LitRes
Search
Please enter three or more letters to search
Log in
6
Do you know that...
Joining LitRes, you care about the environment
Sign up
Log in
My books
My books
Cart
Lists
About us
About & Contacts
Genres
New releases
Popular
Audiobooks
Books to read
Coupon
All 345 genres
Books
Foreign literature
Foreign computer books
Foreign computer books
Subgenres
One level up
(Foreign literature)
Suggestions
New releases
Popular
E-books
E-books and audiobooks
E-books
2743
Audiobooks
37
in all languages
2743
in English
1748
in Albanian
1
in Bengal
1
in Bulgarian
2
in Burmese
1
in Chinese
1
in Dutch
1
in French
5
in German
48
in Greek
1
in Italian
6
in Malay
1
in Polish
2
in Portuguese
5
in Russian
894
in Spanish
22
in Telugu
1
in Turkish
2
in Ukrainian
1
Multimedia Security 2
William Puech
0
Intelligent Security Management and Control in the IoT
Mohamed-Aymen Chalouf
0
Diagnosis and Fault-tolerant Control 1
0
Conflicts, Crimes and Regulations in Cyberspace
0
Cyber Security and Network Security
0
Cybersecurity in Smart Homes
Rida Khatoun
0
Multi-Processor System-on-Chip 2
0
Cultural Commons in the Digital Ecosystem
Maud Pelissier
0
Security Issues and Privacy Concerns in Industry 4.0 Applications
0
Cybersecurity Risk Management
Cynthia Brumfield
0
Security Issues and Privacy Concerns in Industry 4.0 Applications
1
Cybersecurity and Local Government
Donald F. Norris
0
Cybersecurity Risk Management
Cynthia Brumfield
0
Inside the World of Computing
0
Intelligent Network Management and Control
Badr Benmammar
0
Cultural Commons in the Digital Ecosystem
Maud Pelissier
0
Multimedia Security, Volume 1
William Puech
0
Archives in the Digital Age
Abderrazak Mkadmi
0
Cyber Security and Digital Forensics
2
Cyber Security and Network Security
0
From Traditional Fault Tolerance to Blockchain
Wenbing Zhao
0
Diagnosis and Fault-tolerant Control 1
0
Multimedia Security, Volume 1
William Puech
0
Corporate Cybersecurity
John Jackson
0
Chance, Calculation and Life
0
Archives in the Digital Age
Abderrazak Mkadmi
0
Cryptography, Information Theory, and Error-Correction
Aiden A. Bruen
0
Multi-Processor System-on-Chip 2
0
From Traditional Fault Tolerance to Blockchain
Wenbing Zhao
0
Intelligent Network Management and Control
Badr Benmammar
0
Chance, Calculation and Life
0
Information Security
Mark Stamp
2
Diagnosis and Fault-tolerant Control Volume 2
0
Diagnosis and Fault-tolerant Control Volume 2
0
The Official (ISC)2 CCSP CBK Reference
Leslie Fife
0
Conflicts, Crimes and Regulations in Cyberspace
0
The Official (ISC)2 CCSP CBK Reference
Leslie Fife
0
Cryptography, Information Theory, and Error-Correction
Aiden A. Bruen
0
Hyperdocumentation
Olivier Le Deuff
0
Information Security
Mark Stamp
0
0
0
PDF
William Puech
Multimedia Security 2. Biometrics, Video Surveillance and Multimedia Encryption
0
0
Text
Mohamed-Aymen Chalouf
Intelligent Security Management and Control in the IoT
0
0
PDF
Diagnosis and Fault-tolerant Control 1. Data-driven and Model-based Fault Diagnosis Techniques
0
0
Text
Conflicts, Crimes and Regulations in Cyberspace
0
0
PDF
Cyber Security and Network Security
0
0
Text
Rida Khatoun
Cybersecurity in Smart Homes. Architectures, Solutions and Technologies
0
0
Text
Multi-Processor System-on-Chip 2. Applications
0
0
Text
Maud Pelissier
Cultural Commons in the Digital Ecosystem
0
0
PDF
Security Issues and Privacy Concerns in Industry 4.0 Applications
0
0
Text
Cynthia Brumfield
Cybersecurity Risk Management. Mastering the Fundamentals Using the NIST Cybersecurity Framework
5,0
1
Text
Security Issues and Privacy Concerns in Industry 4.0 Applications
0
0
PDF
Donald F. Norris
Cybersecurity and Local Government
0
0
PDF
Cynthia Brumfield
Cybersecurity Risk Management. Mastering the Fundamentals Using the NIST Cybersecurity Framework
0
0
PDF
Inside the World of Computing. Technologies, Uses, Challenges
0
0
Text
Badr Benmammar
Intelligent Network Management and Control. Intelligent Security, Multi-criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio
0
0
PDF
Maud Pelissier
Cultural Commons in the Digital Ecosystem
0
0
Text
William Puech
Multimedia Security, Volume 1. Authentication and Data Hiding
0
0
Text
Abderrazak Mkadmi
Archives in the Digital Age. Preservation and the Right to be Forgotten
3,0
2
PDF
Cyber Security and Digital Forensics. Challenges and Future Trends
0
0
Text
Cyber Security and Network Security
0
0
PDF
Wenbing Zhao
From Traditional Fault Tolerance to Blockchain
0
0
Text
Diagnosis and Fault-tolerant Control 1. Data-driven and Model-based Fault Diagnosis Techniques
0
0
PDF
William Puech
Multimedia Security, Volume 1. Authentication and Data Hiding
0
0
Text
John Jackson
Corporate Cybersecurity. Identifying Risks and the Bug Bounty Program
0
0
PDF
Chance, Calculation and Life
0
0
PDF
Abderrazak Mkadmi
Archives in the Digital Age. Preservation and the Right to be Forgotten
0
0
Text
Aiden A. Bruen
Cryptography, Information Theory, and Error-Correction. A Handbook for the 21st Century
0
0
PDF
Multi-Processor System-on-Chip 2. Applications
0
0
Text
Wenbing Zhao
From Traditional Fault Tolerance to Blockchain
0
0
PDF
Badr Benmammar
Intelligent Network Management and Control. Intelligent Security, Multi-criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio
0
0
Text
Chance, Calculation and Life
4,0
2
Text
Mark Stamp
Information Security. Principles and Practice
0
0
Text
Diagnosis and Fault-tolerant Control Volume 2. From Fault Diagnosis to Fault-tolerant Control
0
0
PDF
Diagnosis and Fault-tolerant Control Volume 2. From Fault Diagnosis to Fault-tolerant Control
0
0
Text
Leslie Fife
The Official (ISC)2 CCSP CBK Reference
0
0
PDF
Conflicts, Crimes and Regulations in Cyberspace
0
0
PDF
Leslie Fife
The Official (ISC)2 CCSP CBK Reference
0
0
PDF
Aiden A. Bruen
Cryptography, Information Theory, and Error-Correction. A Handbook for the 21st Century
0
0
PDF
Olivier Le Deuff
Hyperdocumentation
0
0
PDF
Mark Stamp
Information Security. Principles and Practice
1
2
3
4
5
...
10
...
20
...
30
...
40
...
50
...
69
Next
We use
cookies
to make your experience on our website faster and more convenient.
Read more
I agree