4. ......................
Author: O'Mahony, Donal.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Electronic funds transfers,، Data encryption )Computer science(,، Internet )Computer network(
Classification :
HG
1710
.
O45
1997


10. .....................
Author: Terry Bernstein...]et al.[
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Computer networks - Security measures ، Business enterprises,Security measures ، Internet )Computer network(,Security measures ، World Wide Web )Information retrieval system(,Security measures ، Electronic funds transfers,، Data encryption )Computer science(
Classification :
HD
30
.
38
.
I57
1996


11. A cryptography primer :
Author: Philip N. Klein, Brown University, Providence, Rhode Island
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Data encryption (Computer science),Digital signatures,Telecommunication-- Safety measures
Classification :
QA76
.
9
.
A25
K557
2014


12. A practical guide to TPM 2.0 :
Author: Will Arthur, David Challener, Kenneth Goldman
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Computer Science.,Data Encryption.,Software Engineering/Programming and Operating Systems.
Classification :
QA76
.
9
.
A25


13. AES--Advanced encryption standard
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computers ; Access control ; Standards ; Congresses. ; Data encryption (Computer science) ; Standards ; Congresses. ; Computer security ; Standards ; Congresses. ;

14. AFRICACRYPT 2020 :--Progress in cryptology
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ; Congresses. ;

15. AQA A level Computer Science.
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science, Problems, exercises, etc.,Computer science.,Computer science.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.
Classification :
QA76


16. ASIACRYPT 2019 :-Advances in Cryptology
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ; Congresses. ;

17. ASIACRYPT 2019 :--Advances in Cryptology
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ; Congresses. ;

18. ASIACRYPT 2019 :--Advances in cryptology
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ; Congresses. ;

19. Accountability and Security in the Cloud
Author: \ Massimo Felici , Carmen Fernández-Gago (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Cloud computing -- Security measures -- Congresses.,Data protection -- Congresses,Data encryption (Computer science) -- Congresses.,محاسبات ابری -- تدابیر ایمنی -- کنگره ها ,حفاظت اطلاعات -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
QA
76
.
585
.
A25
2015
E-Book
,


20. Adaptive cryptographic access control /
Author: Anne V.D.M. Kayem, Selim G. Akl, Patrick Martinches
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science,Computers-- Access control,Data encryption (Computer science),Database security
Classification :
QA76
.
9
.
A25
K39
2010eb

