LitRes
Search
Please enter three or more letters to search
Log in
6
Do you know that...
Joining LitRes, you care about the environment
Sign up
Log in
My books
My books
Cart
Lists
About us
About & Contacts
Genres
New releases
Popular
Audiobooks
Books to read
Coupon
All 345 genres
Books
Foreign literature
Foreign computer books
Foreign computer books
Subgenres
One level up
(Foreign literature)
Foreign business books
Foreign classics
Modern foreign literature
Foreign journalism
Foreign detective fiction
Foreign educational literature
Books about computers
Foreign drama
Foreign fiction
Foreign adventure
Foreign psychology
Foreign humor
Foreign poetry
Foreign, culture and art
Foreign instructional books
Programs
Foreign computer books
Foreign fantasy
Foreign religious literature
Foreign romance
Internet
Programming
Foreign children's books
Computer tech
Old foreign literature
information security
Operating systems and networks
Foreign esoteric literature
Foreign religious and esoteric literature
Computer reference
Databases
Foreign reference books
Foreign action
Suggestions
New releases
Popular
E-books and audio books
E-books and audiobooks
E-books
2741
Audiobooks
36
in all languages
2777
in English
1749
in Albanian
1
in Bengal
1
in Bulgarian
2
in Burmese
1
in Chinese
1
in Dutch
1
in French
5
in German
50
in Greek
1
in Italian
6
in Malay
1
in Polish
2
in Portuguese
5
in Russian
925
in Spanish
22
in Telugu
1
in Turkish
2
in Ukrainian
1
Cybersecurity in Smart Homes
Rida Khatoun
0
Intelligent Security Management and Control in the IoT
Mohamed-Aymen Chalouf
0
Cyber Security and Network Security
0
Multimedia Security 2
William Puech
0
Multimedia Security, Volume 1
William Puech
0
Diagnosis and Fault-tolerant Control 1
0
Cryptography, Information Theory, and Error-Correction
Aiden A. Bruen
0
Information Security
Mark Stamp
0
Cyber Security and Network Security
0
Multimedia Security, Volume 1
William Puech
0
Cyber Security and Digital Forensics
2
Corporate Cybersecurity
John Jackson
0
Diagnosis and Fault-tolerant Control 1
0
Diagnosis and Fault-tolerant Control Volume 2
0
Cybersecurity and Local Government
Donald F. Norris
0
Information Security
Mark Stamp
2
Cybersecurity Risk Management
Cynthia Brumfield
0
Security Issues and Privacy Concerns in Industry 4.0 Applications
1
Conflicts, Crimes and Regulations in Cyberspace
0
Diagnosis and Fault-tolerant Control Volume 2
0
Conflicts, Crimes and Regulations in Cyberspace
0
Cybersecurity Risk Management
Cynthia Brumfield
0
Cultural Commons in the Digital Ecosystem
Maud Pelissier
0
Cultural Commons in the Digital Ecosystem
Maud Pelissier
0
Archives in the Digital Age
Abderrazak Mkadmi
0
Chance, Calculation and Life
0
Cryptography, Information Theory, and Error-Correction
Aiden A. Bruen
0
Hyperdocumentation
Olivier Le Deuff
0
Archives in the Digital Age
Abderrazak Mkadmi
0
Security Issues and Privacy Concerns in Industry 4.0 Applications
0
Intelligent Network Management and Control
Badr Benmammar
0
Corporate Cybersecurity
John Jackson
0
The Official (ISC)2 CCSP CBK Reference
Leslie Fife
0
Microgrid Technologies
0
Multi-Processor System-on-Chip 2
0
From Traditional Fault Tolerance to Blockchain
Wenbing Zhao
0
Building Secure Cars
Dennis Kengo Oka
0
Intelligent Network Management and Control
Badr Benmammar
0
Multi-Processor System-on-Chip 2
0
Inside the World of Computing
0
0
0
Text
Rida Khatoun
