Explore our comprehensive collection of books, articles, digital media, and more
Continuous Biometric-based Authentication System Through Eye Tracking /
Encyclopedia of mobile computing and commerce /
Mobile robots : the evolutionary approach /
Mobile computing /
Perceptions of Saudi Female University Students and Faculty MembersToward Using Mobile Devices in Language Learning /
Software ecosystem : understanding an indispensable technology and industry /
Smart phone and next generation mobile computing /
Mobile communications/
Building a model for determining the factors affecting mobile marketing acceptance and adoption \
A steganography-based SMS and MMS services for secure messages exchange on mobile networks \
Novice Users Interface Design Framework for Government Mobile Health Applications /
Introduction to autonomous mobile robots /
Introduction to wireless and mobile systems /
Residential mobility in Riyadh : a study in intraurban migration /
Mobility and inequality : frontiers of research from sociology and economics /
Social Mobile Payment Adoption : An Empirical Investigation of Consumers Perspectives in Saudi Arabia /
The elements of user experience : user-centered design for the Web and beyond /
Building mobile library applications /
Investigating wavelet transform technique for transmitting video information over mobile devices \
User Authentication Based on a Combination of Face Image and Device Identity in Mobile Ecosystem /
Principles of information security /
Integrating security and software engineering : advances and future visions /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
Information security : principles and practice /
Encyclopedia of information ethics and security /
Information hiding technique in digital image using transform domain \
Foundations of computer science : from data manipulation to theory of computation /
Network security : private communication in a public world /
Bi-directional transition mechanism between IPv4 and IPv6 \
The art of software security assessment : identifying and preventing software vulnerabilities /
Risk Assessment in Cyber-Physical System /
Foundations of computer security /
Information security fundamentals /
A method for improving the Bluetooth key exchange security /
A hybrid fingerprint identification & verification algorithm \
Computer security : principles and practice /
Information security : a strategic approach /
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /
Information security : principles and practices /
Security in computing /