Explore our comprehensive collection of books, articles, digital media, and more
New leader election algorithms in hypercube networks \
Algorithms /
Proposed method of factorization analysis to break the RSA algorithm \
Salp Swarm-Based Feature Selection Algorithms for Anomaly Detection in Network Security /
Introduction to the design & analysis of algorithms /
Introduction to algorithms /
Algorithms and programming : problems and solutions /
The Murder on the Links /
One party democracy; the 1965 Tanzania general elections.
Geography of elections /
A hybrid fingerprint identification & verification algorithm \
Adaptive genetic algorithm for production system \
Bose-Einstein Condensate of 39K-39K mixture in One Dimension Using the Static Fluctuation Approximation (SFA) /
Approximation algorithms /
The design and analysis of algorithms /
Algorithms in C++ /
Algorithm design /
Library and information networks in the United Kingdom /
Principles of information security /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Development and performance analysis of hybrid IPSec SSL VPN technology \
Building the knowledge society on the Internet : sharing and exchanging knowledge in networked environments /
Enhancement of IEEE 802.11 layer handoff process and protocol \
E-business /
E-Commerce systems architecture and applications
Electronic finance : a new approach to financial sector development? /
Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /
The effects of time triggered Ethernet on the network \
AN INTRODUCTION TO OSI / INCHOLAS HEAP
Introduction to E-business : Management and strategy /
Design and analysis of computer communication networks /
Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /
Networking in easy steps /
Computer networks : principles, technologies, and protocols for network design /
Cumputer Networks Lab /
Making search work : implementing Web, intranet, and enterprise search /
Introduction to information systems /
Comparison of two teaching methods for learning a computer-programming language /
Principles of data mining /
A computational introduction to number theory and algebra
Extending the horizons : advances in computing, optimization and decision technologies /
Understanding cryptography : a textbook for students and practitioners /
Drivers and challenges of applying green iT in Saudi Arabia s private sector A case study /
Probability and statistics for computer science /
Computer science : a modern introduction /
Mathematical foundations of computer science 2006 : 31th international symposium, MFCS 2006, StaraLesna, Slovakia, August 28- September 1, 2006 : proceedings /
Invitation to discrete mathematics /
A novel multi-layer virtual memory system to solve memory leak problem /
Discrete mathematics and its applications /
An adaptive bit-level text compression scheme based on the HCDC algorithm \
Bi-directional transition mechanism between IPv4 and IPv6 \
An Intelligent Database System Using Natural Language Processing with Typed or Spoken Sentences / Hessa Abdulrahman Alawwad ; Supervisor Emdad Khan
Understanding computation /
The Al-Kilani dictionary of computer & internet terminology : English-English-Arabic, with illustrations /
Computer careers; planning, prerequisites, potential
Web application security of E-Money transfer systems \
A method for improving the Bluetooth key exchange security /
Developing a robust digital image watermark by using frequency and spatial domains \
Enhanced Method for RSA cryptoststem algorithm \
Investigating distributed database deadlock based on attribute level \
Estimation of null value in relational data base system using K-nearest neighbor and decision tree \
Improving the watermarking performance using combined redundant discrete wavelet transform and contourlet transform scheme \