Thomas Adewumi University
  • Advanced Search
  • Upload
  • Guest
  • Login
  • Register
  • Browse
  • Books
  • Shelves
  • Accounting and Finance (Public)
  • Anatomy (Public)
  • Biochemistry (Public)
  • Business Administration (Public)
  • Civil Engineering (Public)
  • Communication Engineering (Public)
  • Computer Engineering (Public)
  • Computer Science (Public)
  • Criminology and Security Studies (Public)
  • Cyber Security (Public)
  • Economics (Public)
  • Electrical Electronic (Public)
  • English and Literary Studies (Public)
  • Environmental Health (Public)
  • Law (Public)
  • Mass Communication (Public)
  • Mechanical Engineering (Public)
  • Medical Laboratory Science (Public)
  • Microbiology (Public)
  • Nursing Science (Public)
  • Physics with Electronics (Public)
  • Physiology (Public)
  • Physiotherapy (Public)
  • Public Health (Public)
  • Software Engineering (Public)

Discover (Random Books)

Evolutionary Methods Based Modeling and Analysis of Solar Thermal Systems

Evolutionary Methods Based Modeling and Analysis of Solar Thermal ...

Biplab Das & Jagadish

American English Pronunciation  - Rachel's English

American English Pronunciation - Rachel's English

Unknown

Fundamentals of Financial Accounting

Fundamentals of Financial Accounting

Fred Phillips & Robert Libby & Patricia Libby & Brandy Mackintosh

Health and Safety, Environment and Quality Audits

Health and Safety, Environment and Quality Audits

Stephen Asbury & Peter Ashwell

Books

Security Technologies and Methods for Advanced Cyber Threat Intelligence, Detection and Mitigation

Security Technologies and Methods for Advanced Cyber Threat ...

Gohar Sargsyan & Dimitrios Kavallieros & Nicholas Kolokotronis

authors_book

authors_book

Unknown

Mobile Ad-Hoc Networks

Mobile Ad-Hoc Networks

Xin Wang

Beginning Ethical Hacking with Kali Linux_ Computational Techniques for Resolving Security Issues

Beginning Ethical Hacking with Kali Linux_ Computational Techniques ...

Unknown

Big Data Security

Big Data Security

Unknown

Biometrics and Cryptography

Biometrics and Cryptography

Sudhakar Radhakrishnan & Carlos M. Travieso-Gonzalez

A9R1b3w44n_pzsfzd_4e0.tmp

A9R1b3w44n_pzsfzd[..]

MDPI

Biometric 2021

Biometric 2021

Unknown

Biometrics

Biometrics

Jucheng Yang

New Trends and Developments in Biometrics

New Trends and Developments in Biometrics

Jucheng Yang & Shan Juan Xie

Cloud Computing Technology

Cloud Computing Technology

Huawei Technologies Co., Ltd.

Developing Graphics Frameworks with Python and OpenGL

Developing Graphics Frameworks with Python and OpenGL

Lee Stemkoski & Michael Pascale

Cryptography and Its Applications in Information Security

Cryptography and Its Applications in Information Security

Safwan El Assad & René Lozi & William Puech

A9R7yhw2k_1jkxti_85o.tmp

A9R7yhw2k_1jkxti_[..]

MDPI

Cyber Security Politics

Cyber Security Politics

Myriam Dunn Cavelty & Andreas Wenger

Cyber Peace

Cyber Peace

Scott J. Shackelford & Frederick Douzet & Christopher Ankersen

Cyber_Security_and_Critical_Infrastructures 2022

Cyber_Security_an[..] 2022

MDPI

Cybersecurity

Cybersecurity

Thomas A. Johnson

CyberSecurity

CyberSecurity

GOJE ROOPA

Cyberspace and Cybersecurity

Cyberspace and Cybersecurity

George Kostopoulos

  • « Previous
  • 1
  • 2
  • …
  • 22
  • 23
  • 24
  • Book Details

    ...