Explore our comprehensive collection of books, articles, digital media, and more
Digital Identity and Access Management : technologies and frameworks /
Privacy and practicality of identity management systems : academic overview /
Information security and IT risk management /
Improving Privacy in Decentralized Identity Management Systems with Distributed Ledger Technology (blockchain) as Infrastructure /
Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /
Management of information security /
Information security : principles and practices /
MCSE self-paced training kit (exam 70-298) : designing security for a Microsoft Windows Server 2003 network /
Enhanced secured voice over internet protocol \
Enhancement of IEEE 802.11 layer handoff process and protocol \
Managing information systems security and privacy /
Hybrid Deep Neural Network Based Recommendation Through ImplicitInteractions /
Information security management handbook /
Toward a Successful Virtual School System Implementation : A Case Study of the Saudi Arabia Ministry of Education /
Ensemble-based Deep Learning Intrusion Detection System for Spoofing Attack on UAV /
Developing a host intrusion prevention system by using data mining \
Enhancing User Reputation Evaluation in Blockchain-Based Access Control for IoT using Fuzzy Logic and Decay Algorithms /
The History of information security : A Comprehensive Handbook /
Information security fundamentals /
Intelligent systems design and applications /
The Investigation of the Effect of Ensemble Learning for Assisting the Employment Process /
Principles of data mining /
Arabic Sentiment Analysis Using Machine Learning Algorithms of Twitter Data Based on Spatial and Temporal Analysis - Case Study /
Branch and bound and A* search using fuzzy underestimates \
Artificial intelligence : a modern approach /
Application of agents and intelligent information technologies /
7th International Conference on Practical Applications of Agents and Multi-Agent Systems (PAAMS 2009) /
Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /
Seam Carving Based Two Levels Segmentation In Arabic Handwritten Documents /
Almost human : making robots think /
Knowledge-based systems in artificial intelligence /
Advances in applied artificial intelligence /
Branch and Bound and A Search Using Fuzzy Underestimates /
Encyclopedia of artificial intelligence /
Intelligent information technologies : concepts, methodologies, tools, and applications.
Intelligent computer graphics 2010 /
Metamagical themas : questing for the essence of mind and pattern /
Forecasting the Evolving Role of OpenAIand GPT-3 in the Future of ArtificialIntelligence : Implications for Society /
Applications of information systems to homeland security and defense /
Self-Sovereign Identity Management : A Comparative Study and Technical Enhancements /
A Mapping Framework for the Saudi Cybersecurity and Privacy Controls to MITRE ATT&CK Techniques /