استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
Digital Identity and Access Management : technologies and frameworks /
Privacy and access to government data for research : an international bibliography /
The Role of top management in the control of inventory /
Attribute Based Access Control with Merkle DAG to protect the Integrity of Electronic Medical Records /
Programming for numerical control machines /
Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /
Birth control in the modern world : the role of the individual in population control /
Enhancing User Reputation Evaluation in Blockchain-Based Access Control for IoT using Fuzzy Logic and Decay Algorithms /
Modern control systems /
Development of a network-based intrusion prevention system using data mining approach \
Salp Swarm-Based Feature Selection Algorithms for Anomaly Detection in Network Security /
An introduction to software quality control /
Singular optimal control : the linear-quadratic problem/
Microprocessors for measurement and control /
High-level subject access tools and techniques in Internet cataloging /
Process dynamics and control /
Microsoft Access 2002 /
Extensions of linear-quadratic control theory /
Handbook of biological control : principles and applications of biological control/
Microsoft Access 2013 : comprehensive /
Library and information networks in the United Kingdom /
Principles of information security /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Development and performance analysis of hybrid IPSec SSL VPN technology \
Building the knowledge society on the Internet : sharing and exchanging knowledge in networked environments /
Enhancement of IEEE 802.11 layer handoff process and protocol \
E-business /
E-Commerce systems architecture and applications
Electronic finance : a new approach to financial sector development? /
The effects of time triggered Ethernet on the network \
AN INTRODUCTION TO OSI / INCHOLAS HEAP
Introduction to E-business : Management and strategy /
Design and analysis of computer communication networks /
Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /
Networking in easy steps /
Computer networks : principles, technologies, and protocols for network design /
Cumputer Networks Lab /
Making search work : implementing Web, intranet, and enterprise search /
Introduction to information systems /
Integrating security and software engineering : advances and future visions /
Information security : principles and practice /
Encyclopedia of information ethics and security /
Information hiding technique in digital image using transform domain \
Foundations of computer science : from data manipulation to theory of computation /
Network security : private communication in a public world /
Bi-directional transition mechanism between IPv4 and IPv6 \
The art of software security assessment : identifying and preventing software vulnerabilities /
Risk Assessment in Cyber-Physical System /
Foundations of computer security /
Information security fundamentals /
A method for improving the Bluetooth key exchange security /
A hybrid fingerprint identification & verification algorithm \
Computer security : principles and practice /
Information security : a strategic approach /
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /
Information security : principles and practices /
Security in computing /
Role-based access control /