LitRes
Search
Please enter three or more letters to search
Log in
6
Do you know that...
Joining LitRes, you care about the environment
Sign up
Log in
My books
My books
Cart
Lists
About us
About & Contacts
Genres
New releases
Popular
Audiobooks
Books to read
Coupon
All 345 genres
Books
Foreign literature
Foreign computer books
Foreign computer books
Subgenres
One level up
(Foreign literature)
Foreign business books
Foreign classics
Modern foreign literature
Foreign journalism
Foreign detective fiction
Foreign educational literature
Books about computers
Foreign drama
Foreign fiction
Foreign adventure
Foreign psychology
Foreign humor
Foreign poetry
Foreign, culture and art
Foreign instructional books
Programs
Foreign computer books
Foreign fantasy
Foreign religious literature
Foreign romance
Internet
Programming
Foreign children's books
Computer tech
Old foreign literature
information security
Operating systems and networks
Foreign esoteric literature
Foreign religious and esoteric literature
Computer reference
Databases
Foreign reference books
Foreign action
Suggestions
New releases
Popular
E-books and audio books
E-books and audiobooks
E-books
2741
Audiobooks
36
in all languages
2777
in English
1749
in Albanian
1
in Bengal
1
in Bulgarian
2
in Burmese
1
in Chinese
1
in Dutch
1
in French
5
in German
50
in Greek
1
in Italian
6
in Malay
1
in Polish
2
in Portuguese
5
in Russian
925
in Spanish
22
in Telugu
1
in Turkish
2
in Ukrainian
1
Cybersecurity in Smart Homes
Rida Khatoun
0
Intelligent Security Management and Control in the IoT
Mohamed-Aymen Chalouf
0
Cyber Security and Network Security
0
Multimedia Security, Volume 1
William Puech
0
Multimedia Security 2
William Puech
0
Diagnosis and Fault-tolerant Control 1
0
Cyber Security and Network Security
0
Information Security
Mark Stamp
0
Corporate Cybersecurity
John Jackson
0
Multimedia Security, Volume 1
William Puech
0
Diagnosis and Fault-tolerant Control Volume 2
0
Cryptography, Information Theory, and Error-Correction
Aiden A. Bruen
0
Cyber Security and Digital Forensics
2
Diagnosis and Fault-tolerant Control 1
0
Conflicts, Crimes and Regulations in Cyberspace
0
Diagnosis and Fault-tolerant Control Volume 2
0
Chance, Calculation and Life
0
Information Security
Mark Stamp
2
Security Issues and Privacy Concerns in Industry 4.0 Applications
1
Cybersecurity Risk Management
Cynthia Brumfield
0
Conflicts, Crimes and Regulations in Cyberspace
0
Cybersecurity and Local Government
Donald F. Norris
0
Cultural Commons in the Digital Ecosystem
Maud Pelissier
0
Intelligent Network Management and Control
Badr Benmammar
0
Cryptography, Information Theory, and Error-Correction
Aiden A. Bruen
0
Cultural Commons in the Digital Ecosystem
Maud Pelissier
0
Archives in the Digital Age
Abderrazak Mkadmi
0
Microgrid Technologies
0
Cybersecurity Risk Management
Cynthia Brumfield
0
Archives in the Digital Age
Abderrazak Mkadmi
0
Hyperdocumentation
Olivier Le Deuff
0
Corporate Cybersecurity
John Jackson
0
Building Secure Cars
Dennis Kengo Oka
0
From Traditional Fault Tolerance to Blockchain
Wenbing Zhao
0
Security Issues and Privacy Concerns in Industry 4.0 Applications
0
Multi-Processor System-on-Chip 2
0
The Official (ISC)2 CCSP CBK Reference
Leslie Fife
0
Multi-Processor System-on-Chip 2
0
Intelligent Network Management and Control
Badr Benmammar
0
Inside the World of Computing
0
0
0
Text
Rida Khatoun
