321. Official Google Cloud Certified Associate Cloud Engineer :
Author: Dan Sullivan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Management, Study guides.,Cloud computing, Study guides.,Cloud computing.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.
Classification :
QA76
.
585
322. On the learnability of physically unclonable functions /
Author: Fatemeh Ganji.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Integrated circuits-- Security measures.,Machine learning.,Subroutines (Computer programs),Artificial intelligence.,Circuits & components.,Coding theory & cryptology.,COMPUTERS-- General.,Machine learning.,Mathematical modelling.,Subroutines (Computer programs)
Classification :
Q325
.
5
323. On the move to meaningful internet systems :
Author: Hervé Panetto, Christophe Debruyne, Henderik A. Proper, Claudio Agostino Ardagna, Dumitru Roman, Robert Meersman (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Databases, Congresses.,Internet, Congresses.,Computer security.,Computers-- Computer Science.,Computers-- Database Management-- Data Mining.,Computers-- Hardware-- Handheld Devices.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Computers-- Security-- General.,Data mining.,Databases.,Information retrieval.,Internet.,Network hardware.,Program concepts-- learning to program.,Systems analysis & design.
Classification :
TK5105
.
875
.
I57
324. On the physical security of physically unclonable functions /
Author: Shahin Tajik.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Adaptive computing systems.,Computer security.,Adaptive computing systems.,Algorithms & data structures.,Circuits & components.,Computer security.,COMPUTERS-- Security-- General.,Imaging systems & technology.,Security & fire alarm systems.
Classification :
QA76
.
9
.
A25
325. Online terrorist propaganda, recruitment and radicalization /
Author: edited by John R. Vacca
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Internet and terrorism.,Internet-- Political aspects.,Radicalization-- Computer network resources.,Social media-- Political aspects.,Terrorism-- Computer network resources.,Terrorists-- Recruiting-- Technological innovations.,Terrorists-- Recruiting.,COMPUTERS-- Internet-- General.,Internet and terrorism.,Internet-- Political aspects.,POLITICAL SCIENCE-- Political Freedom & Security-- International Security.,POLITICAL SCIENCE-- Political Freedom & Security-- Terrorism.,Social media-- Political aspects.,Terrorists-- Recruiting.
Classification :
HV6431
.
O559
2020
326. OpenVPN Cookbook - Second Edition.
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Extranets (Computer networks),COMPUTERS-- Networking-- General.,COMPUTERS-- Security-- General.,COMPUTERS-- System Administration-- General.,Extranets (Computer networks)
Classification :
T55
.
4-60
.
8
327. Operating system security /
Author: Trent Jaeger.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Operating systems (Computers),Betriebssystem,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Datensicherung,Operating systems (Computers)
Classification :
QA76
.
9
.
A25
328. Opportunistic networks :
Author: editors, Khaleel Ahmad, Nur Izura Udzir, Ganesh Chandra Deka.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Ad hoc networks (Computer networks),Ad hoc networks (Computer networks),COMPUTERS / Computer Literacy,COMPUTERS / Computer Science,COMPUTERS / Data Processing,COMPUTERS / Hardware / General,COMPUTERS / Information Technology,COMPUTERS / Machine Theory,COMPUTERS / Reference
Classification :
TK5105
.
77
.
O676
2018eb
329. Oracle Essbase 9 implementation guide :
Author: Sarma Anantapantula, Joseph Sydney Gomez ; reviewers, Shekar Kadur, Venkatakrishnan J.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Essbase (Computer file),Essbase (Computer file),Essbase (Computer file),Client/server computing.,Database design.,OLAP technology.,System design.,Client/server computing.,Client/server computing.,COMPUTERS-- Client-Server Computing.,Database design.,Database design.,OLAP technology.,OLAP technology.,System design.,System design.
Classification :
QA76
.
9
.
C55
A53
2009eb
330. Oracle database 12c release 2 multitenant /
Author: Anton Els, Vít Špinka, Franck Pachot.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Oracle (Computer file),Oracle (Computer file),Database management.,COMPUTERS-- Database Management-- General.,Database management.
Classification :
QA76
.
