Skip to content
VuFind
  • Feedback
  • Book Bag: 0 items (Full)
  • Login
    • العربية
    • الإنجليزية

Discover Knowledge Resources!

Explore our comprehensive collection of books, articles, digital media, and more

Advanced
  • OneSearch
  • Library Catalog
  • Digital Repository
  • Channels
  • Network security :
Search for more channels:

Similar Items: Network security :

Principles of data security /

Network security : how to plan for it and achieve it /

Network security essentials : applications and standards /

Network security essentials : applications and standards /

Cryptography and network security : principles and practice /

Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /

Wireless network security : a beginner's guide /

Salp Swarm-Based Feature Selection Algorithms for Anomaly Detection in Network Security /

The History of information security : A Comprehensive Handbook /

Security engineering : a guide to building dependable distributed systems /

Computer security : principles and practice /

Computer security : principles and practice /

Information security : principles and practices /

Computer security : principles and practice /

Principles of information security /

Principles of information security /

Information security and IT risk management /

Web services security and e-business /

Management of information security /

Principles of information systems security : text and cases /

Topic: Computer security

Principles of information security /

Integrating security and software engineering : advances and future visions /

Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \

Information security : principles and practice /

Encyclopedia of information ethics and security /

Information hiding technique in digital image using transform domain \

Foundations of computer science : from data manipulation to theory of computation /

Network security : private communication in a public world /

Bi-directional transition mechanism between IPv4 and IPv6 \

The art of software security assessment : identifying and preventing software vulnerabilities /

Risk Assessment in Cyber-Physical System /

Foundations of computer security /

Information security fundamentals /

A method for improving the Bluetooth key exchange security /

A hybrid fingerprint identification & verification algorithm \

Computer security : principles and practice /

Information security : a strategic approach /

Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /

Information security : principles and practices /

Security in computing /

Topic: Computers

  • Topic: Electronic data processing departments
  • Topic: Computer networks
  • Topic: Access control
  • Topic: Security measures

Computing concepts with C++ essentials /

International Computing Symposium, 1977 : proceedings of the International Computing Symposium, 1977, Liege, Belgium, 4-7 April 1977 /

Data processing, an introduction with BASIC /

Basic English for computing: Teacher's book/

The information age /

INSPEC thesaurus /

Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /

Introduction to computers and basic programming /

Data processing contracts : structure, contents, and negotiation /

Network security : private communication in a public world /

Computing : a dictionary of terms, concepts and ideas /

Bi-directional transition mechanism between IPv4 and IPv6 \

Computer concepts 2012.

The Al-Kilani dictionary of computer & internet terminology : English-English-Arabic, with illustrations /

Predictors of success in self-instruction courses on micro-computer application software /

Computer confluence : exploring tomorrows technology /

Inspec thesaurus

Computers : information technology in perspective /

Computer confluence : tomorrows technology and you : introductory /

SOFSEM 2007 : theory and practice of computer science : 33rd Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 20-26, 2007 : proceedings /

Author: Kaufman, Charlie

Network security : private communication in a public world /

Author: Perlman, Radia

  • Author: Speciner, Mike

Network security : private communication in a public world /

Discover Knowledge with Imam University's Digital Discovery Portal

Access thousands of academic resources, research materials, and scholarly publications

Start Exploring Now
Imam University Team
Imam University Logo

Imam Muhammad Ibn Saud Islamic University

Riyadh, Kingdom of Saudi Arabia
+966 11 259 5000
info@imamu.edu.sa

Resources

  • Browse the Catalog
  • Browse Alphabetically
  • Explore Channels
  • Course Reserves
  • New Items
  • Educational resources
  • ImamU API

Search & Help

  • Basic search
  • Advanced search
  • Search history
  • Feedback
  • Search Tips
  • Ask a Librarian
  • Help
  • FAQs
  • Service level agreement
  • End User Agreement

Connect With Us

© 2026 Imam Muhammad Ibn Saud Islamic University. All rights reserved.

VuFind