Explore our comprehensive collection of books, articles, digital media, and more
Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /
Database security and integrity /
Management of information security /
A Unified Framework for Automating Software Security Analysis in DevSecOps /
Enhanced secured voice over internet protocol \
Managing information systems security and privacy /
Investigating the status of Open Government Data initiatives in Saudi Arabia /
Investigative data mining for security and criminal detection /
Information security : a strategic approach /
Principles of information security /
Security program and policies principles and practices /
Computer security /
Security analysis and portfolio management /
Information security : principles and practices /
Secure E-Voting system using Secure Multiparty Computation (SMC) for user data privacy /
Information security : principles and practice /
Computer security : art and science /
Integrating security and software engineering : advances and future visions /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Encyclopedia of information ethics and security /
Information hiding technique in digital image using transform domain \
Foundations of computer science : from data manipulation to theory of computation /
Network security : private communication in a public world /
Bi-directional transition mechanism between IPv4 and IPv6 \
The art of software security assessment : identifying and preventing software vulnerabilities /
Risk Assessment in Cyber-Physical System /
Foundations of computer security /
Information security fundamentals /
A method for improving the Bluetooth key exchange security /
A hybrid fingerprint identification & verification algorithm \
Computer security : principles and practice /
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /
Security in computing /
Improving security performance on the banking system distributed database \
Security Investigation and Analysis of OpenID: Problems and Enhancements /
FORENSIC ANALYSIS OF ONLINE SOCIAL NETWORKING APPLICATIONS /
Privacy and practicality of identity management systems : academic overview /