استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
Web services security and e-business /
Computer and information security handbook /
Network security essentials : applications and standards /
The History of information security : A Comprehensive Handbook /
Handbook of research on wireless security /
Web services research for emerging applications : discoveries and trends /
Building Web applications with UML /
Secure E-government web services/
An introduction to databases with Web applications /
Information security : principles and practices /
Handbook of Internet and multimedia systems and applications /
High-performance and Secure Software Implementations for Elliptic Curve Crypto-System /
Web application security of E-Money transfer systems \
Information assurance handbook : effective computer security and risk management strategies /
Principles of information security /
Software engineering for modern Web applications : methodologies and technologies /
Web programming : building Internet applications /
Information security and IT risk management /
Integrating security and software engineering : advances and future visions /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Information security : principles and practice /
Encyclopedia of information ethics and security /
Information hiding technique in digital image using transform domain \
Foundations of computer science : from data manipulation to theory of computation /
Network security : private communication in a public world /
Bi-directional transition mechanism between IPv4 and IPv6 \
The art of software security assessment : identifying and preventing software vulnerabilities /
Risk Assessment in Cyber-Physical System /
Foundations of computer security /
Information security fundamentals /
A method for improving the Bluetooth key exchange security /
A hybrid fingerprint identification & verification algorithm \
Computer security : principles and practice /
Information security : a strategic approach /
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /
Security in computing /
Basic Internet fundamentals
Development and performance analysis of hybrid IPSec SSL VPN technology \
A Tool for Privacy-Aware Online Personal Photo Sharing Using Deep Learning Technique /
The effect of online discussion groups on the pedagogical and professional development of novice female EFL instructors \
PrivCheck: tool for simulation and enhancement of users' privacy in facebook online social network/
New infrastructures for knowledge production : understanding E-science /
The Internet for library and information service professionals /
Archiving websites : a practical guide for information management professionals /
Safety and security on the Internet : challenges and advances in member states : based on the findings of the second global survey on eHealth
The Al-Kilani dictionary of computer & internet terminology : English-English-Arabic, with illustrations /
Internet of Things for the Purpose of Smart Crowd Management and Personalized Recommendations in Large Public Spaces /
The Harvard Conference on the Internet & Society /
Computer networking : a top-down approach /
The Internet for dummies /
Semantic web technologies and e-business : toward the integrated virtual organization and business process automation /
Managing your Internet and intranet services : the information professional's guide to strategy /
Computer networking : a topï12down approach
The web application hacker's handbook : finding and exploiting security flaws /