2521. Transactions on computational science XVIII
Author: Marina L. Gavrilova, C.J. Kenneth Tan, Arjan Kuijper (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer science,Sensor networks
Classification :
QA76
.
T73
2013


2522. Transactions on data hiding and multimedia security VI /
Author: Yun Q. Shi [and others] (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Data protection,Multimedia systems-- Security measures,Algorithm Analysis and Problem Complexity,Computer Science,Computers and Society,Data Encryption,Pattern Recognition,Systems and Data Security
Classification :
QA76
.
9
.
A25
T73
2011


2523. Transactions on large-scale data- and knowledge-centered systems XXXVII /
Author: edited by Abdelkader Hameurlain, Roland Wagner.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data mining, Congresses.,Database management, Congresses.,Artificial intelligence.,Artificial intelligence.,Computer networks.,Computer science.,Computer security.,Computer security.,Computers-- Database Management-- Data Mining.,Computers-- Hardware-- Network Hardware.,Computers-- Intelligence (AI) & Semantics.,Computers-- Operating Systems-- General.,Computers-- Security-- General.,Computers-- Software Development & Engineering-- General.,Data mining.,Data mining.,Network hardware.,Operating systems (Computers),Operating systems.,Software engineering.,Software Engineering.
Classification :
QA76
.
9
.
A25


2524. Transactions on large-scale data- and knowledge-centered systems XXXVIII :
Author: Abdelkader Hameurlain, Roland Wagner, Sven Hartmann, Hui Ma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data mining, Congresses.,Database management, Congresses.,Computer networks-- Security measures.,Computer security.,Data mining.,Database management.
Classification :
QA76
.
9
.
A25


2525. Transformational security awareness :
Author: Perry Carpenter.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,BUSINESS & ECONOMICS-- Production & Operations Management.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Operating Systems-- General.
Classification :
QA76
.
9
.
A25
C37
2019eb


2526. Transforming cybersecurity using COBIT 5
Author: [by ISACA].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises -- Computer networks -- Security measures.,COBIT (Information technology management standard),Computer security.

2527. Transparent user authentication
Author: / Nathan Clarke
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures,Computers, Access control,Data protection
Classification :
E-BOOK

2528. Transparent user authentication biometrics, RFID and behavioural profiling
Author: Clarke, Nathan.,Nathan Clarke
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Computer networks, Security measures,، Computers, Access control,، Data protection
Classification :
TK
5105
.
59
.
C575
2011


2529. Tribe of Hackers :
Author: Marcus J. Carey & Jennifer Jin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,Computers.,Data protection.,Risk management.,Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Security-- Cryptography.,Computers.,Data protection.,Risk management.
Classification :
HF5548
.
37
C37
2019eb


2530. Tribe of hackers :
Author: Marcus J, Carey and Jennifer Jin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,Data protection.,Risk management.,Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,Data protection.,Risk management.

2531. Trust, Privacy and Security in Digital Business
Author: \ Simone Fischer-Hübner, Costas Lambrinoudakis, Javier Lopez (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Business enterprises -- Computer networks -- Security measures -- Congresses.,Computer security -- Management -- Congresses.,شرکتهای اقتصادی -- شبکههای کامپیوتری -- تدابیر ایمنی -- کنگره ها, کامپیوترها -- ایمنی اطلاعات -- مدیریت -- کنگره ها
Classification :
QA76
.
9
.
A25
T7
2015
E-Book
,


2532. Trust and new technologies marketing and management on the Internet and mobile media
Author: editors, Teemu Kautonen, Heikki Karjaluoto
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Electronic commerce , Security measures,، Internet marketing , Security measures,، Business enterprises , Computer networks , Security measures,، Electronic commerce , Management,، Consumentengedrag , gtt,، Vertrouwen. , gtt,، Internet. , gtt,، Draadloze communicatie. , gtt
Classification :
HF
5415
.
1265
T78
2008


2533. Trust and privacy in digital business : First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004 : proceedings
Author: Sokratis Katsikas, Javier Lopez, Guenther Pernul )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Public key infrastructure )Computer security(,Security measures -- Congresses ، Data transmission systems,Security measures -- Congresses ، Electronic commerce,Computer networks -- Security measures -- Congresses ، Business enterprises
Classification :
QA
76
.
L28
Vol
.
3184


2534. Trust and security in collaborative computing
Author: Zou, Xukai
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: ، Computer security,، Groupware )Computer software(,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
Z69
2008


2535. Trust and security in collaborative computing
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Groupware (Computer software) ; Computer networks ; Security measures. ;

2536. Trust and security in collaborative computing
Author: / Xukai Zou, Yuan-Shun Dai, Yi Pan
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Groupware (Computer software),Computer networks--Security measures
Classification :
QA
,
76
.
9
,.
A25
,
Z69
,
2008


2537. Trust and security in collaborative computing /Xukai Zou, Yuan-Shun Dai, Yi Pan.
Author:
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer security,Groupware (Computer software),Computer networks--Security measures
Classification :
QA
76
.
9
.
A25
Z69
2008


2538. Trust and trustworthy computing
Author: Stefan Katzenbeisser ... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
T78
2012eb


2539. Trust in cyberspace /
Author: Fred B. Schneider, editor ; Committee on Information Systems Trustworthiness, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Internet-- Security measures.,Telecommunication policy-- United States.,Computer Security.,Internet.,Public Policy.,Telecommunications.,BUSINESS & ECONOMICS-- Industries-- Media & Communications.,Computer networks-- Security measures.,COMPUTERS.,Electrical & Computer Engineering.,Engineering & Applied Sciences.,Internet / Security.,Internet-- Security measures.,Internet.,Sicherheit,TECHNOLOGY & ENGINEERING-- Telecommunications.,Telecommunication policy.,Telecommunications.,Telekommunikationspolitik,Verteiltes System,United States.,USA., 7, 7
Classification :
TK5105
.
59
.
T78
1999eb


2540. Trust management VII :
Author: Carmen Fernández-Gago [and others] (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
C376
2013

