LitRes
Otsi
Sisestage otsimiseks kolm või enam tähte
Logi sisse
6
Kas teadsite, et...
LitResiga liitudes näitate hoolivust keskkonna suhtes
Registreeru
Logi sisse
Minu raamatud
Kõik
Minu raamatud
Vaadatud
Salvestatud
Ostukorv
Loendid
Meist
Ettevõttest & Kontakt
Žanrid
Uued
Populaarsed
Audioraamatud
Soovitused
Sooduskood
Kõik 345 žanrit
Raamatud
Väliskirjandus
Arvutialane väliskirjandus
Arvutialane väliskirjandus
Alažanrid
Tase kõrgemal
(Väliskirjandus)
Välismaised detektiivilood
Majandusalane väliskirjandus
Välisklassika
Välis-ajakirjandus
Psühholoogia-alane väliskirjandus
Välisriigi luule
Kaasaegne väliskirjandus
Välis-ilukirjandus
Välismaine romantika
Välisriigi õppekirjanduse
Välismaine esoteeriline kirjandus
Välismaised lasteraamatud
Arvutialane väliskirjandus
Kultuuri- ja kunstialane väliskirjandus
Välisriigi käsiraamatud
Välis-näitekirjandus
Välismaine põnevik
Välismaine teatmekirjandus
Välismaine ulmekirjandus
Religiooni- ja esoteerikaalane väliskirjandus
Välismaine huumor
Religioosne väliskirjandus
Vana väliskirjandus
Programmid
Internet
информационная безопасность
Programmeerimine
Raamatud arvutitest
Operatsioonisüsteemid ja võrgud
Arvutiteatmikud
Andmebaasid
Välismaine põnevik
Arvutustehnika
Soovitused
Uued
Populaarsed
E-raamatud ja audioraamatud
E-raamatud ja audioraamatud
E-raamatud
2720
Audioraamatud
30
kõigis keeltes
2750
albaania keeles
1
bengal keeles
1
birma keeles
1
bulgaaria keeles
2
hiina keeles
1
hispaania keeles
22
hollandi keeles
1
inglise keeles
1751
itaalia keeles
6
kreeka keeles
1
malai keeles
1
poola keeles
2
portugali keeles
5
prantsuse keeles
5
saksa keeles
52
telugu keeles
1
türgi keeles
2
ukraina keeles
1
vene keeles
894
Cryptography, Information Theory, and Error-Correction
Aiden A. Bruen
0
Archives in the Digital Age
Abderrazak Mkadmi
0
Multimedia Security 2
William Puech
0
Cybersecurity in Smart Homes
Rida Khatoun
0
Conflicts, Crimes and Regulations in Cyberspace
0
Diagnosis and Fault-tolerant Control Volume 2
0
Corporate Cybersecurity
John Jackson
0
Intelligent Security Management and Control in the IoT
Mohamed-Aymen Chalouf
0
Hyperdocumentation
Olivier Le Deuff
0
Diagnosis and Fault-tolerant Control 1
0
Security, Privacy, and Digital Forensics in the Cloud
0
Network Modeling, Simulation and Analysis in MATLAB
Dac-Nhuong Le
0
Information Security
Mark Stamp
2
The Official (ISC)2 CCSP CBK Reference
Leslie Fife
0
Intelligent Network Management and Control
Badr Benmammar
0
Multimedia Security, Volume 1
William Puech
0
Information Security
Mark Stamp
0
Cyber Security and Network Security
0
Cultural Commons in the Digital Ecosystem
Maud Pelissier
0
Cybersecurity and Local Government
Donald F. Norris
0
Multi-Processor System-on-Chip 2
0
Security Issues and Privacy Concerns in Industry 4.0 Applications
0
Symbian OS Explained
Jo Stichbury
0
Cybersecurity and Decision Makers
Marie De Fréminville
0
IP Address Management
Michael Dooley
0
Cybersecurity Risk Management
Cynthia Brumfield
0
Cybersecurity Law
Jeff Kosseff
0
Cloud Technologies
Roger McHaney
0
Building Secure Cars
Dennis Kengo Oka
0
Corporate Cybersecurity
John Jackson
0
Security Management of Next Generation Telecommunications Networks and Services
Stuart Jacobs
0
Energy-Efficient Computing and Data Centers
Luigi Brochard
0
The Official (ISC)2 CCSP CBK Reference
Leslie Fife
0
Intelligent Network Management and Control
Badr Benmammar
0
From Traditional Fault Tolerance to Blockchain
Wenbing Zhao
0
Security Issues and Privacy Concerns in Industry 4.0 Applications
1
Archives in the Digital Age
Abderrazak Mkadmi
