361. Privacy protection for e-services /[edited by] George Yee.
المؤلف:
المکتبة: مكتبة حرم كيش الدولي بجامعة طهران (هرمزکان)
موضوع: Electronic commerce--Security measures.,Computer security,Data protection,Privacy, Right of.
رده :
HF
5548
.
37
.
P753
2006


362. Proceedings of International Ethical Hacking Conference 2018 :
المؤلف: Mohuya Chakraborty, Satyajit Chakrabarti, Valentina Emilia Balas, J.K. Mandal, editors.
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Penetration testing (Computer security), Congresses.,Communications Engineering, Networks.,Data Structures, Cryptology and Information Theory.,Systems and Data Security.,Algorithms & data structures.,Communications engineering / telecommunications.,Computer security.,COMPUTERS / Security / General.,Penetration testing (Computer security)
رده :
QA76
.
9
.
A25


363. Proceedings of International Symposium on Sensor Networks, Systems and Security :
المؤلف: Nageswara S.V. Rao, Richard R. Brooks, Chase Q. Wu, editors.
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Sensor networks, Congresses.,Communications engineering / telecommunications.,Computer security.,COMPUTERS / General.,Imaging systems & technology.,Network hardware.,Sensor networks.
رده :
TK7872
.
D48


364. Proceedings of The Ifip Tc 11 23rd International Information Security Conference :
المؤلف: edited by Sushil Jajodia, Pierangela Samarati, Stelvio Cimato, Sushil Jajodia, Pierangela Samarati, Stelvio Cimato.
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer science.,Computers -- Law and legislation.,Data protection.

365. Proceedings of the sixth International Conference on Green and Human Information Technology :
المؤلف: Seong Oun Hwang, Syh Yuan Tan, Franklin Bien, editors.
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Information technology, Congresses.,Sustainable engineering, Congresses.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Information technology.,Sustainable engineering.
رده :
T58
.
5


366. Progress in cryptology - INDOCRYPT 2011 :
المؤلف: Daniel J. Bernstein, Sanjit Chatterjee (editions.)
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer security, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses
رده :
QA76
.
9
.
A25
I58
2011


367. Project e-society :
المؤلف: edited by Reima Suomi [and others]
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Electronic commerce, Congresses.,Information society, Congresses.

368. Protecting your library's digital sources
المؤلف: / Miriam B. Kahn
المکتبة: كتابخانه مركزي و مركز اسناد دانشگاه شهيد چمران (خوزستان)
موضوع: Libraries- Safety measures,Archives- Safety measures,Library information networks- Security measures,Electronic records- Conservation and restoration,Emergency management- Planning,Computer security,Data protection,Electronic data processing- Backup processing alternatives
رده :
Z679
.
7
.
K385
2004


369. Protecting your library's digital sources: the essential guide to planning and preservation
المؤلف: Kahn, Miriam B.
المکتبة: کتابخانه مرکزی و مرکز اطلاع رسانی دانشگاه فردوسی مشهد (خراسان رضوی)
موضوع: Safety measures ، Libraries,Safety measures ، Archives,Security measures ، Library information networks,Conservation and restoration ، Electronic records,Planning ، Emergency management,، Computer security,، Data protection,Backup processing alternatives ، Electronic data processing
رده :
Z
679
.
7
.
K385
2004


370. Protecting your library's digital sources: the essential guide to planning and preservation
المؤلف: Kahn, Miriam )Miriam B.(
المکتبة: المکتبه المرکزيه ومرکز التوثیق بجامعة الشهید باهنر فی کرمان (کرمان)
موضوع: Safety measures ، Libraries,Safety measures ، Archives,Security measures ، Library information networks,Conservation and restoration ، Electronic records,Planning ، Emergency management,، Computer security,، Data protection,Backup processing alternatives ، Electronic data processing
رده :
Z
679
.
7
.
K385
2004


371. Protecting your library's digital sources :the essential guide to planning and preservation
المؤلف: Kahn, Miriam )Miriam B.(,Miriam B. Kahn
المکتبة: كتابخانه و مركز اسناد دانشگاه كردستان (کردستان)
موضوع: Safety measures ، Libraries,Safety measures ، Archives,Security measures ، Library information networks,Conservation and restoration ، Electronic records,Planning ، Emergency management,، Computer security,، Data protection,Backup processing alternatives ، Electronic data processing
رده :
Z679
.
7
.
K385
2004


372. Public Key Cryptography ђ́أ PKC 2012
المؤلف: edited by Marc Fischlin, Johannes Buchmann, Mark Manulis
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computational complexity,Computer Communication Networks,Computer science,Computer software,Data encryption (Computer science),Data protection,Information Systems,Algorithm Analysis and Problem Complexity,Computer Communication Networks,Computer Science,Data Encryption,Discrete Mathematics in Computer Science,Management of Computing and Information Systems,Systems and Data Security

373. Quality of protection :
المؤلف: edited by Dieter Gollmann, Fabio Massacci, Artsiom Yautsiukhin.
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer networks-- Quality control, Congresses.,Computer networks-- Standards, Congresses.,Computer security-- Quality control, Congresses.,Computer security-- Standards, Congresses.,Computer networks-- Quality control.,Computer networks-- Quality control.,Computer networks-- Standards.,Computer networks-- Standards.,Computer security-- Quality control.,Computer security-- Standards.,Computer security-- Standards.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Informatique.
رده :
QA76
.
9
.
A25
Q35
2006eb


374. Recent trends in network security and applications :
المؤلف: Natarajan Meghanathan ... [et al.] (eds.).
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer science.,COMPUTERS -- Internet -- Security.,COMPUTERS -- Networking -- Security.

376. Responsive security
المؤلف: Meng-Chow Kang
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Business enterprises-- Computer networks-- Security measures,Data protection,Electronic data processing departments-- Security measures,Information technology-- Security measures,Risk management
رده :
HF30
.
38
.
K38
2014


377. Risk centric threat modeling :
المؤلف: Tony Uceda Vélez and Marco M. Morana
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer networks-- Security measures,Computer security,Data protection,Management information systems-- Security measures,Risk assessment
رده :
HF5548
.
37


378. Router security strategies
المؤلف:
المکتبة: المكتبة المركزية مركز التوثيق وتزويد المصادر العلمية (أذربایجان الشرقیة)
موضوع: Computer networks , Security measures,Routers (Computer networks) , Security measures,TCP/IP (Computer network protocol) , Security measures
رده :
E-BOOK

379. SAP security configuration and deployment :
المؤلف: Leslie Wun-Young, technical editor; Joey Hirao [and others].
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Business enterprises -- Computer networks -- Security measures.,Business information services -- Security measures.,SAP ERP.
رده :
HF5548
.
37
L475
2009

