استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
Developing a Cybersecurity Risk Assessment Tool for Saudi Government Organizations /
Pervasive information security and privacy developments : trends and advancements /
Anonymization of Host-Based Logs for Preserving Data Privacy and Security Monitoring Utility /
Personal Privacy In Smartphones /
Privacy and access to government data for research : an international bibliography /
Security in computing /
Improving Privacy in Decentralized Identity Management Systems with Distributed Ledger Technology (blockchain) as Infrastructure /
Managing information systems security and privacy /
Privacy and practicality of identity management systems : academic overview /
Understanding the Acceptance of Fingerprint-Based Authentication for E-payment Based on Extended Valence Framework /
Developing an Integrated Framework to Utilize Big Data for Higher Education Institutions in Saudi Arabia / By Norah Abdulaziz supervised by Abulrauf Baig
Controls and requirements for Applying cybersecurity to protect data at Princess Nourah University | ضوابط ومتطلبات تطبيق الأمن السيبراني لحماية البيانات في جامعة الأميرة نورة
El Significado Del Trabajo (Meaning of Work) En Arabia Saudi Y Espana /
Information security fundamentals /
Information assurance for the enterprise : a roadmap to information security /
Microprocessors for measurement and control /
The Impact of Augmented Reality on E-learning Systems in Saudi Arabia Universities /
Investigating the Tutoring Practices in the Writing Centers at Saudi Universities /
Secure E-Voting system using Secure Multiparty Computation (SMC) for user data privacy /
Principles of information security /
Integrating security and software engineering : advances and future visions /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Information security : principles and practice /
Encyclopedia of information ethics and security /
Information hiding technique in digital image using transform domain \
Foundations of computer science : from data manipulation to theory of computation /
Network security : private communication in a public world /
Bi-directional transition mechanism between IPv4 and IPv6 \
The art of software security assessment : identifying and preventing software vulnerabilities /
Risk Assessment in Cyber-Physical System /
Foundations of computer security /
A method for improving the Bluetooth key exchange security /
A hybrid fingerprint identification & verification algorithm \
Computer security : principles and practice /
Information security : a strategic approach /
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /
Information security : principles and practices /
A Mapping Framework for the Saudi Cybersecurity and Privacy Controls to MITRE ATT&CK Techniques /
Self-Sovereign Identity Management : A Comparative Study and Technical Enhancements /