1. Fundamentals of performance evaluation of computer and telecommunications systems
Author: / Mohammad S. Obaidat, Noureddine A. Boudriga
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer systems, Evaluation,Computer systems, Simulation methods,Telecommunication systems, Evaluation,Telecommunication systems, Simulation methods
Classification :
QA76
.
9
.
E94O23
2010


2. Fundamentals of performance evaluation of computer and telecommunications systems
Author: / Mohammad S. Obaidat, Noureddine A. Boudriga
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer systems, Evaluation,Computer systems, Simulation methods,Telecommunication systems, Evaluation,Telecommunication systems, Simulation metods
Classification :
QA76
.
9
.
E94O23
2009


3. Security of e-systems and computer networks
Author: / Mohammad Obaidat, Noureddine Boudriga.,ابایدات,Obaidat
Library: National Library and Archives of Islamic Republic of Iran (Tehran)
Subject: شبکههای کامپیوتری, -- تدابیر ایمنی
Classification :
TK
۵۱۰۵
/
۵۹
/
الف
۲
س
۸ ۱۳۸۶

4. Security of e-systems and computer networks
Author: Obaidat, Mohammad Salameh, 2591-
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures
Classification :
TK
5105
.
59
.
O23S4


5. Security of mobile communications
Author: Noureddine Boudriga
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Mobile communication systems -- Security measures,Wireless communication systems -- Security measures,Mobile computing -- Security measures
Classification :
TK
،
5102
.
85
،.
B68
،
2010


6. Security of mobile communications
Author: / Noureddine Boudriga
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Mobile communication systems--Security measures,Wireless communication systems--Security measures,Mobile computing--Security measures
Classification :
TK5102
.
85
.
B68
2010


7. Ubiquitous networking :
Author: Noureddine Boudriga, Mohamed-Slim Alouini, Slim Rekhis, Essaid Sabir, Sofie Pollin (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks, Congresses.,Ubiquitous computing, Congresses.,Computer networks.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Information retrieval.,Network hardware.,Ubiquitous computing.
Classification :
QA76
.
5915

