LitRes
Search
Please enter three or more letters to search
Log in
6
Do you know that...
Joining LitRes, you care about the environment
Sign up
Log in
My books
My books
Cart
Lists
About us
About & Contacts
Genres
New releases
Popular
Audiobooks
Books to read
Coupon
All 345 genres
Books
Foreign literature
Foreign computer books
Foreign computer books
Subgenres
One level up
(Foreign literature)
Suggestions
New releases
Popular
E-books
E-books and audiobooks
E-books
2743
Audiobooks
37
in all languages
2743
in English
1748
in Albanian
1
in Bengal
1
in Bulgarian
2
in Burmese
1
in Chinese
1
in Dutch
1
in French
5
in German
48
in Greek
1
in Italian
6
in Malay
1
in Polish
2
in Portuguese
5
in Russian
894
in Spanish
22
in Telugu
1
in Turkish
2
in Ukrainian
1
Multimedia Security 2
William Puech
0
Intelligent Security Management and Control in the IoT
Mohamed-Aymen Chalouf
0
Cybersecurity in Smart Homes
Rida Khatoun
0
Cybersecurity and Local Government
Donald F. Norris
0
Cyber Security and Network Security
0
Diagnosis and Fault-tolerant Control 1
0
Conflicts, Crimes and Regulations in Cyberspace
0
Cyber Security and Network Security
0
Cybersecurity Risk Management
Cynthia Brumfield
0
Cybersecurity Risk Management
Cynthia Brumfield
0
Multimedia Security, Volume 1
William Puech
0
Cyber Security and Digital Forensics
2
Diagnosis and Fault-tolerant Control 1
0
Multimedia Security, Volume 1
William Puech
0
Corporate Cybersecurity
John Jackson
0
The Metrics Manifesto
Richard Seiersen
0
Cryptography, Information Theory, and Error-Correction
Aiden A. Bruen
0
Security Issues and Privacy Concerns in Industry 4.0 Applications
0
Chance, Calculation and Life
0
Intelligent Network Management and Control
Badr Benmammar
0
Information Security
Mark Stamp
2
Diagnosis and Fault-tolerant Control Volume 2
0
Diagnosis and Fault-tolerant Control Volume 2
0
Multi-Processor System-on-Chip 2
0
Cultural Commons in the Digital Ecosystem
Maud Pelissier
0
Intelligent Network Management and Control
Badr Benmammar
0
Conflicts, Crimes and Regulations in Cyberspace
0
Cryptography, Information Theory, and Error-Correction
Aiden A. Bruen
0
Cultural Commons in the Digital Ecosystem
Maud Pelissier
0
Hyperdocumentation
Olivier Le Deuff
0
Inside the World of Computing
0
Information Security
Mark Stamp
0
Corporate Cybersecurity
John Jackson
0
Smart Buildings, Smart Communities and Demand Response
0
Security Issues and Privacy Concerns in Industry 4.0 Applications
1
Practical Industrial Cybersecurity
Charles J. Brooks
0
Security Awareness For Dummies
Ira Winkler
0
Archives in the Digital Age
Abderrazak Mkadmi
0
From Traditional Fault Tolerance to Blockchain
Wenbing Zhao
0
Building Secure Cars
Dennis Kengo Oka
0
0
0
PDF
William Puech
Multimedia Security 2. Biometrics, Video Surveillance and Multimedia Encryption
0
0
Text
Mohamed-Aymen Chalouf
Intelligent Security Management and Control in the IoT
0
0
Text
Rida Khatoun
Cybersecurity in Smart Homes. Architectures, Solutions and Technologies
0
0
PDF
Donald F. Norris
Cybersecurity and Local Government
0
0
Text
Cyber Security and Network Security
0
0
PDF
Diagnosis and Fault-tolerant Control 1. Data-driven and Model-based Fault Diagnosis Techniques
0
0
Text
Conflicts, Crimes and Regulations in Cyberspace
0
0
PDF
Cyber Security and Network Security
0
0
Text
Cynthia Brumfield
Cybersecurity Risk Management. Mastering the Fundamentals Using the NIST Cybersecurity Framework
0
0
PDF
Cynthia Brumfield
Cybersecurity Risk Management. Mastering the Fundamentals Using the NIST Cybersecurity Framework
0
0
Text
William Puech
Multimedia Security, Volume 1. Authentication and Data Hiding
3,0
2
PDF
Cyber Security and Digital Forensics. Challenges and Future Trends
0
0
Text
Diagnosis and Fault-tolerant Control 1. Data-driven and Model-based Fault Diagnosis Techniques
0
0
PDF
William Puech
Multimedia Security, Volume 1. Authentication and Data Hiding
0
0
Text
John Jackson
Corporate Cybersecurity. Identifying Risks and the Bug Bounty Program
0
0
PDF
Richard Seiersen
The Metrics Manifesto. Confronting Security with Data
0
0
Text
Aiden A. Bruen
Cryptography, Information Theory, and Error-Correction. A Handbook for the 21st Century
0
0
PDF
Security Issues and Privacy Concerns in Industry 4.0 Applications
0
0
PDF
Chance, Calculation and Life
0
0
PDF
Badr Benmammar
Intelligent Network Management and Control. Intelligent Security, Multi-criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio
4,0
2
Text
Mark Stamp
Information Security. Principles and Practice
0
0
Text
Diagnosis and Fault-tolerant Control Volume 2. From Fault Diagnosis to Fault-tolerant Control
0
0
PDF
Diagnosis and Fault-tolerant Control Volume 2. From Fault Diagnosis to Fault-tolerant Control
0
0
Text
Multi-Processor System-on-Chip 2. Applications
0
0
Text
Maud Pelissier
Cultural Commons in the Digital Ecosystem
0
0
Text
Badr Benmammar
Intelligent Network Management and Control. Intelligent Security, Multi-criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio
0
0
PDF
Conflicts, Crimes and Regulations in Cyberspace
0
0
PDF
Aiden A. Bruen
Cryptography, Information Theory, and Error-Correction. A Handbook for the 21st Century
0
0
PDF
Maud Pelissier
Cultural Commons in the Digital Ecosystem
0
0
PDF
Olivier Le Deuff
Hyperdocumentation
0
0
PDF
Inside the World of Computing. Technologies, Uses, Challenges
0
0
PDF
Mark Stamp
Information Security. Principles and Practice
0
0
PDF
John Jackson
Corporate Cybersecurity. Identifying Risks and the Bug Bounty Program
0
0
Text
Smart Buildings, Smart Communities and Demand Response
5,0
1
Text
Security Issues and Privacy Concerns in Industry 4.0 Applications
0
0
PDF
Charles J. Brooks
Practical Industrial Cybersecurity. ICS, Industry 4.0, and IIoT
0
0
Text
Ira Winkler
Security Awareness For Dummies
0
0
Text
Abderrazak Mkadmi
Archives in the Digital Age. Preservation and the Right to be Forgotten
0
0
PDF
Wenbing Zhao
From Traditional Fault Tolerance to Blockchain
0
0
PDF
Dennis Kengo Oka
Building Secure Cars. Assuring the Automotive Software Development Lifecycle
1
2
3
4
5
...
10
...
20
...
30
...
40
...
50
...
69
Next
We use
cookies
to make your experience on our website faster and more convenient.
Read more
I agree