LitRes
Search
Please enter three or more letters to search
Log in
6
Do you know that...
Joining LitRes, you care about the environment
Sign up
Log in
My books
My books
Cart
Lists
About us
About & Contacts
Genres
New releases
Popular
Audiobooks
Books to read
Coupon
All 345 genres
Books
Foreign literature
Foreign computer books
Foreign computer books
Subgenres
One level up
(Foreign literature)
Suggestions
New releases
Popular
E-books and audio books
E-books and audiobooks
E-books
2745
Audiobooks
37
in all languages
2782
in English
1749
in Albanian
1
in Bengal
1
in Bulgarian
2
in Burmese
1
in Chinese
1
in Dutch
1
in French
5
in German
49
in Greek
1
in Italian
6
in Malay
1
in Polish
2
in Portuguese
5
in Russian
932
in Spanish
21
in Telugu
1
in Turkish
2
in Ukrainian
1
Cybersecurity in Smart Homes
Rida Khatoun
0
Intelligent Security Management and Control in the IoT
Mohamed-Aymen Chalouf
0
Cyber Security and Network Security
0
Multimedia Security 2
William Puech
0
Cybersecurity and Local Government
Donald F. Norris
0
Diagnosis and Fault-tolerant Control Volume 2
0
Multimedia Security, Volume 1
William Puech
0
Diagnosis and Fault-tolerant Control Volume 2
0
Conflicts, Crimes and Regulations in Cyberspace
0
Conflicts, Crimes and Regulations in Cyberspace
0
Diagnosis and Fault-tolerant Control 1
0
Cybersecurity Risk Management
Cynthia Brumfield
0
Cyber Security and Digital Forensics
2
Cyber Security and Network Security
0
Multimedia Security, Volume 1
William Puech
0
Cybersecurity Risk Management
Cynthia Brumfield
0
Cultural Commons in the Digital Ecosystem
Maud Pelissier
0
Cryptography, Information Theory, and Error-Correction
Aiden A. Bruen
0
Information Security
Mark Stamp
0
Hyperdocumentation
Olivier Le Deuff
0
Corporate Cybersecurity
John Jackson
0
Security Issues and Privacy Concerns in Industry 4.0 Applications
1
Information Security
Mark Stamp
2
From Traditional Fault Tolerance to Blockchain
Wenbing Zhao
0
Multi-Processor System-on-Chip 2
0
Diagnosis and Fault-tolerant Control 1
0
Chance, Calculation and Life
0
Cryptography, Information Theory, and Error-Correction
Aiden A. Bruen
0
Security Issues and Privacy Concerns in Industry 4.0 Applications
0
Archives in the Digital Age
Abderrazak Mkadmi
0
Corporate Cybersecurity
John Jackson
0
Archives in the Digital Age
Abderrazak Mkadmi
0
Inside the World of Computing
0
Cloud Technologies
Roger McHaney
0
IP Address Management
Michael Dooley
0
Intelligent Network Management and Control
Badr Benmammar
0
The Official (ISC)2 CCSP CBK Reference
Leslie Fife
0
Microgrid Technologies
0
Multi-Processor System-on-Chip 2
0
CompTIA A+ Complete Study Guide
Quentin Docter
0
0
0
Text
Rida Khatoun
Cybersecurity in Smart Homes. Architectures, Solutions and Technologies
0
0
Text
Mohamed-Aymen Chalouf
Intelligent Security Management and Control in the IoT
0
0
PDF
Cyber Security and Network Security
0
0
PDF
William Puech
Multimedia Security 2. Biometrics, Video Surveillance and Multimedia Encryption
0
0
PDF
Donald F. Norris
Cybersecurity and Local Government
0
0
Text
Diagnosis and Fault-tolerant Control Volume 2. From Fault Diagnosis to Fault-tolerant Control
0
0
PDF
William Puech
Multimedia Security, Volume 1. Authentication and Data Hiding
0
0
PDF
Diagnosis and Fault-tolerant Control Volume 2. From Fault Diagnosis to Fault-tolerant Control
0
0
Text
Conflicts, Crimes and Regulations in Cyberspace
0
0
PDF
Conflicts, Crimes and Regulations in Cyberspace
0
0
PDF
Diagnosis and Fault-tolerant Control 1. Data-driven and Model-based Fault Diagnosis Techniques
0
0
PDF
Cynthia Brumfield
Cybersecurity Risk Management. Mastering the Fundamentals Using the NIST Cybersecurity Framework
3,0
2
PDF
Cyber Security and Digital Forensics. Challenges and Future Trends
0
0
Text
Cyber Security and Network Security
0
0
Text
William Puech
Multimedia Security, Volume 1. Authentication and Data Hiding
0
0
Text
Cynthia Brumfield
Cybersecurity Risk Management. Mastering the Fundamentals Using the NIST Cybersecurity Framework
0
0
Text
Maud Pelissier
Cultural Commons in the Digital Ecosystem
0
0
PDF
Aiden A. Bruen
Cryptography, Information Theory, and Error-Correction. A Handbook for the 21st Century
0
0
PDF
Mark Stamp
Information Security. Principles and Practice
0
0
PDF
Olivier Le Deuff
Hyperdocumentation
0
0
PDF
John Jackson
Corporate Cybersecurity. Identifying Risks and the Bug Bounty Program
5,0
1
Text
Security Issues and Privacy Concerns in Industry 4.0 Applications
4,0
2
Text
Mark Stamp
Information Security. Principles and Practice
0
0
PDF
Wenbing Zhao
From Traditional Fault Tolerance to Blockchain
0
0
Text
Multi-Processor System-on-Chip 2. Applications
0
0
Text
Diagnosis and Fault-tolerant Control 1. Data-driven and Model-based Fault Diagnosis Techniques
0
0
Text
Chance, Calculation and Life
0
0
Text
Aiden A. Bruen
Cryptography, Information Theory, and Error-Correction. A Handbook for the 21st Century
0
0
PDF
Security Issues and Privacy Concerns in Industry 4.0 Applications
0
0
PDF
Abderrazak Mkadmi
Archives in the Digital Age. Preservation and the Right to be Forgotten
0
0
Text
John Jackson
Corporate Cybersecurity. Identifying Risks and the Bug Bounty Program
0
0
Text
Abderrazak Mkadmi
Archives in the Digital Age. Preservation and the Right to be Forgotten
0
0
PDF
Inside the World of Computing. Technologies, Uses, Challenges
0
0
PDF
Roger McHaney
Cloud Technologies. An Overview of Cloud Computing Technologies for Managers
0
0
PDF
Michael Dooley
IP Address Management
0
0
PDF
Badr Benmammar
Intelligent Network Management and Control. Intelligent Security, Multi-criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio
0
0
Text
Leslie Fife
The Official (ISC)2 CCSP CBK Reference
0
0
Text
Microgrid Technologies
0
0
PDF
Multi-Processor System-on-Chip 2. Applications
0
0
PDF
Quentin Docter
CompTIA A+ Complete Study Guide. Core 1 Exam 220-1101 and Core 2 Exam 220-1102
1
2
3
4
5
...
10
...
20
...
30
...
40
...
50
...
70
Next
We use
cookies
to make your experience on our website faster and more convenient.
Read more
I agree