Explore our comprehensive collection of books, articles, digital media, and more
Network security : private communication in a public world /
Principles of data processing /
Principles of information security /
Information security : principles and practices /
Principles of computer security : Security+ TM and beyond /
Principles of information systems security : text and cases /
Computer security : principles and practice /
Data Warehousing and Data Mining Techniques for Cyber Security /
Anonymization of Host-Based Logs for Preserving Data Privacy and Security Monitoring Utility /
Data processing cost reduction and control /
Information security fundamentals /
Enhancing IoT Device Security : A Comparative Analysis of Machine Learning Algorithms for Attack Detection /
The History of information security : A Comprehensive Handbook /
Cryptography and network security : principles and practice /
Security engineering : a guide to building dependable distributed systems /
Security in computing /
Computing concepts with C++ essentials /
International Computing Symposium, 1977 : proceedings of the International Computing Symposium, 1977, Liege, Belgium, 4-7 April 1977 /
Data processing, an introduction with BASIC /
Basic English for computing: Teacher's book/
The information age /
INSPEC thesaurus /
Introduction to computers and basic programming /
Data processing contracts : structure, contents, and negotiation /
Computing : a dictionary of terms, concepts and ideas /
Bi-directional transition mechanism between IPv4 and IPv6 \
Computer concepts 2012.
The Al-Kilani dictionary of computer & internet terminology : English-English-Arabic, with illustrations /
Predictors of success in self-instruction courses on micro-computer application software /
Computer confluence : exploring tomorrows technology /
Inspec thesaurus
Computers : information technology in perspective /
Computer confluence : tomorrows technology and you : introductory /
SOFSEM 2007 : theory and practice of computer science : 33rd Conference on Current Trends in Theory and Practice of Computer Science, Harrachov, Czech Republic, January 20-26, 2007 : proceedings /
Information rights in practice: the non-legal professionals guide/
Information hiding technique in digital image using transform domain \
Digital borders and real rights : effective remedies for third-country nationals in the Schengen Information System /
Information security applications : 6th international workshop, WISA 2005, Jeju Island, Korea, August 22-24, 2005 : revised selected papers /
Developing a Cybersecurity Risk Assessment Tool for Saudi Government Organizations /
Developing a robust digital image watermark by using frequency and spatial domains \
Information assurance for the enterprise : a roadmap to information security /
Staying legal : a guide to issues and practice affecting the library, information, and publishing sectors /
Information security management handbook /
Digital rights management : technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised selected papers /
Essential law for information professionals /
Self-Sovereign Identity Management : A Comparative Study and Technical Enhancements /
Digital preservation /
Pervasive information security and privacy developments : trends and advancements /
Data and knowledge protection in data mining \
A Mapping Framework for the Saudi Cybersecurity and Privacy Controls to MITRE ATT&CK Techniques /
Principles of data security /