381. Scientific support for the decision making in the security sector /
المؤلف: [edited by] Ognyan Kounchev ... [et al.]
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Decision support systems, Congresses,Emergency management-- Data processing, Congresses,Military planning-- Decision making, Congresses,Multisensor data fusion, Congresses,National security-- Decision making, Congresses,National security-- Environmental aspects, Congresses
رده :
UA10
.
5
.
N38
2007


382. Scrappy business contingency planning :
المؤلف: by Michael Seese.
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Business planning, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Crisis management, Handbooks, manuals, etc.,Data protection, Handbooks, manuals, etc.,Data recovery (Computer science), Handbooks, manuals, etc.,Emergency management, Handbooks, manuals, etc.

383. Secure data management : VLDB 2004 workshop, SDM 2004, Toronto, Canada, August 30, 2004 : proceedings
المؤلف: Willem Jonker, Milan Petkovic )eds.(
المکتبة: (طهران)
موضوع: Congresses ، Database security,Congresses ، Data encryption )Computer science(,Congresses ، Data protection,Congresses ، Computers -- Access control,Congresses ، Database management
رده :
QA
76
.
L28
Vol
.
3178


384. Secure data management in decentralized systems /
المؤلف: edited by Ting Yu, Sushil Jajodia
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer networks-- Security measures,Computer security,Database security
رده :
TK5105
.
59
.
S432
2007


385. Secure data management : second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005 : proceedings
المؤلف: Willem Jonker, Milan Petkovic )eds.(
المکتبة: (طهران)
موضوع: Congresses ، Database security,Congresses ، Data encryption )Computer science(,Congresses ، Data protection,Congresses ، Computers -- Access control,Congresses ، Database management
رده :
QA
76
.
L28
Vol
.
3674


386. Securing Office 365 :
المؤلف: Matthew Katzer.
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Microsoft Office.,Microsoft Office.,Business-- Computer programs.,Computer security.,Business-- Computer programs.,Computer security.,COMPUTERS-- Security-- General.
رده :
HF5548
.
4
.
M525


387. Securing SQL Server :
المؤلف: Peter A. Carter
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: SQL server,Database security,Computer Science,Database Management,Systems and Data Security
رده :
QA76
.
9
.
D314


388. Securing digital video
المؤلف: / Eric Diehl
المکتبة: المكتبة المركزية مركز التوثيق وتزويد المصادر العلمية (أذربایجان الشرقیة)
موضوع: Digital video--Security measures,Digital rights management.,Data protection.,Data encryption (Computer science)
رده :
TK6680
.
5
.
D54
2012


389. Securing digital video
المؤلف: Eric Diehl
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Data encryption (Computer science),Data protection,Digital rights management,Digital video-- Security measures
رده :
TK6680
.
5
.
D54
2012eb


390. Security, Privacy, and Anonymity in Computation, Communication, and Storage :
المؤلف: edited by Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu.
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Artificial intelligence.,Computer network architectures.,Computer science.,Data protection.,Information systems.,Artificial intelligence.,Computer network architectures.,Computer science.,Data protection.
رده :
QA76
.
9
.
A25


391. Security and Persistence :
المؤلف: edited by John Rosenberg, J. Leslie Keedy.
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer science.,Software engineering.

392. Security and Trust Management
المؤلف: edited by Catherine Meadows, Carmen Fernandez-Gago
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer Communication Networks,Computer science,Data encryption (Computer science),Data protection,Information Systems,Computer Communication Networks,Computer Science,Computers and Society,Data Encryption,Information Systems Applications (incl. Internet),Management of Computing and Information Systems,Systems and Data Security

393. Security and privacy in digital rights management : ACM CCS-8 Workshop DRM 2001, Philadelphia, PA, USA, November 5, 2001 : revised papers
المؤلف: Tomas Sander )ed.(
المکتبة: (طهران)
موضوع: Congresses ، Computer security,Congresses ، Privacy, Right of,Congresses ، Data protection
رده :
QA
76
.
L28
Vol
.
2320


394. Security and privacy in dynamic environments :
المؤلف: edited by Simone Fischer-Hübner ...
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer networks -- Access control -- Congresses.,Computer security -- Congresses.,Data protection -- Congresses.

395. Security and privacy in mobile information and communication systems :
المؤلف: Andreas U. Schmidt [and others] (eds.).
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Data protection -- Congresses.,Data protection.,Mobile communication systems -- Security measures -- Congresses.

396. Security and privacy of electronic healthcare records
المؤلف: edited by Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer security.,Data protection.,Distributed databases.,Medical records-- Data processing.,Forms and Records Control-- methods.,Medical Records Systems, Computerized.,Computer security,data protection,Data protection,distributed databases,Distributed databases,electronic health records,Internet of Things,security of data
رده :
R864


397. Security aspects in information technology :
المؤلف: Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall (editions.)
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer networks-- Security measures, Congresses,Computer security, Congresses,Information technology-- Security measures, Congresses
رده :
QA76
.
9
.
A25
I58
2011


398. Security planning and disaster recovery
المؤلف:
المکتبة: كتابخانه مركزي و مركز اسناد دانشگاه مازندران (مازندران)
موضوع: Computer security ; Management ; Data protection ; Emergency management ;

399. Security planning & disaster recovery
المؤلف: / Eric Maiwald, William Sieglein
المکتبة: کتابخانه مرکزی و مرکز اطلاع رسانی دانشگاه محقق اردبیلی ره (أردبیل)
موضوع: Computer security- Management,Data protection,Emergency management
رده :
QA76
.
9
.
A25
,
M315
2002


400. Security planning & disaster recovery
المؤلف: Maiwald, Eric
المکتبة: کتابخانه مرکزی و مرکز اطلاع رسانی دانشگاه فردوسی مشهد (خراسان رضوی)
موضوع: Management ، Computer security,، Data protection,، Emergency management
رده :
QA
76
.
9
.
A25
M315
2002

