1. Adaptive cryptographic access control /
Author: Anne V.D.M. Kayem, Selim G. Akl, Patrick Martinches
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science,Computers-- Access control,Data encryption (Computer science),Database security
Classification :
QA76
.
9
.
A25
K39
2010eb
2. Advances in cryptology-- ASIACRYPT 2011 :
Author: edited by Dong Hoon Lee, Xiaoyun Wang
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
.
I58
2011
3. Advances in cryptology -- EUROCRYPT 2018 :
Author: Jesper Buus Nielsen, Vincent Rijmen (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Artificial intelligence.,Coding theory & cryptology.,Computer networks-- Security measures.,Computer security.,Computers-- Database Management-- Data Mining.,Computers-- Information Theory.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data mining.,Ethical & social aspects of IT.,Software Engineering.
Classification :
QA76
.
9
.
A25
4. Advances in sport science and computer science
Author: editor, Mark Zhou, Hong Kong Education Society, Hong Kong.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science -- Congresses.,Sports -- Data processing -- Congresses.,Sports sciences -- Congresses.
Classification :
GV713
.
E358
2014
5. Cryptology and network security :
Author: Srdjan Capkun, Sherman S.M. Chow (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Coding theory & cryptology.,Computer networks-- Security measures.,Computers-- Database Management-- Data Mining.,Computers-- Information Technology.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data mining.,Ethical & social aspects of IT.,Information retrieval.,Software Engineering.
Classification :
QA76
.
9
.
A25
6. Data privacy management and autonomous spontaneous security :
Author: Roberto Di Pietro [and others] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.
7. Emerging security algorithms and techniques /
Author: editors, Khaleel Ahmad, M.N. Doja, Nur Izura Udzir, Manu Pratap Singh.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Cryptography.,Data encryption (Computer science),Computer security.,COMPUTERS-- Computer Graphics-- Game Programming & Design.,COMPUTERS-- General.,COMPUTERS-- Security-- Cryptography.,COMPUTERS-- Security-- General.,Cryptography.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
E466
2019eb
8. Future data and security engineering :
Author: Tran Khanh Dang, Josef Küng, Roland Wagner, Nam Thoai, Makoto Takizawa (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Big data, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Internet of things, Congresses.,Artificial intelligence.,Big data.,Computer security.,Computer security.,Computers-- Database Management-- Data Mining.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Data encryption (Computer science),Data mining.,Information retrieval.,Internet of things.,Network hardware.
Classification :
QA76
.
9
.
A25
9. Intel® trusted execution technology for server platforms :
Author: William Futral, James Greene
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Client/server computing-- Security measures,Data encryption (Computer science),Database security.,Computer Science,Data Encryption,Database Management
Classification :
QA76
.
9
.
A25
10. Modern Big Data Processing with Hadoop :
Author: V Naresh Kumar, Prashant Shindgikar.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Apache Hadoop.,Apache Hadoop.,Electronic data processing-- Distributed processing.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,Computers-- Data Modeling & Design.,Computers-- Data Processing.,Computers-- Database Management-- Data Mining.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Data capture & analysis.,Data mining.,Database design & theory.,Electronic data processing-- Distributed processing.,Information architecture.
Classification :
QA76
.
9
.
D5
.
K863
2018eb
11. Policy-based autonomic data governance /
Author: Seraphin Calo, Elisa Bertino, Dinesh Verma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Autonomic computing.,Computer networks-- Security measures.,Computer security.,Autonomic computing.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25
P65
2019
12. Proceedings of The Ifip Tc 11 23rd International Information Security Conference :
Author: edited by Sushil Jajodia, Pierangela Samarati, Stelvio Cimato, Sushil Jajodia, Pierangela Samarati, Stelvio Cimato.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Computers -- Law and legislation.,Data protection.
13. Protecting Oracle Database 12c /
Author: Paul Wright
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Database management.,Database security.,Computer Science.,Data Encryption.,Database Management.
Classification :
QA76
.
9
.
D314
14. Recent trends in network security and applications :
Author: Natarajan Meghanathan ... [et al.] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,COMPUTERS -- Internet -- Security.,COMPUTERS -- Networking -- Security.
15. Secure data management : VLDB 2004 workshop, SDM 2004, Toronto, Canada, August 30, 2004 : proceedings
Author: Willem Jonker, Milan Petkovic )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Database security,Congresses ، Data encryption )Computer science(,Congresses ، Data protection,Congresses ، Computers -- Access control,Congresses ، Database management
Classification :
QA
76
.
L28
Vol
.
3178
16. Secure data management : second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005 : proceedings
Author: Willem Jonker, Milan Petkovic )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Database security,Congresses ، Data encryption )Computer science(,Congresses ، Data protection,Congresses ، Computers -- Access control,Congresses ، Database management
Classification :
QA
76
.
L28
Vol
.
3674
17. Securing SQL Server :
Author: Peter A. Carter
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: SQL server,Database security,Computer Science,Database Management,Systems and Data Security
Classification :
QA76
.
9
.
D314
18. Securing information and communications systems :
Author: Steven M. Furnell [and others], editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Chiffrement (Informatique),Infrastructure à clé publique (Sécurité informatique),Réseaux d'ordinateurs-- Sécurité-- Mesures.,Sécurité informatique.,Systèmes informatiques-- Sécurité-- Mesures.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
S37563
2008eb
19. Security and Persistence :
Author: edited by John Rosenberg, J. Leslie Keedy.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Software engineering.
20. Sicherheit in Netzen und Medienströmen :
Author: herausgegeben von Markus Schumacher, Ralf Steinmetz.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Data encryption (Computer science),Database management.
Classification :
QA76
.
9
.
D35
H473
2000