81. Communication and multimedia security
Author: / Antonio Lioy, Daniele Mazzocchi, eds
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Congresses,Telecommunication systems--Security measures--Congresses,Computer security--Congresses
Classification :
TK
,
5105
.
59
,.
C577
,
2003
QA
,
76
,.
L4
,
no
.
2828


82. Communication and multimedia security : advanced techniques for network and data protection : 7th IFIP-TC6TC11 international conference, CMS 2003, Torino, Italy, October 2-3, 2003 : proceedings
Author: Antonio Lioy, Daniele Mazzocchi, )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer networks -- Security measures,Security measures -- Congresses ، Telecommunication systems,Congresses ، Computer security
Classification :
QA
76
.
L28
Vol
.
2828


83. Computer security :
Author: Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25


84. Computer security - ESORICS 2012
Author: Sara Foresti, Moti Yung, Fabio Martinelli (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
E98
2012eb


85. Contemporary computing :
Author: Sanjay Ranka [and others] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science, Congresses.,Soft computing, Congresses.,Computer science.,Computer science.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Informatique.,Soft computing.,Soft computing.
Classification :
QA75
.
5
.
I584
2009


86. Critical approaches to international security /
Author: K. M.
Library: Library of Islamic Parliament (Tehran)
Subject:

87. Critical information infrastructure security :
Author: Sandro Bologna, Bernhard Hämmerli, Dimitris Gritzalis, Stephen Wolthusen (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
C75
2011


88. Critical infrastructure protection V :
Author: Jonathan Butts, Sujeet Shenoi (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Cyberinfrastructure-- Security measures, Congresses.
Classification :
TK5105
.
59
.
I35
2011


89. Cryptology and network security :
Author: Jan Camenisch, Panos Papadimitratos (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer Communication Networks.,Computers and Society.,Cryptology.,Information Systems and Communication Service.,Software Engineering/Programming and Operating Systems.,Computer networking & communications.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- Online Services-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Ethical & social aspects of IT.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25


90. DIM '05 : proceedings of the 2005 ACM Workshop on Digital Identity Management, November 11, 2005, Fairfax, Virginia, USA )co-located with CCS 2005(
Author:
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer networks -- Security measures,Congresses ، Computer security,Congresses ، Data protection
Classification :
TK
5105
.
59
.
A2282
2005


91. Data privacy management and autonomous spontaneus [sic] security
Author: Joaquin Garcia-Alfaro ... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A97
D76
2011eb


92. Decision and game theory for security :
Author: John S. Baras, Jonathan Katz, Eitan Altman (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Game theory, Congresses
Classification :
QA76
.
9
.
A25
G36
2011


93. Future of trust in computing
Author: David Gawrock... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
F888
2008eb


94. Global security, safety, and sustainability
Author: Hamid Jahankhani, Ali G. Hessami, Feng Hsu (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses,Data protection, Congresses,Internet-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
I344
2009eb


95. How do rogue nations threaten human rights? -- North Korea represses freedom / Kay Seok -- Iran violates women's rights / Sam Brownback -- Sudanese government engages in genocide / Human Rights Watch -- United States violates human rights worldwide / Vernon Coleman -- Rogue nations undermine the United Nations' mission to promote human rights / Joseph Loconte -- U.S. invasions have not spread democracy in the Middle East / Phyllis Bennis -- How should the global community respond to rogue nations? -- Preemptive force is sometimes necessary to contain rogue nations / National Review -- Preemptive force threatens efforts to contain rogue states / Ivan Eland -- Missile defense system is necessary to protect against rogue nations / Dennis Ross -- Missile defense system is unnecessary / Gwynne Dyer -- Promoting globalization will reduce the threat posed by rogue states / Banning N. Garrett, Dennis M. Sherman -- Globalization
Author: Louise Gerdes, book editor.
Library: Library of Islamic Parliament (Tehran)
Subject:

96. Includes bibliographical references and index. 0
Author: Seán Duffy, editor ; associate editors, Ailbhe MacShamhráin, James Moynes.
Library: Library of Islamic Parliament (Tehran)
Subject:

97. Includes bibliographical references (p. 49-51). 0,B
Author: Zeren Tanındı. ,/ Katie Normington.
Library: Library of Islamic Parliament (Tehran)
Subject:

98. Includes bibliographical references (p. 375) and index. 0
Author: Brian M. Fagan.
Library: Library of Islamic Parliament (Tehran)
Subject:

99. Includes bibliographical references (p. 225-231) and index. 0
Author: Andrew Green.
Library: Library of Islamic Parliament (Tehran)
Subject:

100. Information Security and Assurance
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data protection -- Congresses,Computer security -- Congresses,Computer networks -- Security measures -- Congresses,حفاظت دادهها -- کنگرهها,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
E-Book
,