9D3
331. Oracle high availability, disaster recovery, and cloud services :
Author: Y.V. Ravi Kumar, Nassyam Basha, Krishna Kumar K.M., Bal Mukund Sharma and Konstantin Kerekovski.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Oracle (Computer file),Oracle (Computer file),Cloud computing.,Relational databases.,Cloud computing.,COMPUTERS-- Databases-- General.,Relational databases.
Classification :
QA76
.
9
.
D3
332. PC magazine fighting spyware, viruses, and malware /
Author: Ed Tittel.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computer viruses.,Malware (Computer software),Computer security.,Computer viruses.,Computerbeveiliging.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Computervirussen.,Malware (Computer software),Spyware.
Classification :
QA76
.
9
.
A25
T57
2005eb
333. PC user's bible /
Author: John Ross and Kelly Murdock.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Microcomputers.,COMPUTERS-- Hardware-- Handheld Devices.,COMPUTERS-- Hardware-- Personal Computers-- General.,COMPUTERS-- Microprocessors.,Microcomputers.
Classification :
QA76
.
5
.
R633
2007eb
334. PKI :
Author: Andrew Nash [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Public key cryptography.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,Computers-- Access control.,Computers-- Access control.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Public key cryptography.,Public key cryptography.,Public-Key-Infrastruktur
Classification :
QA76
.
9
.
A25
P59
2001eb
335. Parallel processing and applied mathematics :
Author: Roman Wyrzykowski, Jack Dongarra, Ewa Deelman, Konrad Karczewski (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Mathematics, Congresses.,Parallel processing (Electronic computers), Congresses.,Algorithms & data structures.,Artificial intelligence.,Computer architecture & logic design.,Computer networking & communications.,Computers-- Data Processing.,Computers-- Hardware-- General.,Computers-- Intelligence (AI) & Semantics.,Computers-- Logic Design.,Computers-- Programming-- Algorithms.,Computers-- Software Development & Engineering-- General.,Mathematical theory of computation.,Mathematics.,Parallel processing (Electronic computers),Software Engineering.
Classification :
QA76
.
58
336. Peer to peer computing :
Author: Ramesh Subramanian and Brian D. Goodman, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Peer-to-peer architecture (Computer networks),P2P (Réseaux d'ordinateurs),COMPUTERS-- Networking-- General.,Peer-to-peer architecture (Computer networks)
Classification :
TK5105
.
525
.
P443
2005eb
337. Penetration tester's open source toolkit /
Author: Jeremy Faircloth ; Michael Rogers, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Testing.,Computers-- Access control.,Penetration testing (Computer security),Computers-- Access control.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Networking.,COMPUTERS-- Security-- Online Safety & Privacy.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
338. Penetration testing bootcamp :
Author: Jason Beltrame.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Kali Linux.,Kali Linux.,Application software-- Testing.,Computer networks-- Security measures.,Penetration testing (Computer security),Raspberry Pi (Computer),Application software-- Testing.,Computer networks-- Security measures.,COMPUTERS / Security / General.,Penetration testing (Computer security),Raspberry Pi (Computer)
Classification :
TK5105
.
59
339. Penetration testing with Raspberry Pi :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Kali Linux.,Kali Linux.,Penetration testing (Computer security),Raspberry Pi (Computer),COMPUTERS-- Hardware-- General.,COMPUTERS-- Microprocessors.,COMPUTERS-- Security-- Networking.,Penetration testing (Computer security),Raspberry Pi (Computer)
Classification :
QA76
.
9
.
A25
M37
2016eb
340. Pharmaceutical and medical devices manufacturing computer systems validation /
Author: Orlando Lopez.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Medical instruments and apparatus-- Design.,Medical instruments and apparatus-- Quality control.,Pharmaceutical industry-- Data processing.,Computer Security.,Computer Systems.,Equipment and Supplies.,Technology, Pharmaceutical-- methods.,MEDICAL / Pharmacology,Medical instruments and apparatus-- Design.,Medical instruments and apparatus-- Quality control.,Pharmaceutical industry-- Data processing.
Classification :
RS122
.
2