetics in the picture of Dorian gray /
The geography of faith / conversations between Daniel Berrigan, when underground, and Robert Coles
A practical guide to Fedora and Red Hat Enterprise Linux /
Laboratory manual for anatomy and physiology /
Orations of Cicero, with a selection from his letters /
The portrait of a lady : maiden, woman, and heroine /
The professional medical assistant : an integrative, teamworkbased approach /
The Jewish writer in America; assimilation and the crisis of identity /
Diseases in a flash! : an interactive, flash-card approach/
Medical terminology in a flash! : a multiple learning styles approach /
Mechanical engineering : emulsions of diesel /
Snell's Clinical neuroanatomy /
Acute adult dermatology : diagnosis and management /
Engineering ethics : concepts and cases /
Web programming : building Internet applications /
The ethics of Aristotle : the Nicomachean ethics /
Principles of information security /
Integrating security and software engineering : advances and future visions /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Information security : principles and practice /
Encyclopedia of information ethics and security /
Information hiding technique in digital image using transform domain \
Foundations of computer science : from data manipulation to theory of computation /
Network security : private communication in a public world /
Bi-directional transition mechanism between IPv4 and IPv6 \
The art of software security assessment : identifying and preventing software vulnerabilities /
Risk Assessment in Cyber-Physical System /
Foundations of computer security /
Information security fundamentals /
A method for improving the Bluetooth key exchange security /
A hybrid fingerprint identification & verification algorithm \
Computer security : principles and practice /
Information security : a strategic approach /
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /
Information security : principles and practices /
Security in computing /
Gray hat hacking : the ethical hacker's handbook /