461. TortoiseSVN 1.7 beginner's guide :
Author: Lesley Harrison.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: TortoiseSVN.,TortoiseSVN.,TortoiseSVN.,Computer software-- Development.,Open source software.,Computer software-- Development.,COMPUTERS-- Programming-- Open Source.,COMPUTERS-- Software Development & Engineering-- General.,COMPUTERS-- Software Development & Engineering-- Tools.,Open source software.
Classification :
QA76
.
76
.
D47
H37
2011eb
462. Toward a safer and more secure cyberspace /
Author: Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Cyberterrorism-- Prevention.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Cyberterrorism-- Prevention.
Classification :
QA76
.
9
.
A25
T695
2007eb
463. Towards extensible and adaptable methods in computing /
Author: Shampa Chakraverty, Anil Goel, Sanjay Misra, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Agile software development.,Computer software-- Development.,Machine learning.,Agile software development.,Computer software-- Development.,COMPUTERS-- Software Development & Engineering-- General.,Machine learning.
Classification :
QA76
.
76
.
D47
464. Towards next generation grids :
Author: edited by Thierry Priol, Marco Vanneschi.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computational grids (Computer systems), Congresses.,Computational grids (Computer systems),Computational grids (Computer systems),COMPUTERS-- Client-Server Computing.,Informatique.
Classification :
QA76
.
9
.
C58
C675
2007eb
465. Towards the Internet of Things :
Author: Mohammad Ali Jabraeil Jamali, Bahareh Bahrami, Arash Heidari, Parisa Allahverdizadeh, Farhad Norouzi.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Internet of things.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Internet of things.
Classification :
TK5105
.
8857
466. Transactions on computational science XXXIII /
Author: Marina L. Gavrilova, C.J. Kenneth Tan (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Internet of things.,Wireless communication systems.,Computer Applications.,Computer Communication Networks.,Logic Design.,Mathematics of Computing.,Operating Systems.,Theory of Computation.,Computer architecture & logic design.,Computer science.,Computers-- Computer Science.,Computers-- Data Processing.,Computers-- Hardware-- Network Hardware.,Computers-- Logic Design.,Computers-- Operating Systems-- General.,Information technology: general issues.,Internet of things.,Mathematical theory of computation.,Network hardware.,Operating systems.,Wireless communication systems.
Classification :
TK5105
.
8857
467. Transactions on large-scale data- and knowledge-centered systems XXXVII /
Author: edited by Abdelkader Hameurlain, Roland Wagner.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data mining, Congresses.,Database management, Congresses.,Artificial intelligence.,Artificial intelligence.,Computer networks.,Computer science.,Computer security.,Computer security.,Computers-- Database Management-- Data Mining.,Computers-- Hardware-- Network Hardware.,Computers-- Intelligence (AI) & Semantics.,Computers-- Operating Systems-- General.,Computers-- Security-- General.,Computers-- Software Development & Engineering-- General.,Data mining.,Data mining.,Network hardware.,Operating systems (Computers),Operating systems.,Software engineering.,Software Engineering.
Classification :
QA76
.
9
.
A25
468. Transformational security awareness :
Author: Perry Carpenter.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,BUSINESS & ECONOMICS-- Production & Operations Management.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Operating Systems-- General.
Classification :
QA76
.
9
.
A25
C37
2019eb
469. Trends and advances in information systems and technologies.
Author: Álvaro Rocha, Hojjat Adeli, Luís Paulo Reis, Sandra Costanzo, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks, Congresses.,Computer science, Congresses.,Information technology, Congresses.,Artificial intelligence.,Computer networks.,Computer science.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Information technology.
Classification :
T58
.
5
470. Tru64 UNIX troubleshooting :
Author: Martin Moore, Steven Hancock.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: UNIX (Computer file),UNIX (Computer file),Debugging in computer science.,Operating systems (Computers),Software maintenance.,COMPUTERS-- Operating Systems-- Linux.,COMPUTERS-- Operating Systems-- UNIX.,COMPUTERS-- System Administration-- Linux & UNIX Administration.,Debugging in computer science.,Operating systems (Computers),Software maintenance.
Classification :
QA76
.
76
.
O63
M658
2003b
471. Trust on the world wide web :
Author: Jennifer Golbeck.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,World Wide Web-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,World Wide Web-- Security measures.
Classification :
QA76
.
9
.
A25
G625
2008eb
472. Trusted computing /
Author: edited by Chris Mitchell.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
T746
2005
473. Ubiquitous computing and computing security of IoT /
Author: N. Jeyanthi, Ajith Abraham, Hamid Mcheick, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Internet of things-- Security measures.,Ubiquitous computing.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Ubiquitous computing.
Classification :
TK5105
.
8857
.
U25
2019
474. Understanding Voice over IP security /
Author: Alan B. Johnston, David M. Piscitello.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Internet telephony-- Security measures.,TCP/IP (Computer network protocol)-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Computersicherheit,Internettelefonie
Classification :
TK5105
.
8865
.
J64
2006eb
475. Understanding the insider threat :
Author: Richard C. Brackney, Robert H. Anderson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- United States, Congresses.,Computer security-- United States, Congresses.,Computers-- Access control-- United States, Congresses.,Electronic information resources-- Access control-- United States, Congresses.,Intelligence service-- Computer networks-- Security measures-- United States.,Intelligence service-- United States-- Data processing.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Electronic information resources-- Access control.,Intelligence service-- Computer networks-- Security measures.,Intelligence service-- Data processing.,POLITICAL SCIENCE-- Political Freedom & Security-- General.,POLITICAL SCIENCE-- Political Freedom & Security-- Terrorism.,United States., 7
Classification :
QA76
.
9
.
A25
B696
2004
476. User-centric and information-centric networking and services :
Author: M. Bala Krishna.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Information networks.,Computer networks.,COMPUTERS / Information Technology,COMPUTERS / Networking / General,Information networks.,REFERENCE / Yearbooks & Annuals
Classification :
TK5105
.
52
.
K75
2019eb
477. Using the common criteria for IT security evaluation /
Author: Debra S. Herrmann.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Standards.,Information technology-- Standards.,Telecommunication-- Security measures-- Standards.,Computer security-- Standards.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Computersicherheit,Datensicherung,Evaluation,Information technology-- Standards.,Messung,Rechnernetz,Telekommunikationsnetz
Classification :
TK5102
.
85
.
H47
2003eb
478. Utilizing information technology systems across disciplines :
Author: Evon M.O. Abu-Taieh, Asim A. El-Sheikh, Jeihan Abu-Tayeh, [editors].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Information resources management.,Information technology.,Management information systems.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Information resources management.,Information technology.,Management information systems.
Classification :
T58
.
5
.
U88
2009eb
479. VMware vSphere 4 implementation /
Author: Mike Laverick.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: VMware vSphere.,VMware vSphere.,VMware,VMware vSphere.,Virtual computer systems.,Systèmes virtuels (Informatique),COMPUTERS-- Operating Systems-- Virtualization.,COMPUTERS-- System Administration-- General.,COMPUTERS-- Utilities.,Virtual computer systems.
Classification :
QA76
.
9
.
V5
480. Verification of infinite-state systems with applications to security /
Author: edited by Edmund Clarke, Marius Minea and Ferucio Laurenţiu Ţiplea.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Computer software-- Verification, Congresses.,System theory-- Mathematical models, Congresses.,System theory-- Security measures, Congresses.,Computer security.,Computer software-- Verification.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,System theory-- Mathematical models.
Classification :
Q295
.
N38
2005eb