استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
The basics of digital forensics : the primer for getting started in digital forensics /
Criminal investigation, a guide to techniques and solutions /
Foundations of computer security /
Introduction to computer data processing /
Forensic science : fundamentals & investigations /
Basics of digital computers
Digital computer concepts: a self-instructional programmed manual
AN INTRODUCTION TO COMPUTER PROGRAMMING
Computers and computing : an introduction through BASIC /
Computer data processing
Beginner's guide to computers /
Digital computer system principles
Beginner's guide to computer programming
PET personal computer guide /
Violent Python : a cookbook for hackers, forensic analysts, penetration testers and security engineers /
Introduction to computers /
Computers in society; an introduction to information processing
Fraud and its effect in documentary credit \
Encyclopedia of information ethics and security /
Frameworks for ICT policy : government, social and legal issues /
Guide to computer forensics and investigations : processing digital evidence /
Detecting phishing websites using associative classification mining \
Principles of information security /
Integrating security and software engineering : advances and future visions /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Information security : principles and practice /
Information hiding technique in digital image using transform domain \
Foundations of computer science : from data manipulation to theory of computation /
Network security : private communication in a public world /
Bi-directional transition mechanism between IPv4 and IPv6 \
The art of software security assessment : identifying and preventing software vulnerabilities /
Risk Assessment in Cyber-Physical System /
Information security fundamentals /
A method for improving the Bluetooth key exchange security /
A hybrid fingerprint identification & verification algorithm \
Computer security : principles and practice /
Information security : a strategic approach /
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /
Information security : principles and practices /
Security in computing /