81. Modern Buddhist cultures -- The cultural practices of Buddhist modernity -- Shanghai Buddhism -- Vegetarian identities --
Author: Francesca Tarocco.
Library: Library of Islamic Parliament (Tehran)
Subject:
82. Non-repudiation in electronic commerce
Author: Zhou, Jianying
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Electronic commerce-- Computer network resources,، Business enterprises-- Computer networks-- Security measures,، Data encryption )Computer science(,، Internet-- Security measures
Classification :
HF
5548
.
32
.
Z49
2001
83. Public key infrastructure
Author: Suranjan Choudhury, Kartik Bhatnagar, and Wasim Haque
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Business enterprises, Computer networks, Security measures,Electronic commerce, Security measures,Computer networks, Security measures
Classification :
HD
،
30
.
38
،.
C46
،
2002
84. SEMPER--secure electronic marketplace for Europe
Author: Gerard Lacoste...]et al.[
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Security measures -- Europe ، Electronic commerce,Computer networks -- Security measures -- Europe ، Business enterprises,Security measures -- Europe ، Internet
Classification :
QA
76
.
L28
Vol
.
1854
86. Secure multi-party non-repudiation protocols and application
Author: / by Jos?� A. Onieva, Javier Lopez, Jianying Zhou
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Electronic commerce--Security measures,Business enterprises--Computer networks--Security measures
Classification :
QA
,
76
.
9
,.
A25
,
O55
,
2009eb
87. The E-Privacy imperative
Author: / Mark S. Merkow, James Breithaupt
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Electronic commerce,Electronic commerce- Security measures,Business enterprises- Computer networks- Security measures,Privacy, Right of
Classification :
HF5548
.
32
.
M47
2002
88. The E-Privacy imperative
Author: / Mark S. Merkow, James Breithaupt
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Electronic commerce,Electronic commerce- Security measures,Business enterprises- Computer networks- Security measures,Privacy, Right of
Classification :
HF5548
.
32
.
M47
2002
89. The E-Privacy imperative protect your customers' Internet privacy and ensure your company's survival in the electronic age
Author: Merkow, Mark S.,Mark S. Merkow, James Breithaupt
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Electronic commerce,، Electronic commerce- Security measures,، Business enterprises- Computer networks- Security measures,، Privacy, Right of
Classification :
HF
5548
.
32
.
M47
2002
90. Trust and new technologies marketing and management on the Internet and mobile media
Author: editors, Teemu Kautonen, Heikki Karjaluoto
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Electronic commerce , Security measures,، Internet marketing , Security measures,، Business enterprises , Computer networks , Security measures,، Electronic commerce , Management,، Consumentengedrag , gtt,، Vertrouwen. , gtt,، Internet. , gtt,، Draadloze communicatie. , gtt
Classification :
HF
5415
.
1265
T78
2008
91. Trust and privacy in digital business : First International Conference, TrustBus 2004, Zaragoza, Spain, August 30 - September 1, 2004 : proceedings
Author: Sokratis Katsikas, Javier Lopez, Guenther Pernul )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Public key infrastructure )Computer security(,Security measures -- Congresses ، Data transmission systems,Security measures -- Congresses ، Electronic commerce,Computer networks -- Security measures -- Congresses ، Business enterprises
Classification :
QA
76
.
L28
Vol
.
3184
92. Trust, privacy and security in digital busines
Author: / Steven Furnell, Sokratis K. Katsikas, Antonio Lioy (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Public key infrastructure (Computer security)--Congresses,Data transmission systems--Security measures--Congresses,Electronic commerce--Security measures--Congresses,Business enterprises--Computer networks--Security measures--Congresses,Computer security--Congresses
93. Trust, privacy and security in digital business
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Public key infrastructure (Computer security) ; Congresses. ; Data transmission systems ; Security measures ; Congresses. ; Electronic commerce ; Security measures ; Congresses. ; Business enterprises ; Computer networks ; Security measures ; Congresses.
94. Trust, privacy and security in digital business
Author: / Costas Lambrinoudakis, G?�nther Pernul, A Min Tjoa (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Public key infrastructure (Computer security)--Congresses,Data transmission systems--Security measures--Congresses,Electronic commerce--Security measures--Congresses,Business enterprises--Computer networks--Security measures--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
T74
,
2007
95. Trust, privacy, and security in digital business : second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005 : proceedings
Author: Sokratis Katsikas, Javier Lopez, Gunther Pernul )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Public key infrastructure )Computer security(,Security measures -- Congresses ، Data transmission systems,Security measures -- Congresses ، Electronic commerce,Computer networks -- Security measures -- Congresses ، Business enterprises
Classification :
QA
76
.
L28
Vol
.
3592
96. Trust, privacy, and security in digital business: second international conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005: proceedings
Author: / Sokratis Katsikas, Javier Lopez, Gunther Pernul (eds.)
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computer security,Public key infrastructure (Computer security),Data transmission systems - Security measures,Electronic commerce - Security measures,Business enterprises - Computer networks Security measures,-- Congresses,-- Congresses,-- Congresses,-- Congresses,-- Congresses
Classification :
005
.
8
I61T
2005