1. Beginning Blockchain :
Author: Bikramaditya Singhal, Gautam Dhameja, Priyansu Sekhar Panda.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Blockchains (Databases),Blockchains (Databases),COMPUTERS-- Databases-- General.,Databases.,Information technology: general issues.
Classification :
QA76
.
9
.
D32
2. Computer security and cryptography
Author: Alan G. Konheim
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Ciphers,Computer security,Cryptography,Cryptography-- History,Data encryption (Computer science)
Classification :
Z103
.
A2
K638
2007
3. Cryptographic Boolean functions and applications
Author: Cusick, Thomas W.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Algebra, Boolean,، Cryptography,، Data encryption )Computer science(,، Computer algorithms,، Electronic books
Classification :
QA
10
.
3
.
C87
4. Cryptography and secure communication
Author: Blahut, Richard E.
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: ، Data encryption )Computer science(,، Cryptography,Security measures ، Telecommunication
Classification :
QA
76
.
9
.
A25
.
B569
5. Decrypted Secrets :
Author: by Friedrich L. Bauer.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory.,Computer science.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
B947
2000
6. EUROCRYPT'85 :
Author: by Franz Pichler.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject:
7. Encyclopedia of Computer Science and Technology /
Author: edited by Phillip A. Laplante.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Information technology, Encyclopedias.,Computation.,Networks.,Software Engineering & Systems Development.,Information technology.
Classification :
T58
.
5
.
E53
2017
8. Information technology network and internet :
Author: C.T. Bhunia.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Information technology.,Internet.,Computer networks.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Information technology.,Internet.
Classification :
T58
.
5
.
I54
2008eb
9. Introduction to computer and network security :
Author: Richard R. Brooks, Clemson University, South Carolina, USA
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Data encryption (Computer science),Data protection
Classification :
QA76
.
9
.
A25
B7745
2014
10. Locally decodable codes and private information retrieval schemes /
Author: Sergey Yekhanin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Information retrieval.,COMPUTERS-- Security-- Cryptography.,Data encryption (Computer science),Fehlerkorrekturcode,Information Retrieval,Information retrieval.,Informatique.,Kryptologie,Privatsphäre,Sicherheitsprotokoll
Classification :
QA76
.
9
.
A25
Y45
2010eb
11. Passwords :
Author: Brian Lennon.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computers-- Access control-- Passwords.,Cryptography.,Data encryption (Computer science),Electronic surveillance.,Philology.,54.62 machine readable data.,54.62 machine readable data.,Computers-- Access control-- Passwords.,Cryptography.,Data encryption (Computer science),Digital Humanities,Electronic surveillance.,Kryptologie,Passwort,Philologie,Philology.,Textverarbeitung
Classification :
QA76
.
9
.
A25
L485
2018
12. Secret history :
Author: Craig P. Bauer, York College of Pennsylvania and National Security Agency, Center for Cryptologic History, 2011-2012 Scholar-in-Residence
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Ciphers,Computer security,Cryptography-- History,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
B384
2013
13. The code book
Author: / Simon Singh
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Cryptography- History,Data encryption (Computer science)- History
Classification :
Z103
.
S56
1999
14. The mathematics of encryption :
Author: Margaret Cozzens, Steven J. Miller.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory, Textbooks.,Cryptography-- History, Textbooks.,Cryptography-- Mathematics, Textbooks.,Cryptography, Textbooks.,Data encryption (Computer science), Textbooks.
Classification :
QA268
.
C697
2013
15. The mathematics of encryption : an elementary introduction
Author: Cozzens, Margaret B.
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Textbooks ، Coding theory,Textbooks ، Cryptography,Mathematics -- Textbooks ، Cryptography,History -- Textbooks ، Cryptography,Textbooks ، Data encryption )Computer science(
Classification :
QA
268
.
C69M3