استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
A Mapping Framework for the Saudi Cybersecurity and Privacy Controls to MITRE ATT&CK Techniques /
Risk assessment of environmental hazard /
Risk Assessment in Cyber-Physical System /
Banking Credit Risk and Disclosure Behavior : Evidence from Saudi Banks /
An Investigation of the Influence of Information Technology on Audit Risk : An Empirical Study in Saudi Arabia /
Risk and opportunity :World development report 2014 managing risk for development
The tools of government in the digital age /
The organization of information systems for government and public administration /
Organization for rural development : risk taking and appropriate technology /
Developing a Performance-based Tool for Arabic Text Steganography /
Developing teacher assessment /
Toward an Understanding of Government Cloud Acceptance: A Quantitative Study of G-Cloud Acceptance by Saudi Government Agencies Using Extended UTAUT /
Benefit-Risk Assessment of Medicines : The Development and Application of a Universal Framework for Decision-Making and Effective Communication /
Anonymization of Host-Based Logs for Preserving Data Privacy and Security Monitoring Utility /
Pervasive information security and privacy developments : trends and advancements /
Risk management for hazardous chemicals /
Health assessment in nursing /
Principles of behavioral assessment /
Assessing the inservice training needs of teachers of English as a foreign language in Saudi Arabia /
Developing an excellence assessment model for Jordanian businesses (JBEAM) /
Principles of information security /
Integrating security and software engineering : advances and future visions /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Information security : principles and practice /
Encyclopedia of information ethics and security /
Information hiding technique in digital image using transform domain \
Foundations of computer science : from data manipulation to theory of computation /
Network security : private communication in a public world /
Bi-directional transition mechanism between IPv4 and IPv6 \
The art of software security assessment : identifying and preventing software vulnerabilities /
Foundations of computer security /
Information security fundamentals /
A method for improving the Bluetooth key exchange security /
A hybrid fingerprint identification & verification algorithm \
Computer security : principles and practice /
Information security : a strategic approach /
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /
Information security : principles and practices /
Security in computing /
Information rights in practice: the non-legal professionals guide/
Digital borders and real rights : effective remedies for third-country nationals in the Schengen Information System /
Developing a Cybersecurity Risk Assessment Tool for Saudi Government Organizations /
Developing a robust digital image watermark by using frequency and spatial domains \
Information assurance for the enterprise : a roadmap to information security /
Staying legal : a guide to issues and practice affecting the library, information, and publishing sectors /
Information security management handbook /
Digital rights management : technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised selected papers /
The History of information security : A Comprehensive Handbook /
Essential law for information professionals /
Self-Sovereign Identity Management : A Comparative Study and Technical Enhancements /
Digital preservation /
Data and knowledge protection in data mining \
PrivCheck: tool for simulation and enhancement of users' privacy in facebook online social network/
Analysis Of Private Information Leakage From Saudis On Twitter - Online Social Network /
Developing a Framework for Cost-Benefit Analysis of Cloud Computing Adoption by Higher Education Institutions in KSA /
Factors Influencing Saudi Higher Education Institution Intention toward Community Cloud Adoption / by Norah Ibraheem Mohammed Al-Saeed ; Supervisor Mohamed Saad Saleh
Factors Influencing Saudi Universities Female Students' Intention to Use Cloud Computing / By Abrar F supervised by Mohamed Saad Saleh