استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
Managing information systems security and privacy /
Information systems management in practice /
Secure E-Voting system using Secure Multiparty Computation (SMC) for user data privacy /
Improving Privacy in Decentralized Identity Management Systems with Distributed Ledger Technology (blockchain) as Infrastructure /
Management information systems/
Information systems management/
Management information systems : managing the digital firm /
Management information systems : managing the digital firm/
Management information systems : managing information technology in the business enterprise /
Principles of information systems for management /
Public management information systems /
Data Privacy Governance in Data Management Ecosystems : A Compliance Framework for PDPL Standards /
Security and Practicality of Identity and Access Management as a service (IAMaaS) Systems /
Project management for information systems /
Comparison of two teaching methods for learning a computer-programming language /
Principles of data mining /
A computational introduction to number theory and algebra
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Extending the horizons : advances in computing, optimization and decision technologies /
Understanding cryptography : a textbook for students and practitioners /
Drivers and challenges of applying green iT in Saudi Arabia s private sector A case study /
Probability and statistics for computer science /
Computer science : a modern introduction /
Mathematical foundations of computer science 2006 : 31th international symposium, MFCS 2006, StaraLesna, Slovakia, August 28- September 1, 2006 : proceedings /
Invitation to discrete mathematics /
A novel multi-layer virtual memory system to solve memory leak problem /
Discrete mathematics and its applications /
An adaptive bit-level text compression scheme based on the HCDC algorithm \
Bi-directional transition mechanism between IPv4 and IPv6 \
An Intelligent Database System Using Natural Language Processing with Typed or Spoken Sentences / Hessa Abdulrahman Alawwad ; Supervisor Emdad Khan
Understanding computation /
The Al-Kilani dictionary of computer & internet terminology : English-English-Arabic, with illustrations /
Computer careers; planning, prerequisites, potential
Principles of information security /
Integrating security and software engineering : advances and future visions /
Information security : principles and practice /
Encyclopedia of information ethics and security /
Information hiding technique in digital image using transform domain \
Foundations of computer science : from data manipulation to theory of computation /
Network security : private communication in a public world /
The art of software security assessment : identifying and preventing software vulnerabilities /
Risk Assessment in Cyber-Physical System /
Foundations of computer security /
Information security fundamentals /
A method for improving the Bluetooth key exchange security /
A hybrid fingerprint identification & verification algorithm \
Computer security : principles and practice /
Information security : a strategic approach /
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /
Information security : principles and practices /
Security in computing /
Security Investigation and Analysis of OpenID: Problems and Enhancements /
FORENSIC ANALYSIS OF ONLINE SOCIAL NETWORKING APPLICATIONS /
Privacy and practicality of identity management systems : academic overview /