1. Cloud security and privacy /
Author: Tim Mather, Subra Kumaraswamy, and Shahed Latif.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures.,Computer networks-- Security measures.,Cloud Computing,Computer networks-- Security measures.,Computersicherheit,Délits informatiques.,Informatique en nuage.,Réseaux informatiques.,Sécurité informatique.,Sicherheitsmaßnahme,Sicherheitsmassnahme.,Technologies de l'information et de la communication.
Classification :
TK5105
.
59
.
M38
2009


2. Communication Systems and Networks :
Author: Subir Biswas, Animesh Mukherjee, Mun Choon Chan, Sandip Chakraborty, Abhinav Kumar, Giridhar Mandyam, Rajeev Shorey (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing, Congresses.,Computer networks-- Security measures, Congresses.,Computer networks, Congresses.,Telecommunication systems, Congresses.,Cloud computing.,Computer networks-- Security measures.,Computer networks.,Telecommunication systems.
Classification :
TK5105
.
5


3. Computer networks and Internets /
Author: Douglas E. Comer, Department of Computer Sciences, Purdue University, West Lafayette, IN 47907.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Internetworking (Telecommunication),Computer networks.,Internetworking (Telecommunication)
Classification :
TK5105
.
5
.
C5897
2015


4. From database to cyber security :
Author: Pierangela Samarati, Indrajit Ray, Indrakshi Ray (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Databases.,Computer security.,Databases.
Classification :
QA76
.
9
.
A25


5. Guide to computer network security /
Author: Joseph Migga Kizza.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Business & Economics-- Information Management.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- System Administration-- Storage & Retrieval.,Data mining.,Information architecture.,Information retrieval.,Network hardware.
Classification :
TK5105
.
59


6. Guide to computer network security
Author: Joseph Migga Kizza
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control,Computer networks-- Security measures
Classification :
TK5105
.
59


7. Handbook of research on information and cyber security in the fourth industrial revolution /
Author: Ziska Fields, University of KwaZulu-Natal, South Africa.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Confidential communications-- Protection.,Electronic information resources-- Access control.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Electronic information resources-- Access control.
Classification :
TK5105
.
59
.
P744
2018e


8. Management of information security /
Author: Michael E. Whitman, Herbert J. Mattord.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Management.,Computer security-- Management.,Computer security.,Information technology-- Security measures.,Computer security-- Management.,Computer security.,Computersicherheit,Information technology-- Security measures.,Kryptologie,Risikomanagement
Classification :
TK5105
.
59
.
W45
2019


9. Practical cloud security :
Author: Chris Dotson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures.,Computer networks-- Access control.,Computer networks-- Security measures.,Computer networks-- Access control.,Computer networks-- Security measures.
Classification :
QA76
.
585


10. Principles of information security /
Author: Michael E. Whitman, Ph. D., CISM, CISSP, Herbert J. Mattord, Ph. D., CISM, CISSP, Kennesaw State University.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer security.
Classification :
TK5105
.
59
.
W54
2018


11. Security for cloud storage systems
Author: Yang ; Kan,Kan Yang; Xiaohua Jia
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: Security measures ، Cloud computing,Security measures ، Computer networks,Internet / Security ، COMPUTERS
Classification :
TK

12. Security for cloud storage systems /
Author: Kan Yang, Xiaohua Jia.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures.,Computer networks-- Security measures.
Classification :
TK5105
.
59


13. Security in computing and communications :
Author: Sabu M. Thampi, Pradeep K. Atrey, Chun-I Fan, Gregorio Martinez Perez (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computers-- Access control, Congresses
Classification :
TK5105
.
59
.
S73
2013


14. Security, privacy, and anonymity in computation, communication, and storage :
Author: Guojun Wang, Jinjun Chen, Laurence T. Yang (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Computer security.,Data protection.
Classification :
QA76
.
9
.
A25


15. Security, privacy and trust in cloud systems /
Author: Surya Nepal, Mukaddim Pathan, editors
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures,Computer networks-- Security measures,Computer security
Classification :
QA76
.
585


16. Trusted computing and information security :
Author: Huanguo Zhang, Bo Zhao, Fei Yan (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25

