721. The secret life of programs :
Author: by Jonathan E. Steinhart.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Browsers (Computer programs),Computer programming.,Programming languages (Electronic computers),Browsers (Computer programs),Computer programming.,COMPUTERS-- Computer Science.,Programming languages (Electronic computers)
Classification :
QA76
.
6
.
S735
2019


722. The superpowers -- "The Arabs are coming!" -- "Jihad!" -- The co-opted caliphate and the stumbling Jihad -- The year 711 -- Picking up the pieces after Rome -- The myth of Poitiers -- The fall and rise of the Umayyads -- Saving the popes -- An empire of force and faith -- Carolingian Jihads: Roncesvalles and Saxony -- The great mosque -- The first Europe, briefly -- Equipoise--delicate and doomed -- Disequilibrium Pelayo's revenge -- Knowledge transmitted, rationa
Author: David Levering Lewis.
Library: Library of Islamic Parliament (Tehran)
Subject:

723. The theory and practice of social machines /
Author: Nigel Shadbolt, Kieron O'Hara, David De Roure, Wendy Hall.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Information technology-- Social aspects.,Internet-- Social aspects.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,Information technology-- Social aspects.,Internet-- Social aspects.
Classification :
HM851


724. The traditional problem of evil: suffering and evil actions -- Another problem of evil: divine hiddenness -- Miracles as a problem of evil -- The ignorance defense -- Identifying, interpreting, and certifying revelation -- Should God's power be understood as omnipotence? -- A process Christian theism and the problems of evil. 0
Author: James A. Keller.
Library: Library of Islamic Parliament (Tehran)
Subject:

725. The web application hacker's handbook
Author: / Dafydd Stuttard, Marcus Pinto
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Internet, Security measures,Computer security
Classification :
TK
5105
.
875
2011


726. The web application hacker's handbook :
Author: Dafydd Stuttard, Marcus Pinto.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Internet-- Security measures.
Classification :
TK
5105
.
875
.
I57
.
S78
2011


727. Theory of Cryptography :
Author: Amos Beimel, Stefan Dziembowski (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses.,Business & Economics-- Information Management.,Computer security.,Computers-- Hardware-- Network Hardware.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Data encryption (Computer science),Data encryption.,Ethical & social aspects of IT.,Information architecture.,Law-- Science & Technology.,Legal aspects of IT.,Network hardware.
Classification :
QA76
.
9
.
A25


728. Third International Congress on Information and Communication Technology :
Author: Sin-She Yang, Simon Sherratt, Nilanjan Dey, Amit Joshi, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks, Congresses.,Information technology, Congresses.,Internet of things, Congresses.,Computer networks.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Information technology.,Internet of things.
Classification :
T58
.
5


729. Topics in cryptology -- CT-RSA 2018 :
Author: Nigel P. Smart (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses.,Business & Economics-- Information Management.,Coding theory & cryptology.,Computer architecture & logic design.,Computers-- Hardware-- Network Hardware.,Computers-- Logic Design.,Computers-- Security-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Information architecture.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25


730. Toward a Secure and Decentralized Blockchain-Based Ride-Hailing Platform for Autonomous Vehicles
Author: Shivers, Ryan M.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science,Robotics

731. Toward a Secure and Decentralized Blockchain-Based Ride-Hailing Platform for Autonomous Vehicles
Author: Shivers, Ryan M.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science,Robotics

732. Towards a Private New World:
Author: Riazi, Mohammad Sadegh
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence,Computer engineering

733. Towards a Private New World: Algorithm, Protocol, and Hardware Co-design for Large-Scale Secure Computation
Author: Riazi, Mohammad Sadegh
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence,Computer engineering

734. Towards a Security Reference Architecture for Network Function Virtualization
Author: Alnaim, Abdulrahman K.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science

735. Towards a Security Reference Architecture for Network Function Virtualization
Author: Alnaim, Abdulrahman K.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science

736. Towards extensible and adaptable methods in computing /
Author: Shampa Chakraverty, Anil Goel, Sanjay Misra, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Agile software development.,Computer software-- Development.,Machine learning.,Agile software development.,Computer software-- Development.,COMPUTERS-- Software Development & Engineering-- General.,Machine learning.
Classification :
QA76
.
76
.
D47


737. Towards next generation grids :
Author: edited by Thierry Priol, Marco Vanneschi.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computational grids (Computer systems), Congresses.,Computational grids (Computer systems),Computational grids (Computer systems),COMPUTERS-- Client-Server Computing.,Informatique.
Classification :
QA76
.
9
.
C58
C675
2007eb


738. Towards the Internet of Things :
Author: Mohammad Ali Jabraeil Jamali, Bahareh Bahrami, Arash Heidari, Parisa Allahverdizadeh, Farhad Norouzi.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Internet of things.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Internet of things.
Classification :
TK5105
.
8857


739. Transactions on Computational Science X: Special Issue on Security in Computing, Part I
Author: / Luca Compagna, Paul El Khoury, Fabio Massacci (auth.), Marina L. Gavrilova, C. J. Kenneth Tan, Edward David Moreno (eds.)
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: ARCHITECTURE|COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, SOFTWARE ENGINEERING|ENGINEERING, MULTIDISCIPLINARY&COMPUTER SCIENCE, HARDWARE
Classification :
E-BOOK

740. Transactions on Data Hiding and Multimedia Security VI
Author: / Fu Chang, Regunathan Radhakrishnan, Fulong Ma, Li Zhao (eds.)-Tsong Ng, Wei Su (auth.), Yun Q. Shi, Sabu Emmanuel, Mohan S. Kankanhalli, Shih-Patchara Sutthiwan, Yun Q. Shi, Hong Zhao, Tian
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: ARCHITECTURE|COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, SOFTWARE ENGINEERING&COMPUTER SCIENCE, HARDWARE
Classification :
E-BOOK
