41. How do rogue nations threaten human rights? -- North Korea represses freedom / Kay Seok -- Iran violates women's rights / Sam Brownback -- Sudanese government engages in genocide / Human Rights Watch -- United States violates human rights worldwide / Vernon Coleman -- Rogue nations undermine the United Nations' mission to promote human rights / Joseph Loconte -- U.S. invasions have not spread democracy in the Middle East / Phyllis Bennis -- How should the global community respond to rogue nations? -- Preemptive force is sometimes necessary to contain rogue nations / National Review -- Preemptive force threatens efforts to contain rogue states / Ivan Eland -- Missile defense system is necessary to protect against rogue nations / Dennis Ross -- Missile defense system is unnecessary / Gwynne Dyer -- Promoting globalization will reduce the threat posed by rogue states / Banning N. Garrett, Dennis M. Sherman -- Globalization
المؤلف: Louise Gerdes, book editor.
المکتبة: كتابخانه مجلس شوراي اسلامى (طهران)
موضوع:

42. ICT and critical infrastructure :proceedings of the 48th Annual Convention of Computer Society of India
المؤلف: Suresh Chandra Satapathy, P. S. Avadhani, Siba K. Udgata, Sadasivuni Lakshminarayana, editors ; Hosted by CSI Vishakapatnam Chapter
المکتبة: كتابخانه و مركز اسناد دانشگاه كردستان (کردستان)
موضوع: Congresses ، Computer science,Congresses ، Information technology,Congresses ، Computer networks,Congresses ، Computer security,Congresses ، Computer networks - Security measures,، Engineering,، Computational Intelligence,، Artificial Intelligence )incl. Robotics(
رده :
QA75
.
5


43. 20090601 ,Includes bibliographical references and index. 0
المؤلف: 20090602 ,20090602 0
المکتبة: كتابخانه مجلس شوراي اسلامى (طهران)
موضوع:

44. Includes bibliographical references (p. 375) and index. 0
المؤلف: Brian M. Fagan.
المکتبة: كتابخانه مجلس شوراي اسلامى (طهران)
موضوع:

45. Includes bibliographical references (p. 225-231) and index. 0
المؤلف: Andrew Green.
المکتبة: كتابخانه مجلس شوراي اسلامى (طهران)
موضوع:

46. Introducing TPCK / Matthew J. Koehler and Punya Mishra -- Bridging digital and cultural divides: TPCK for equity of access to technology / Mario Antonio Kelly -- TPCK in K-6 literacy education: it's not that elemen
المؤلف: edited by AACTE Committee on Innovation and Technology.
المکتبة: كتابخانه مجلس شوراي اسلامى (طهران)
موضوع:

47. JZ6045,<The> hidden face of Eve :
المؤلف: by Lars Kirchhoff. ,William E. Landis, Robin L. Chandler, editors.
المکتبة: كتابخانه مجلس شوراي اسلامى (طهران)
موضوع:

48. Make a shield from wisdom :
المؤلف: 20090507 0
المکتبة: كتابخانه مجلس شوراي اسلامى (طهران)
موضوع:

49. Mastering Malware Analysis :
المؤلف:
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Microsoft Windows (Computer file)-- Security measures.,Microsoft Windows (Computer file),Computer security.,Cyberterrorism-- Security measures.,Malware (Computer software),Computer security.,Malware (Computer software),Security systems.
رده :
QA76
.
76
.
C68


53. Security, privacy and trust in the IoT environment /
المؤلف: editor, Zaigham Mahmood.
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer security.,Internet of things-- Security measures.,Computer security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Online Safety & Privacy.
رده :
QA76
.
9
.
A25


54. Virtualization security
المؤلف: Dave Shackleford
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Application software,Computer security,Virtual computer systems-- Security measures
رده :
QA76
.
9
.
V5
S53
2013


55. 0203931254 (ebook)
المؤلف: edited by Nancy Snow, Philip M. Taylor.
المکتبة: كتابخانه مجلس شوراي اسلامى (طهران)
موضوع:

56. xiv, 237 p. :
المؤلف: Chris Johnson & Jolyon Leslie.
المکتبة: كتابخانه مجلس شوراي اسلامى (طهران)
موضوع:

57. xviii, 5,Intern
المؤلف: Carl F. Goodman. ,Jung Wook Cho.
المکتبة: كتابخانه مجلس شوراي اسلامى (طهران)
موضوع:
