LitRes
Search
Please enter three or more letters to search
Log in
6
Do you know that...
Joining LitRes, you care about the environment
Sign up
Log in
My books
My books
Cart
Lists
About us
About & Contacts
Genres
New releases
Popular
Audiobooks
Books to read
Coupon
All 345 genres
Books
Foreign literature
Foreign computer books
Foreign computer books
Subgenres
One level up
(Foreign literature)
Suggestions
New releases
Popular
E-books and audio books
E-books and audiobooks
E-books
2745
Audiobooks
37
in all languages
2782
in English
1749
in Albanian
1
in Bengal
1
in Bulgarian
2
in Burmese
1
in Chinese
1
in Dutch
1
in French
5
in German
49
in Greek
1
in Italian
6
in Malay
1
in Polish
2
in Portuguese
5
in Russian
932
in Spanish
21
in Telugu
1
in Turkish
2
in Ukrainian
1
Intelligent Security Management and Control in the IoT
Mohamed-Aymen Chalouf
0
Cybersecurity in Smart Homes
Rida Khatoun
0
Multimedia Security 2
William Puech
0
Cyber Security and Network Security
0
Diagnosis and Fault-tolerant Control Volume 2
0
Multimedia Security, Volume 1
William Puech
0
Cybersecurity and Local Government
Donald F. Norris
0
Conflicts, Crimes and Regulations in Cyberspace
0
Conflicts, Crimes and Regulations in Cyberspace
0
Cyber Security and Digital Forensics
2
Cultural Commons in the Digital Ecosystem
Maud Pelissier
0
Diagnosis and Fault-tolerant Control 1
0
Cyber Security and Network Security
0
Diagnosis and Fault-tolerant Control Volume 2
0
Multimedia Security, Volume 1
William Puech
0
Corporate Cybersecurity
John Jackson
0
Hyperdocumentation
Olivier Le Deuff
0
Cybersecurity Risk Management
Cynthia Brumfield
0
Cryptography, Information Theory, and Error-Correction
Aiden A. Bruen
0
Security Issues and Privacy Concerns in Industry 4.0 Applications
1
From Traditional Fault Tolerance to Blockchain
Wenbing Zhao
0
Diagnosis and Fault-tolerant Control 1
0
Information Security
Mark Stamp
0
Cybersecurity Risk Management
Cynthia Brumfield
0
Security Issues and Privacy Concerns in Industry 4.0 Applications
0
Information Security
Mark Stamp
2
Cryptography, Information Theory, and Error-Correction
Aiden A. Bruen
0
Chance, Calculation and Life
0
Multi-Processor System-on-Chip 2
0
Corporate Cybersecurity
John Jackson
0
Archives in the Digital Age
Abderrazak Mkadmi
0
Multi-Processor System-on-Chip 2
0
Archives in the Digital Age
Abderrazak Mkadmi
0
Microgrid Technologies
0
Inside the World of Computing
0
Intelligent Network Management and Control
Badr Benmammar
0
Cloud Technologies
Roger McHaney
0
IP Address Management
Michael Dooley
0
The Official (ISC)2 CCSP CBK Reference
Leslie Fife
0
Chance, Calculation and Life
0
0
0
Text
Mohamed-Aymen Chalouf
Intelligent Security Management and Control in the IoT
0
0
Text
Rida Khatoun
Cybersecurity in Smart Homes. Architectures, Solutions and Technologies
0
0
PDF
William Puech
Multimedia Security 2. Biometrics, Video Surveillance and Multimedia Encryption
0
0
PDF
Cyber Security and Network Security
0
0
Text
Diagnosis and Fault-tolerant Control Volume 2. From Fault Diagnosis to Fault-tolerant Control
0
0
PDF
William Puech
Multimedia Security, Volume 1. Authentication and Data Hiding
0
0
PDF
Donald F. Norris
Cybersecurity and Local Government
0
0
PDF
Conflicts, Crimes and Regulations in Cyberspace
0
0
Text
Conflicts, Crimes and Regulations in Cyberspace
3,0
2
PDF
Cyber Security and Digital Forensics. Challenges and Future Trends
0
0
Text
Maud Pelissier
Cultural Commons in the Digital Ecosystem
0
0
PDF
Diagnosis and Fault-tolerant Control 1. Data-driven and Model-based Fault Diagnosis Techniques
0
0
Text
Cyber Security and Network Security
0
0
PDF
Diagnosis and Fault-tolerant Control Volume 2. From Fault Diagnosis to Fault-tolerant Control
0
0
Text
William Puech
Multimedia Security, Volume 1. Authentication and Data Hiding
0
0
PDF
John Jackson
Corporate Cybersecurity. Identifying Risks and the Bug Bounty Program
0
0
PDF
Olivier Le Deuff
Hyperdocumentation
0
0
PDF
Cynthia Brumfield
Cybersecurity Risk Management. Mastering the Fundamentals Using the NIST Cybersecurity Framework
0
0
PDF
Aiden A. Bruen
Cryptography, Information Theory, and Error-Correction. A Handbook for the 21st Century
5,0
1
Text
Security Issues and Privacy Concerns in Industry 4.0 Applications
0
0
PDF
Wenbing Zhao
From Traditional Fault Tolerance to Blockchain
0
0
Text
Diagnosis and Fault-tolerant Control 1. Data-driven and Model-based Fault Diagnosis Techniques
0
0
PDF
Mark Stamp
Information Security. Principles and Practice
0
0
Text
Cynthia Brumfield
Cybersecurity Risk Management. Mastering the Fundamentals Using the NIST Cybersecurity Framework
0
0
PDF
Security Issues and Privacy Concerns in Industry 4.0 Applications
4,0
2
Text
Mark Stamp
Information Security. Principles and Practice
0
0
Text
Aiden A. Bruen
Cryptography, Information Theory, and Error-Correction. A Handbook for the 21st Century
0
0
Text
Chance, Calculation and Life
0
0
Text
Multi-Processor System-on-Chip 2. Applications
0
0
Text
John Jackson
Corporate Cybersecurity. Identifying Risks and the Bug Bounty Program
0
0
PDF
Abderrazak Mkadmi
Archives in the Digital Age. Preservation and the Right to be Forgotten
0
0
PDF
Multi-Processor System-on-Chip 2. Applications
0
0
Text
Abderrazak Mkadmi
Archives in the Digital Age. Preservation and the Right to be Forgotten
0
0
Text
Microgrid Technologies
0
0
PDF
Inside the World of Computing. Technologies, Uses, Challenges
0
0
PDF
Badr Benmammar
Intelligent Network Management and Control. Intelligent Security, Multi-criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio
0
0
PDF
Roger McHaney
Cloud Technologies. An Overview of Cloud Computing Technologies for Managers
0
0
PDF
Michael Dooley
IP Address Management
0
0
PDF
Leslie Fife
The Official (ISC)2 CCSP CBK Reference
0
0
PDF
Chance, Calculation and Life
1
2
3
4
5
...
10
...
20
...
30
...
40
...
50
...
70
Next
We use
cookies
to make your experience on our website faster and more convenient.
Read more
I agree