121. Distributed and parallel computing :
Author: Michael Hobbs, Andrzej M. Goscinski, Wanlei Zhou (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Algorithmes -- Congrès.,Multiprocesseurs -- Programmation -- Congrès.,Parallel processing (Electronic computers) -- Congresses.
122. Distributed networks: intelligence, security, and applications
Author: edited by Qurban A. Memon
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Distributed processing ، Electronic data processing,، Internetworking )Telecommunication(,، Distributed databases,Security measures ، Computer networks,، COMPUTERS / Software Development & Engineering / Systems Analysis & Design,، COMPUTERS / Security / Cryptography,، TECHNOLOGY & ENGINEERING / Electronics / General
Classification :
QA
76
.
9
.
D5
D55
123. Dynamic SQL :
Author: Edward Pollack.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer programming.,Computer security.,Database management.,Programming languages (Electronic computers),SQL (Computer program language),Computer programming.,Computer security.,COMPUTERS / Databases / Data Mining.,COMPUTERS / Databases / General.,COMPUTERS / Programming Languages / SQL.,Database management.,Programming languages (Electronic computers),SQL (Computer program language)
Classification :
QA76
.
73
.
S67
124. Edge computing :
Author: Jie Cao, Quan Zhang, Weisong Shi.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Electronic data,Electronic data processing-- Distributed processing.,Internet of things.,Communications engineering-- telecommunications.,Computer science.,Computer security.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Electronic data processing-- Distributed processing.,Imaging systems & technology.,Information retrieval.,Internet of things.
Classification :
QA76
.
9
.
D5
C36
2018eb
125. Effective security management /
Author: Charles A. Sennewald.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Industries-- Security measures.,Private security services-- Management.,Retail trade-- Security measures.,Commerce de détail-- Sécurité-- Mesures.,Industrie-- Sécurité-- Mesures.,Sécurité, Services privés de-- Gestion.,BUSINESS & ECONOMICS-- Corporate Governance.,BUSINESS & ECONOMICS-- Leadership.,BUSINESS & ECONOMICS-- Organizational Development.,BUSINESS & ECONOMICS-- Workplace Culture.,Industries-- Security measures.,Private security services-- Management.,Retail trade-- Security measures.
Classification :
HV8290
.
S46
2003eb
126. Electronic record keeping :
Author: David Nettleton, Janet Gough.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Medical records-- Automation.,Medical records-- Data processing.,Medical records-- Law and legislation-- United States.,Medical Records-- legislation & jurisprudence.,COMPUTERS-- Electronic Publishing.,Medical records-- Automation.,Medical records-- Data processing.,Medical records-- Law and legislation.,United States., 7
Classification :
KF3827
.
R4
N48
2004eb
127. Electronic voting :
Author: Robert Krimmer, Melanie Volkamer, Véronique Cortier, Rajeev Goré, Manik Hapsara, Uwe Serdült, David Duenas-Cid (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Electronic voting, Congresses.,Computer networking & communications.,Computer security.,Computers-- Data Processing.,Computers-- Hardware-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption.,Electronic voting.,Ethical & social aspects of IT.,Public administration.,Software Engineering.
Classification :
JF1032
128. Eliciting the requirements for intelligent systems in law enforcement /
Author: Jeffrey L. Goldberg [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Case studies.,Internet-- Security measures, Case studies.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Internet-- Security measures.
Classification :
TK5105
.
59
.
E45
2004eb
129. Embedded systems :
Author: James K. Peckol, Ph. D., University of Washington.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Embedded computer systems.,Object-oriented methods (Computer science),COMPUTERS-- General.,Embedded computer systems.,Object-oriented methods (Computer science)
Classification :
TK7895
.
E42
130. Emerging internet-based technologies /
Author: Matthew N.O. Sadiku.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Internet.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- General.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Internet.
Classification :
TK5105
.
875
.
I57
131. Emerging pervasive information and communication technologies (PICT) :
Author: Kenneth D. Pimple, editor
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Information technology-- Moral and ethical aspects.,Mass media-- Moral and ethical aspects.,Ubiquitous computing-- Moral and ethical aspects.,Computer Science.,Computers and Society.,Ethics.,Media Law.,Public International Law.
Classification :
QA76
.
