استكشف مجموعتنا الشاملة من الكتب والمقالات والوسائط الرقمية وغيرها
Network security : how to plan for it and achieve it /
Network security essentials : applications and standards /
Network security : private communication in a public world /
Cryptography and network security : principles and practice /
Virus detection using artificial immune system with genetic algorithm \
Wireless network security : a beginner's guide /
Resource Allocation Based on Swarm Intelligence for Securing Cloud Environment Against Multi-Tenancy Attack /
Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /
Leader election algorithms for three dimensions torus networks with the presence of one or two links failure \
New leader election algorithms in hypercube networks \
Secure roaming in 802.11 networks /
Features Selection for Image Steganalysis Using Swarm Intelligence /
Computer security : principles and practice /
Principles of information security /
Proposed method of factorization analysis to break the RSA algorithm \
Investigative data mining for security and criminal detection /
Information security : principles and practices /
Interactive computer graphics : data structures, algorithms, languages /
A Metaheuristic to Solve the Capacitated Clustering Problem /
Quality of service routing for multimedia multicast over Ad Hoc networks \
Algorithmic game theory /
Algorithmic methods in non-commutative algebra : applications to quantum groups /
Diagnosis and mastery treatment in mathematics a strategy for renadial teaching in the upper forms of Egyptian primary schools /
Enhanced Method for RSA cryptoststem algorithm \
Programming.architecture/
Planning algorithms /
Multi-Robot Path Planning Problem : a Complete Polynomial Method /
Calculation of medication dosages : practical strategies to ensure safety and accuracy /
Digital image processing algorithms and applications /
Salp Swarm-Based Feature Selection Algorithms for Anomaly Detection in Network Security /
Genetic Algorithm for the Generalized Travelling Salesman Problem /
An Energy Efficient Routing Algorithm Using Chaotic Grey Wolf with Mobile Sink-Based Path Optimization for Wireless Sensor Networks /
Predicting the Severity of COVID-19 in the Kingdom of Saudi Arabia using Machine Learning Algorithms /
Library and information networks in the United Kingdom /
Development and performance analysis of hybrid IPSec SSL VPN technology \
Building the knowledge society on the Internet : sharing and exchanging knowledge in networked environments /
Enhancement of IEEE 802.11 layer handoff process and protocol \
E-business /
E-Commerce systems architecture and applications
Electronic finance : a new approach to financial sector development? /
The effects of time triggered Ethernet on the network \
AN INTRODUCTION TO OSI / INCHOLAS HEAP
Introduction to E-business : Management and strategy /
Design and analysis of computer communication networks /
Convolutional Neural Network and Long-short Term Memory Techniques for Human Identification Based on Heart Biometrics /
Networking in easy steps /
Computer networks : principles, technologies, and protocols for network design /
Cumputer Networks Lab /
Making search work : implementing Web, intranet, and enterprise search /
Introduction to information systems /