0
Chance, Calculation and Life
0
Cyber Security and Network Security
0
From Traditional Fault Tolerance to Blockchain
Wenbing Zhao
0
0
0
PDF
Aiden A. Bruen
Cryptography, Information Theory, and Error-Correction. A Handbook for the 21st Century
0
0
Tekst
Abderrazak Mkadmi
Archives in the Digital Age. Preservation and the Right to be Forgotten
0
0
PDF
William Puech
Multimedia Security 2. Biometrics, Video Surveillance and Multimedia Encryption
0
0
Tekst
Rida Khatoun
Cybersecurity in Smart Homes. Architectures, Solutions and Technologies
0
0
Tekst
Conflicts, Crimes and Regulations in Cyberspace
0
0
PDF
Diagnosis and Fault-tolerant Control Volume 2. From Fault Diagnosis to Fault-tolerant Control
0
0
PDF
John Jackson
Corporate Cybersecurity. Identifying Risks and the Bug Bounty Program
0
0
Tekst
Mohamed-Aymen Chalouf
Intelligent Security Management and Control in the IoT
0
0
PDF
Olivier Le Deuff
Hyperdocumentation
0
0
PDF
Diagnosis and Fault-tolerant Control 1. Data-driven and Model-based Fault Diagnosis Techniques
0
0
PDF
Security, Privacy, and Digital Forensics in the Cloud
0
0
PDF
Dac-Nhuong Le
Network Modeling, Simulation and Analysis in MATLAB. Theory and Practices
4,0
2
Tekst
Mark Stamp
Information Security. Principles and Practice
0
0
PDF
Leslie Fife
The Official (ISC)2 CCSP CBK Reference
0
0
Tekst
Badr Benmammar
Intelligent Network Management and Control. Intelligent Security, Multi-criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio
0
0
PDF
William Puech
Multimedia Security, Volume 1. Authentication and Data Hiding
0
0
PDF
Mark Stamp
Information Security. Principles and Practice
0
0
PDF
Cyber Security and Network Security
0
0
Tekst
Maud Pelissier
Cultural Commons in the Digital Ecosystem
0
0
PDF
Donald F. Norris
Cybersecurity and Local Government
0
0
Tekst
Multi-Processor System-on-Chip 2. Applications
0
0
PDF
Security Issues and Privacy Concerns in Industry 4.0 Applications
0
0
PDF
Jo Stichbury
Symbian OS Explained. Effective C++ Programming for Smartphones
0
0
PDF
Marie De Fréminville
Cybersecurity and Decision Makers. Data Security and Digital Trust
0
0
PDF
Michael Dooley
IP Address Management
0
0
PDF
Cynthia Brumfield
Cybersecurity Risk Management. Mastering the Fundamentals Using the NIST Cybersecurity Framework
0
0
PDF
Jeff Kosseff
Cybersecurity Law
0
0
PDF
Roger McHaney
Cloud Technologies. An Overview of Cloud Computing Technologies for Managers
0
0
PDF
Dennis Kengo Oka
Building Secure Cars. Assuring the Automotive Software Development Lifecycle
0
0
Tekst
John Jackson
Corporate Cybersecurity. Identifying Risks and the Bug Bounty Program
0
0
PDF
Stuart Jacobs
Security Management of Next Generation Telecommunications Networks and Services
0
0
PDF
Luigi Brochard
Energy-Efficient Computing and Data Centers
0
0
Tekst
Leslie Fife
The Official (ISC)2 CCSP CBK Reference
0
0
PDF
Badr Benmammar
Intelligent Network Management and Control. Intelligent Security, Multi-criteria Optimization, Cloud Computing, Internet of Vehicles, Intelligent Radio
0
0
PDF
Wenbing Zhao
From Traditional Fault Tolerance to Blockchain
5,0
1
Tekst
Security Issues and Privacy Concerns in Industry 4.0 Applications
0
0
PDF
Abderrazak Mkadmi
Archives in the Digital Age. Preservation and the Right to be Forgotten
0
0
Tekst
Chance, Calculation and Life
0
0
Tekst
Cyber Security and Network Security
0
0
Tekst
Wenbing Zhao
From Traditional Fault Tolerance to Blockchain
1
2
3
4
5
...
10
...
20
...
30
...
40
...
50
...
69
Järgmine
Kasutame
küpsiseid
, et võimaldada veebilehe kiirem ja mugavam kasutamine.
Lisateave
Sain aru