Skip to content
VuFind
  • Feedback
  • Book Bag: 0 items (Full)
  • Login
    • العربية
    • الإنجليزية

Discover Knowledge Resources!

Explore our comprehensive collection of books, articles, digital media, and more

Advanced
  • OneSearch
  • Library Catalog
  • Digital Repository
  • Channels
  • Cryptography and network security :
Search for more channels:

Similar Items: Cryptography and network security :

Network security essentials : applications and standards /

Network security essentials : applications and standards /

Computer security : principles and practice /

Computer security : principles and practice /

Computer security : principles and practice /

Information security : principles and practices /

Network security : how to plan for it and achieve it /

Network security : private communication in a public world /

Security program and policies principles and practices /

Principles of information security /

Principles of information security /

Cryptography : theory and practice /

Cryptography : theory and practice /

Principles of information systems security : text and cases /

Information security and IT risk management /

Salp Swarm-Based Feature Selection Algorithms for Anomaly Detection in Network Security /

Information security : principles and practice /

Information security : principles and practices /

Wireless network security : a beginner's guide /

Understanding cryptography : a textbook for students and practitioners /

Topic: Coding theory

Cryptography : theory and practice /

Introduction to coding theory /

Cryptography and network security : principles and practice /

Coding theory and cryptography : the essentials /

Advances in coding theory and crytography/

Introduction to data compression /

Cryptography : theory and practice /

Topic: Computer networks

  • Topic: Computer security
  • Topic: Data encryption
  • Topic: Security measures
  • Topic: Computer science

Library and information networks in the United Kingdom /

Principles of information security /

Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \

Development and performance analysis of hybrid IPSec SSL VPN technology \

Building the knowledge society on the Internet : sharing and exchanging knowledge in networked environments /

Enhancement of IEEE 802.11 layer handoff process and protocol \

E-business /

E-Commerce systems architecture and applications

Electronic finance : a new approach to financial sector development? /

Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /

The effects of time triggered Ethernet on the network \

AN INTRODUCTION TO OSI / INCHOLAS HEAP

Introduction to E-business : Management and strategy /

Design and analysis of computer communication networks /

Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /

Networking in easy steps /

Computer networks : principles, technologies, and protocols for network design /

Cumputer Networks Lab /

Making search work : implementing Web, intranet, and enterprise search /

Introduction to information systems /

Author: Stallings, William

Operating systems : internals and design principles /

Operating systems : internals and design principles /

Computer security : principles and practice /

Computer organization and architecture : designing for performance /

Computer organization and architecture : designing for performance /

Network security essentials : applications and standards /

Operating systems : internals and design principles /

Cryptography and network security : principles and practice /

Network security essentials : applications and standards /

Computer organization and architecture : designing for performance /

Computer security : principles and practice /

Data and computer communications /

Computer security : principles and practice /

Business data communications /

Computer organization and architecture : designing for performance /

Computer organization and architecture : designing for performance /

Operating systems : internals and design principles /

Computer organization and architecture : designing for performance /

Author: Surathkal, Nitk

  • Author: Tahiliani, Mohit P

Cryptography and network security : principles and practice /

Discover Knowledge with Imam University's Digital Discovery Portal

Access thousands of academic resources, research materials, and scholarly publications

Start Exploring Now
Imam University Team
Imam University Logo

Imam Muhammad Ibn Saud Islamic University

Riyadh, Kingdom of Saudi Arabia
+966 11 259 5000
info@imamu.edu.sa

Resources

  • Browse the Catalog
  • Browse Alphabetically
  • Explore Channels
  • Course Reserves
  • New Items
  • Educational resources
  • ImamU API

Search & Help

  • Basic search
  • Advanced search
  • Search history
  • Feedback
  • Search Tips
  • Ask a Librarian
  • Help
  • FAQs
  • Service level agreement
  • End User Agreement

Connect With Us

© 2026 Imam Muhammad Ibn Saud Islamic University. All rights reserved.

VuFind