9. Advances in information and computer security :
Author: Tetsu Iwata, Masakatsu Nishigaki (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses,Computer security-- Congresses,Electronic information resources-- Access control-- Congresses
Classification :
QA76
.
9
.
A25
I58
2011
11. Applied information security :
Author: David Basin, Patrick Schaller, Michael Schläpfer.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25
B37
2011
12. Applied information security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Data encryption (Computer science) ; Computer networks ; Security measures. ; Data protection. ;
13. Applied information security
Author: / David Basin, Patrick Schaller, Michael Schleapfer
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Data encryption (Computer science),Computer networks--Security measures,Data protection.
Classification :
QA
,
76
.
9
,.
A25
,
B3798
,
2011
15. BL,BL
Author: / Marshall G.S. Hodgson. ,20090530 0
Library: Library of Islamic Parliament (Tehran)
Subject:
16. Computer security :
Author: Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25
17. Computer security - ESORICS 2012
Author: Sara Foresti, Moti Yung, Fabio Martinelli (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
E98
2012eb
18. Critical information infrastructure security :
Author: Sandro Bologna, Bernhard Hämmerli, Dimitris Gritzalis, Stephen Wolthusen (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
C75
2011
19. Critical infrastructure protection
Author: / Javier Lopez, Roberto Setola, Stephen D. Wolthusen (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks--Security measures,Information networks--Security measures,Data encryption (Computer science),Data structures (Computer science),Information technology--Security measures
Classification :
TK5105
.
59
.
C725
2012
20. Critical infrastructure protection
Author: Javier Lopez, Roberto Setola, Stephen D. Wolthusen (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Data encryption (Computer science),Data structures (Computer science),Information networks-- Security measures,Information technology-- Security measures
Classification :
TK5105
.
59
.
C725
2012eb