21. Intelligence computation and evolutionary computation :
Author: Zhenyu Du (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computational intelligence -- Congresses.,Evolutionary computation -- Congresses.,Intelligence informatique -- Congrès.
22. Introduction to e-commerce /
Author: by Zheng Qin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Electronic commerce, Case studies.,Electronic commerce.,BUSINESS & ECONOMICS-- E-Commerce-- Auctions & Small Business.,BUSINESS & ECONOMICS-- E-Commerce-- Internet Marketing.,BUSINESS & ECONOMICS-- Mail Order.,BUSINESS & ECONOMICS-- Marketing-- Telemarketing.,COMPUTERS-- Electronic Commerce.,Electronic commerce.,Informatique.
Classification :
HF5548
.
32
23. Metasploit Penetration Testing Cookbook :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Computers-- Access control.,Data protection.,Information technology-- Security measures.,Computer networking & communications.,Computer networks-- Security measures.,Computer security-- Management.,Computer security.,Computers-- Access control.,Computers-- Networking-- Security.,Computers-- Security-- General.,Computers-- System Administration-- General.,Data protection.,Information technology-- Security measures.,Network security.
Classification :
QA76
.
9
.
A25
.
T459
2018eb
24. Microsoft System center configuration manager 2007 administrator's companion
Author: Steven D. Kaczmarek with the Microsoft System center configuration manager team.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Management.,COMPUTERS -- Data Transmission Systems -- General.,Microsoft System center configuration manager.
Classification :
TK5105
.
5
S748
2008
25. Migrating to MariaDB :
Author: William Wood.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: MariaDB.,MariaDB.,Database management-- Computer programs.,Open source software.,Database management-- Computer programs.,Open source software.
Classification :
QA76
.
9
.
D3
W66
2016
26. New technologies for digital crime and forensics: devices, applications, and software
Author: Chang-Tsun Li and Anthony T.S. Ho, editors
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Technological innovations ، Criminal investigation
Classification :
HV
8073
.
N468
27. Oracle high availability, disaster recovery, and cloud services :
Author: Y.V. Ravi Kumar, Nassyam Basha, Krishna Kumar K.M., Bal Mukund Sharma and Konstantin Kerekovski.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Oracle (Computer file),Oracle (Computer file),Cloud computing.,Relational databases.,Cloud computing.,COMPUTERS-- Databases-- General.,Relational databases.
Classification :
QA76
.
9
.
D3
28. Policy-based autonomic data governance /
Author: Seraphin Calo, Elisa Bertino, Dinesh Verma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Autonomic computing.,Computer networks-- Security measures.,Computer security.,Autonomic computing.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25
P65
2019
29. Practical Hadoop security /
Author: Bhushan Lakhe
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Apache Hadoop,Data encryption (Computer science),Data protection,Database security
Classification :
QA76
.
9
.
D314
L35
2014
30. Privacy in statistical databases
Author: Josep Domingo-Ferrer, Ilenia Tinnirello (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data protection, Congresses,Database security, Congresses,Statistics-- Databases, Congresses
Classification :
QA76
.
9
.
D314
P73
2012eb
31. Privacy-preserving data mining :
Author: edited by Charu C. Aggarwal and Philip S. Yu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data mining.,Data protection.,Computer security.,Computer security.,COMPUTERS-- Database Management-- Data Mining.,Data mining.,Data mining.,Data protection.,Data protection.,Informatique.
Classification :
QA76
.
9
.
D343
P75
2008eb
32. Proceedings of The Ifip Tc 11 23rd International Information Security Conference :
Author: edited by Sushil Jajodia, Pierangela Samarati, Stelvio Cimato, Sushil Jajodia, Pierangela Samarati, Stelvio Cimato.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Computers -- Law and legislation.,Data protection.
33. Quality of protection :
Author: edited by Dieter Gollmann, Fabio Massacci, Artsiom Yautsiukhin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Quality control, Congresses.,Computer networks-- Standards, Congresses.,Computer security-- Quality control, Congresses.,Computer security-- Standards, Congresses.,Computer networks-- Quality control.,Computer networks-- Quality control.,Computer networks-- Standards.,Computer networks-- Standards.,Computer security-- Quality control.,Computer security-- Standards.,Computer security-- Standards.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Informatique.
Classification :
QA76
.
9
.
A25
Q35
2006eb
34. Recent trends in network security and applications :
Author: Natarajan Meghanathan ... [et al.] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,COMPUTERS -- Internet -- Security.,COMPUTERS -- Networking -- Security.
35. Regulating new technologies in uncertain times /
Author: Leonie Reins, editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Big data-- Law and legislation.,Computer security.,Mass media-- Law and legislation.,Technological innovations-- Law and legislation.,Computer security.,Mass media-- Law and legislation.,Technological innovations-- Law and legislation.
Classification :
K487
.
T4
R44
2019
36. Research Directions in Data and Applications Security Ifip Tc11
Author: Wg11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, Uk.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject:
Classification :
QA76
.
9
.
D314
W475
2013
37. Research directions in database security
Author: Teresa F. Lunt ed.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Datenbanksystem,Datensicherung,Kongress
Classification :
QA76
.
9
.
D314
T474
1992
38. SAP security configuration and deployment :
Author: Leslie Wun-Young, technical editor; Joey Hirao [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises -- Computer networks -- Security measures.,Business information services -- Security measures.,SAP ERP.
Classification :
HF5548
.
37
L475
2009
39. Scientific support for the decision making in the security sector /
Author: [edited by] Ognyan Kounchev ... [et al.]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Decision support systems, Congresses,Emergency management-- Data processing, Congresses,Military planning-- Decision making, Congresses,Multisensor data fusion, Congresses,National security-- Decision making, Congresses,National security-- Environmental aspects, Congresses
Classification :
UA10
.
5
.
N38
2007
40. Secure data management : VLDB 2004 workshop, SDM 2004, Toronto, Canada, August 30, 2004 : proceedings
Author: Willem Jonker, Milan Petkovic )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Database security,Congresses ، Data encryption )Computer science(,Congresses ، Data protection,Congresses ، Computers -- Access control,Congresses ، Database management
Classification :
QA
76
.
L28
Vol
.
3178