استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
Role-based access control /
Self-Sovereign Identity Management : A Comparative Study and Technical Enhancements /
Information security and IT risk management /
Management of information security /
Privacy and practicality of identity management systems : academic overview /
Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /
Digital libaries and information access : research perspectives /
Privacy and access to government data for research : an international bibliography /
Security and Practicality of Identity and Access Management as a service (IAMaaS) Systems /
Network security : private communication in a public world /
Development and performance analysis of hybrid IPSec SSL VPN technology \
Principles of information security /
Managing information systems security and privacy /
Digital rights management : technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised selected papers /
Digital Systems Design \
High-level subject access tools and techniques in Internet cataloging /
Microsoft Access 2002 /
Computer security : principles and practice /
Principles of information systems security : text and cases /
Digital Identity and Access Management : technologies and frameworks /
Library and information networks in the United Kingdom /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Building the knowledge society on the Internet : sharing and exchanging knowledge in networked environments /
Enhancement of IEEE 802.11 layer handoff process and protocol \
E-business /
E-Commerce systems architecture and applications
Electronic finance : a new approach to financial sector development? /
The effects of time triggered Ethernet on the network \
AN INTRODUCTION TO OSI / INCHOLAS HEAP
Introduction to E-business : Management and strategy /
Design and analysis of computer communication networks /
Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /
Networking in easy steps /
Computer networks : principles, technologies, and protocols for network design /
Cumputer Networks Lab /
Making search work : implementing Web, intranet, and enterprise search /
Introduction to information systems /