5915
132. Emerging security algorithms and techniques /
Author: editors, Khaleel Ahmad, M.N. Doja, Nur Izura Udzir, Manu Pratap Singh.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Cryptography.,Data encryption (Computer science),Computer security.,COMPUTERS-- Computer Graphics-- Game Programming & Design.,COMPUTERS-- General.,COMPUTERS-- Security-- Cryptography.,COMPUTERS-- Security-- General.,Cryptography.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
E466
2019eb
133. Emerging technologies for authorization and authentication :
Author: Andrea Saracino, Paolo Mori (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses.,Computer security, Congresses.,Computer science.,Computer security.,Computers-- Computer Vision & Pattern Recognition.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data protection.,Information retrieval.,Information technology: general issues.,Network hardware.,Pattern recognition.,Software engineering.,Software Engineering.
Classification :
QA76
.
9
.
A25
134. Emerging technologies in data mining and Information security :
Author: Ajith Abraham, Paramartha Dutta, Jyotsna Kumar Mandal, Abhishek Bhattacharya, Soumi Dutta, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data mining, Congresses.,Artificial Intelligence.,Computational Intelligence.,Systems and Data Security.,Artificial intelligence.,Computer security.,Computer security.,COMPUTERS / General.,Data mining.
Classification :
QA76
.
9
.
D343
135. Engineering trustworthy software systems :
Author: Jonathan P. Bowen, Zhiming Liu, Zili Zhang (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Computer software, Congresses.,Software engineering, Congresses.,Computer programming-- software development.,Computer security.,Computer software.,Computers-- General.,Computers-- Hardware-- Handheld Devices.,Computers-- Programming-- General.,Computers-- Programming Languages-- General.,Computers-- Software Development & Engineering-- General.,Information technology: general issues.,Programming & scripting languages: general.,Software engineering.,Software Engineering.,Systems analysis & design.
Classification :
QA76
.
758
136. Enterprise DevOps framework :
Author: Shamayel M. Farooqui.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer software-- Development.,Computer system conversion.,Information technology-- Management.,Operating systems (Computers),Computer software-- Development.,Computer system conversion.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Information technology-- Management.,Network hardware.,Operating systems (Computers)
Classification :
QA76
.
9
.
C68
137. Essential PHP security /
Author: Chris Shiflett.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: PHP (Computer program language),Web sites-- Security measures.,PHP (Langage de programmation),Sites Web-- Sécurité-- Mesures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,PHP (Computer program language),Web sites-- Security measures.
Classification :
QA76
.
73
.
P224
S52
2006
138. Essential PowerShell for Office 365 :
Author: Vlad Catrinescu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Microsoft Windows (Computer file),Microsoft Windows (Computer file),Command languages (Computer science),Scripting languages (Computer science),Systems programming (Computer science),Windows PowerShell (Computer program language),Command languages (Computer science),Computer programming-- software development.,COMPUTERS-- Programming Languages-- General.,Information architecture.,Information technology: general issues.,Microsoft programming.,Operating systems.,Scripting languages (Computer science),Systems programming (Computer science),Windows PowerShell (Computer program language)
Classification :
QA76
.
73
.
W56
139. Ethical hacking /
Author: Alana Maurushat.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Law and legislation, Case studies.,Computer security-- Law and legislation.,Computers-- Law and legislation, Case studies.,Computers-- Law and legislation.,Hackers-- Legal status, laws, etc.,Hackers-- Legal status, laws, etc., Case studies.,Hacking-- Moral and ethical aspects, Case studies.,Hacking-- Moral and ethical aspects.,Ordinateurs-- Droit, Études de cas.,Ordinateurs-- Droit.,Piratage informatique-- Aspect moral, Études de cas.,Piratage informatique-- Aspect moral.,Pirates informatiques-- Droit, Études de cas.,Pirates informatiques-- Droit.,Sécurité informatique-- Droit, Études de cas.,Sécurité informatique-- Droit.,Computer security-- Law and legislation.,Computers-- Law and legislation.,Hacking.
Classification :
HV6773
.
M383
2019
140. Euro-Par 2018 :
Author: edited by Gabriele Mencagli, Dora B. Heras et al. (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Parallel processing (Electronic computers), Congresses.,Parallel processing (Electronic computers)
Classification :
QA76
.
58
.
I58
2018eb