93. A multidisciplinary introduction to information security /
Author: [edited by] Stig F. Mjølsnes
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Multidisciplinary design optimization
Classification :
QA76
.
9
.
A25
M845
2012


94. A survey of Islamic history -- Why an introduction to Islam specifically for Jews? -- Arabs and Israelites -- Pre-Islamic origins -- The emergence of Islam -- Muhammad and the Jews of Medina -- The death of the prophet and the expansion of the community -- The conquests -- The caliphal dynasties -- The decline of the Muslim world -- God, the Qur'an, and Islamic law -- God -- The five doctrines or "pillars of faith" -- The evolution of a formal theology -- The Qur'an -- The interpretive tradition -- The prophetic record -- Islamic law -- The workings of shari'a -- The umma: Islam in practice -- The umma and the caliphate -- The five pillars of Islam -- A sixth pillar? Jihad -- The range of practice among Muslims -- Sufism -- The shi'a -- Mosque and clergy -- The calendar -- The Muslim life-cycle -- Personal observance. 0
Author: Reuven Firestone.
Library: Library of Islamic Parliament (Tehran)
Subject:

95. AAA identity management security
Author: Santuka, Vivek.
Library: Library of Farabi Campus of Tehran University (Qom)
Subject:
Classification :
TK
5105
.
59
.
S316
2011


96. Access control system
Author: / by Messaoud Benantar
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures
Classification :
TK
,
5105
.
59
,.
B46
,
2006


97. Access control systems
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ;

98. Access control systems
Author: by Messaoud Benantar.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.

99. Access control systems: security, identity, management, and trust models
Author: Benantar, Messaoud
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Computer networks
Classification :
TK
5105
.
59
.
B46
2006


100. Access control systems: security, identity management and trust models
Author: Benantar, Messaoud
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Security measures ، Computer networks
Classification :
TK
5105
.
59
.
B46