Cybersecurity in Smart Homes. Architectures, Solutions and Technologies
0
0
Text
Mohamed-Aymen Chalouf
Intelligent Security Management and Control in the IoT
0
0
PDF
Cyber Security and Network Security
0
0
PDF
William Puech
Multimedia Security 2. Biometrics, Video Surveillance and Multimedia Encryption
0
0
PDF
William Puech
Multimedia Security, Volume 1. Authentication and Data Hiding
0
0
PDF
Diagnosis and Fault-tolerant Control 1. Data-driven and Model-based Fault Diagnosis Techniques
0
0
PDF
Aiden A. Bruen
Cryptography, Information Theory, and Error-Correction. A Handbook for the 21st Century
0
0
PDF
Mark Stamp
Information Security. Principles and Practice
0
0
Text
Cyber Security and Network Security
0
0
Text
William Puech
Multimedia Security, Volume 1. Authentication and Data Hiding
3,0
2
PDF
Cyber Security and Digital Forensics. Challenges and Future Trends
0
0
Text
John Jackson
Corporate Cybersecurity. Identifying Risks and the Bug Bounty Program
0
0
Text
Diagnosis and Fault-tolerant Control 1. Data-driven and Model-based Fault Diagnosis Techniques
0
0
PDF
Diagnosis and Fault-tolerant Control Volume 2. From Fault Diagnosis to Fault-tolerant Control
0
0
PDF
Donald F. Norris
Cybersecurity and Local Government
4,0
2
Text
Mark Stamp
Information Security. Principles and Practice
0
0
PDF
Cynthia Brumfield
Cybersecurity Risk Management. Mastering the Fundamentals Using the NIST Cybersecurity Framework
5,0
1
Text
Security Issues and Privacy Concerns in Industry 4.0 Applications
0
0
Text
Conflicts, Crimes and Regulations in Cyberspace
0
0
Text
Diagnosis and Fault-tolerant Control Volume 2. From Fault Diagnosis to Fault-tolerant Control
0
0
PDF
Conflicts, Crimes and Regulations in Cyberspace
0
0
Text
Cynthia Brumfield
Cybersecurity Risk Management. Mastering the Fundamentals Using the NIST Cybersecurity Framework
0
0
PDF
Maud Pelissier
Cultural Commons in the Digital Ecosystem
0
0
Text
Maud Pelissier
Cultural Commons in the Digital Ecosystem
0
0
PDF
Abderrazak Mkadmi
Archives in the Digital Age. Preservation and the Right to be Forgotten
0
0
Text
Chance, Calculation and Life
0
0
Text
Aiden A. Bruen
Cryptography, Information Theory, and Error-Correction. A Handbook for the 21st Century
0
0
PDF
Olivier Le Deuff
Hyperdocumentation
0
0
Text
Abderrazak Mkadmi
Archives in the Digital Age. Preservation and the Right to be Forgotten
0
0
PDF
Security Issues and Privacy Concerns in Industry 4.0 Applications
0
0
Text
Badr Benmammar
Intelligent Network Management and Control. Intelligent Security, Multi-criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio
0
0
PDF
John Jackson
Corporate Cybersecurity. Identifying Risks and the Bug Bounty Program
0
0
Text
Leslie Fife
The Official (ISC)2 CCSP CBK Reference
0
0
Text
Microgrid Technologies
0
0
Text
Multi-Processor System-on-Chip 2. Applications
0
0
Text
Wenbing Zhao
From Traditional Fault Tolerance to Blockchain
0
0
PDF
Dennis Kengo Oka
Building Secure Cars. Assuring the Automotive Software Development Lifecycle
0
0
PDF
Badr Benmammar
Intelligent Network Management and Control. Intelligent Security, Multi-criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio
0
0
PDF
Multi-Processor System-on-Chip 2. Applications
0
0
PDF
Inside the World of Computing. Technologies, Uses, Challenges
1
2
3
4
5
...
10
...
20
...
30
...
40
...
50
...
70
Next
We use
cookies
to make your experience on our website faster and more convenient.
Read more
I agree