1. A Practical approach to logical access control
Author: ]compiled by[ Ernst and Young
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: Access control ، Computers
Classification :
QA
76
.
9
.
A25
P72


2. A beginner's guide to Scala, object orientation and functional programming /
Author: John Hunt.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Functional programming (Computer science),Object-oriented programming (Computer science),Scala (Computer program language),Computer programming-- software development.,Computer programming.,Computer science.,Computers-- Programming-- General.,Computers-- Programming Languages-- General.,Programming & scripting languages: general.,Programming languages (Electronic computers)
Classification :
QA76
.
7


3. A beginner's guide to using open access data /
Author: Saif Aldeen S. AlRyalat and Shaher M. Momani.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Biology-- Research-- Methodology.,Medicine-- Research-- Methodology.,Open access publishing.,Biomedical Research-- methods.,Open Access Publishing.,Biology-- Research-- Methodology.,COMPUTERS-- Database Management-- General.,MEDICAL-- Biostatistics.,Medicine-- Research-- Methodology.,Open access publishing.,SCIENCE-- Biotechnology.
Classification :
R850
.
A57
2019


4. A guide to claims-based identity and access control :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Online identities.,Web services-- Access control.,COMPUTERS-- Digital Media-- General.,COMPUTERS-- Interactive & Multimedia.,COMPUTERS-- Web-- Site Design.,COMPUTERS-- Web-- User Generated Content.,Online identities.,Online identities.,Web services-- Access control.
Classification :
QA76
.
9
.
A25
G825
2010


5. A mind at play :
Author: by Jimmy Soni and Rob Goodman.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Shannon, Claude Elwood,1916-2001.,Shannon, Claude Elwood,(1916-2001),Shannon, Claude Elwood,1916-2001.,Electrical engineers-- United States, Biography.,Information theory.,Mathematicians-- United States, Biography.,BIOGRAPHY & AUTOBIOGRAPHY-- Science & Technology.,COMPUTERS-- Information Theory.,Electrical engineers.,Information theory.,Mathematicians.,Mathématiciens-- États-Unis-- Biographies.,TECHNOLOGY & ENGINEERING-- History.,Théorie de l'information.,United States., 7
Classification :
QA29
.
S423
S66
2017


6. A multidisciplinary introduction to information security /
Author: [edited by] Stig F. Mjølsnes
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Multidisciplinary design optimization
Classification :
QA76
.
9
.
A25
M845
2012


7. A practical guide to Fedora and Red Hat Enterprise Linux /
Author: Mark G. Sobell.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Linux.,Linux.,Linux.,Operating systems (Computers),Operating systems (Computers),Operating systems (Computers)
Classification :
QA76
.
76
.
O63
S5945
2010


8. AAA identity management security
Author: Santuka, Vivek.
Library: Library of Farabi Campus of Tehran University (Qom)
Subject:
Classification :
TK
5105
.
59
.
S316
2011


9. AES--Advanced encryption standard
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computers ; Access control ; Standards ; Congresses. ; Data encryption (Computer science) ; Standards ; Congresses. ; Computer security ; Standards ; Congresses. ;

10. ARM microprocessor systems :
Author: Muhammad Tahir and Kashif Javed
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: ARM microprocessors.,ARM microprocessors.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.
Classification :
QA76
.
6
.
T337
2017


11. Access control and personal identification systems /
Author: Dan M. Bowers
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computers-- Access control,Identification
Classification :
QA76
.
9
.
A25
B68
1988


12. Access control, security, and trust :
Author: Shiu-Kai Chin, Susan Older
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computers-- Access control,System design
Classification :
QA76
.
9
.
A25
C446
2011


13. Access control, security, and trust
Author: Chin, Shiu-Kai.
Library: Library of Farabi Campus of Tehran University (Qom)
Subject:
Classification :
QA
76
.
9
.
A25C446
2011


14. Access denied :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computers ; Access control. ;

15. Access denied :
Author: edited by Ronald Deibert ... [et al.]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computers-- Access control,Internet-- Censorship,Internet-- Government policy
Classification :
QA76
.
9
.
A25
.
A275
2008


16. Access denied :
Author: edited by Ronald Deibert ... [et al.].
Library: National Center for Globalization Library (Tehran)
Subject:
Classification :
QA76
.
9
،.
A25
A275
2010


17. Access denied
Author: / edited by Ronald Deibert ... [et al.]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computers--Access control,Internet--Censorship,Internet--Government policy
Classification :
QA
,
76
.
9
,.
A25
,.
A275
,
2008


18. Adaptive cryptographic access control /
Author: Anne V.D.M. Kayem, Selim G. Akl, Patrick Martinches
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science,Computers-- Access control,Data encryption (Computer science),Database security
Classification :
QA76
.
9
.
A25
K39
2010eb


19. Advanced API Security :
Author: Prabath Siriwardena.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Application software-- Security measures.,Computer security.,Computers, Special purpose.,Data protection.,Programming languages (Electronic computers)
Classification :
QA75
.
5-76
.
95


20. Advanced R
Author: Hadley Wickham.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: MATHEMATICS / Probability & Statistics / General,Programming languages (Electronic computers),R (Computer program language)
Classification :
QA276
.
45
.
R3
H335
2019

