61. Information hiding : third International Workshop, IH'99, Dresden, Germany, September 29-October 1, 1999 : proceedings
المؤلف: Andreas Pfitzmann )ed.(
المکتبة: (طهران)
موضوع: Congresses ، Computer security,Congresses ، Data protection
رده :
QA
76
.
L28
Vol
.
1768
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
62. Information security and privacy
المؤلف: Willy Susilo, Yi Mu, Jennifer Seberry (eds.)
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
رده :
QA76
.
9
.
A25
A279
2012eb
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
63. Information security and privacy
المؤلف: / Josef Pieprzyk, Hossein Ghodosi, Ed. Dawson (Eds.)
المکتبة: كتابخانه مركزي و مركز اسناد دانشگاه تهران (طهران)
موضوع: Computers -- Access control -- Congresses,Computer security -- Congresses,Data protection -- Congresses,Privacy, Right of -- Congresses
رده :
QA
76
.
9
.
A251
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
64. Information security and privacy : First Australasian Conference, ACISP'96, wollongong, NSW, Australia, June 24-26, 1996 : proceedings
المؤلف: Josef Pieprzyk, Jennifer Seberry )eds.(
المکتبة: (طهران)
موضوع: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
رده :
QA
76
.
L28
Vol
.
1172
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
65. Information security and privacy : Second Australian Conference,ACISP'97, Sydney, NSW, Australia, June 7-9, 1997 : proceedings
المؤلف: Vijay Varadharajan, Josef Pieprzyk, Yi Mu, )eds.(
المکتبة: (طهران)
موضوع: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
رده :
QA
76
.
L28
Vol
.
1270
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
66. Information security and privacy : Third Australasian Conference, ACISP'98, Brisbane, Australia, July 13-15, 1998 : proceedings
المؤلف: Colin Boyd, Ed Dawson, )eds.(
المکتبة: (طهران)
موضوع: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
رده :
QA
76
.
L28
Vol
.
1438
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
67. Information security and privacy : 5th Australasian Conference, ACISP'2000, Brisbane, Australia, July 10-12, 2000 : proceedings
المؤلف: Ed Dawson, Andrew Clark, Colin Boyd )eds.(
المکتبة: (طهران)
موضوع: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
رده :
QA
76
.
L28
Vol
.
1841
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
68. Information security and privacy : 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005 : proceedings
المؤلف: Colin Boyd, Juan M. Gonzalez Nieto )eds.(
المکتبة: (طهران)
موضوع: Congresses ، Computers -- Access control,Congresses ، Computer security,Congresses ، Data protection
رده :
QA
76
.
L28
Vol
.
3574
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
69. Information security and privacy : 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings
المؤلف: Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan )eds.(
المکتبة: (طهران)
موضوع: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
رده :
QA
76
.
L28
Vol
.
3108
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
70. Information security and privacy : 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999 : proceedings
المؤلف: Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry )eds.(
المکتبة: (طهران)
موضوع: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
رده :
QA
76
.
L28
Vol
.
1587
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
71. Information security and privacy; 13th Australasian conference, ACISP 2008, Wollongong Australia, July 7-9, 2008 proceedings
المؤلف: / [edited by] Yi Mu, Willy Susilo, Jennifer Seberry,ACISP (2008:13th: Wollongong)
المکتبة: كتابخانه مركزي و مركز اسناد دانشگاه تهران (طهران)
موضوع: Computer security -- Congresses,Data protection -- Congresses,Privacy, Right of -- Congresses
رده :
QA
76
.
9
.
A25A279
2008
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
72. Information security and privacy : 6th Australian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001 : proceedings
المؤلف: Vijay Varadharajan, Yi Mu, )eds.(
المکتبة: (طهران)
موضوع: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
رده :
QA
76
.
L28
Vol
.
2119
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
73. Information security applications
المؤلف:
المکتبة: كتابخانه مركزي و مركز اسناد دانشگاه مازندران (مازندران)
موضوع: Computer security ; Congresses. ; Data protection ; Congresses. ;
![](/design/images/bookmore.png)
74. Information security applications
المؤلف: / Sehun Kim, Moti Yung, Hyung-Woo Lee (eds.)
المکتبة: كتابخانه مركزي و مركز اسناد دانشگاه شهيد چمران (خوزستان)
موضوع: Computer security--Congresses,Data protection--Congresses
رده :
QA
,
76
.
9
,.
A25
,
W577
,
2007
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
75. Information security applications :
المؤلف: Brent ByungHoon Kang, JinSoo Jang (eds.).
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer security, Congresses.,Data protection, Congresses.,Computer security.,Data protection.
رده :
QA76
.
9
.
A25
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
76. Information security applications
المؤلف: Heung Youl Youm, Moti Yung (eds.)
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer security, Congresses,Data protection, Congresses
رده :
QA76
.
9
.
A25
W577
2009eb
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
77. Information security applications : 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003 : revised papers
المؤلف: Kijoon Chae, Moti Yung )eds.(
المکتبة: (طهران)
موضوع: International cooperation -- Congresses ، Computer security,International cooperation -- Congresses ، Data protection
رده :
QA
76
.
L28
Vol
.
2908
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
78. Information security applications : 5th International Workshop, WISA 2004, Jeju Island, Korea, August 23-25, 2004 : revised selected papers
المؤلف: Chae Hoon Lim, Moti Yung )eds.(
المکتبة: (طهران)
موضوع: International cooperation -- Congresses ، Computer security,International cooperation -- Congresses ، Data protection
رده :
QA
76
.
L28
Vol
.
3325
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
79. Information security, coding theory and related combinatorics: information coding and combinatorics
المؤلف: / [edited by] Dean Crnkovic, Vladimir Tonchev; [proceedings of the Nato Advanced Study Institute on Information Security and Related Combinatorics, Opatija, Croatia, 31 May - 11 June 2010]
المکتبة: المكتبة المركزية ومركز الأرشيف (طهران)
موضوع: Data protection,Computer security,Coding theory,Combinatorial analysis,-- Congresses,-- Congresses,-- Congresses,-- Congresses
رده :
005
.
8
N279I
2011
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
80. Information security practice and experience : first International Conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings
المؤلف: Robert H. Deng... ]et al.[ )eds.(
المکتبة: (طهران)
موضوع: Congresses ، Computer security,Congresses ، Computer networks -- Security measures,Congresses ، Data protection
رده :
QA
76
.
L28
Vol
.
3439
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)