281. Security and policy driven computing /
Author: Lei Liu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Automatic control.,Computer networks-- Management.,Computer networks-- Security measures.,Computer security.,Self-adaptive software.
Classification :
QA76
.
9
.
A25
L587
2011
282. Security and privacy in communication networks :
Author: Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
283. Security and trust management :
Author: Sokratis K. Katsikas, Cristina Alcaraz (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer programming-- software development.,Computer security.,Computer security.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Computers-- Programming-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Information retrieval.,Information technology: general issues.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25
S76
2018
284. Security aspects in information technology :
Author: Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Information technology-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
I58
2011
285. Security considerations in Lotus Notes and Domino 7 :
Author: Frederic Dahm [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Lotus Domino.,Lotus Notes.,Lotus Domino.,Lotus Domino.,Lotus Notes.,Lotus Notes.,Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer security.
Classification :
HF5548
.
4
.
L692
S43
2006
286. Security-enriched urban computing and smart grid :
Author: Ruay-Shiung Chang, Tai-hoon Kim, Sheng-Lung Peng (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computational grids (Computer systems), Congresses.,Computer networks-- Security measures, Congresses.,Computer networks, Congresses.
Classification :
TK5105
.
5
.
I58
2011
287. Security for service oriented architectures
Author: Williams, Walter,Walter Williams
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Service-oriented architecture )Computer science(,Security measures ، Computer networks,، Computer security,، COMPUTERS / Software Development & Engineering / General,، COMPUTERS / Security / General,، COMPUTERS / Internet / General
Classification :
TK
5105
.
5828
.
W5
288. Security for web services and service-oriented architectures
Author: Elisa Bertino ... ]et al.[
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Web services,Security measures ، Application software,Security measures ، Security-oriented architecture )Computer science(,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
S432
2010
289. Security in computing and communications :
Author: Sabu M. Thampi, Sanjay Madria, Guojun Wang, Danda B. Rawat, Jose M. Alcaraz Calero (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25
290. Security intelligence :
Author: Qing Li, Gregory Clark
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Electronic information resources-- Access control.,Computer networks-- Security measures. World Wide Web-- Security measures.,Computer science.,Network security.
Classification :
TK5105
.
59
291. Security log management :
Author: Jacob Babbin [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
TK5105
.
59
.
B333
2006eb
292. Security, privacy and trust in the IoT environment /
Author: editor, Zaigham Mahmood.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Internet of things-- Security measures.,Computer security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Online Safety & Privacy.
Classification :
QA76
.
9
.
A25
293. Security software developmen
Author: / Douglas A. Ashbaugh
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Application software--Development,Computer networks--Security measures,Electronic books.
Classification :
QA
,
76
.
9
,.
A25
,
A8246
,
2009eb
294. Security software development :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Application software ; Development. ; Computer networks ; Security measures. ; Application software ; Development. ; fast ; (OCoLC)fst00811707 ; Computer networks ; Security measures. ; fast ; (OCoLC)fst00872341 ; Computer security. ;
295. Security software development
Author: / Douglas A. Ashbaugh
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security.,Application software--Development,Computer networks--Security measures
296. Security software development. assessing and managing security risks
Author: Ashbaugh, Douglas A.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Application software- Development,، Computer networks- Security measures
Classification :
QA
76
.
9
.
A25
A8246
2009
297. Seven deadliest social network attacks
Author: Carl Timm, Richard Perez ; technical editor, Adam Ely
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Web 2.0, Security measures,Online social networks, Security measures,Computer networks, Security measures,Computer security,Malware (Computer software), Prevention,Computer crimes, Prevention
Classification :
TK
،
5105
.
88817
،.
T56
،
2010
298. Seven deadliest social network attacks
Author: / Carl Timm, Richard Perez
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Web 2.0, Security measures,Online social networks, Security measures,Computer networks, Security measures,Computer security,Malware (Computer software), Prevention,Computer crimes, Prevention
Classification :
E-BOOK
299. Seven deadliest web application attacks /
Author: Mike Shema.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Web services-- Security measures.,Computer networks-- Security measures.,Malware (Computer software)-- Prevention.
Classification :
TK5105
.
88813
.
S54
2010