Cybersecurity in Smart Homes. Architectures, Solutions and Technologies
0
0
Text
Mohamed-Aymen Chalouf
Intelligent Security Management and Control in the IoT
0
0
PDF
Cyber Security and Network Security
0
0
PDF
William Puech
Multimedia Security, Volume 1. Authentication and Data Hiding
0
0
PDF
William Puech
Multimedia Security 2. Biometrics, Video Surveillance and Multimedia Encryption
0
0
PDF
Diagnosis and Fault-tolerant Control 1. Data-driven and Model-based Fault Diagnosis Techniques
0
0
Text
Cyber Security and Network Security
0
0
PDF
Mark Stamp
Information Security. Principles and Practice
0
0
Text
John Jackson
Corporate Cybersecurity. Identifying Risks and the Bug Bounty Program
0
0
Text
William Puech
Multimedia Security, Volume 1. Authentication and Data Hiding
0
0
PDF
Diagnosis and Fault-tolerant Control Volume 2. From Fault Diagnosis to Fault-tolerant Control
0
0
PDF
Aiden A. Bruen
Cryptography, Information Theory, and Error-Correction. A Handbook for the 21st Century
3,0
2
PDF
Cyber Security and Digital Forensics. Challenges and Future Trends
0
0
Text
Diagnosis and Fault-tolerant Control 1. Data-driven and Model-based Fault Diagnosis Techniques
0
0
Text
Conflicts, Crimes and Regulations in Cyberspace
0
0
Text
Diagnosis and Fault-tolerant Control Volume 2. From Fault Diagnosis to Fault-tolerant Control
0
0
Text
Chance, Calculation and Life
4,0
2
Text
Mark Stamp
Information Security. Principles and Practice
5,0
1
Text
Security Issues and Privacy Concerns in Industry 4.0 Applications
0
0
PDF
Cynthia Brumfield
Cybersecurity Risk Management. Mastering the Fundamentals Using the NIST Cybersecurity Framework
0
0
PDF
Conflicts, Crimes and Regulations in Cyberspace
0
0
PDF
Donald F. Norris
Cybersecurity and Local Government
0
0
PDF
Maud Pelissier
Cultural Commons in the Digital Ecosystem
0
0
Text
Badr Benmammar
Intelligent Network Management and Control. Intelligent Security, Multi-criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio
0
0
Text
Aiden A. Bruen
Cryptography, Information Theory, and Error-Correction. A Handbook for the 21st Century
0
0
Text
Maud Pelissier
Cultural Commons in the Digital Ecosystem
0
0
Text
Abderrazak Mkadmi
Archives in the Digital Age. Preservation and the Right to be Forgotten
0
0
Text
Microgrid Technologies
0
0
Text
Cynthia Brumfield
Cybersecurity Risk Management. Mastering the Fundamentals Using the NIST Cybersecurity Framework
0
0
PDF
Abderrazak Mkadmi
Archives in the Digital Age. Preservation and the Right to be Forgotten
0
0
PDF
Olivier Le Deuff
Hyperdocumentation
0
0
PDF
John Jackson
Corporate Cybersecurity. Identifying Risks and the Bug Bounty Program
0
0
PDF
Dennis Kengo Oka
Building Secure Cars. Assuring the Automotive Software Development Lifecycle
0
0
Text
Wenbing Zhao
From Traditional Fault Tolerance to Blockchain
0
0
PDF
Security Issues and Privacy Concerns in Industry 4.0 Applications
0
0
PDF
Multi-Processor System-on-Chip 2. Applications
0
0
Text
Leslie Fife
The Official (ISC)2 CCSP CBK Reference
0
0
Text
Multi-Processor System-on-Chip 2. Applications
0
0
PDF
Badr Benmammar
Intelligent Network Management and Control. Intelligent Security, Multi-criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio
0
0
PDF
Inside the World of Computing. Technologies, Uses, Challenges
1
2
3
4
5
...
10
...
20
...
30
...
40
...
50
...
70
Next
We use
cookies
to make your experience on our website faster and more convenient.
Read more
I agree