1. A cryptography primer :
Author: Philip N. Klein, Brown University, Providence, Rhode Island
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Data encryption (Computer science),Digital signatures,Telecommunication-- Safety measures
Classification :
QA76
.
9
.
A25
K557
2014


2. A multidisciplinary introduction to information security /
Author: [edited by] Stig F. Mjølsnes
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Multidisciplinary design optimization
Classification :
QA76
.
9
.
A25
M845
2012


3. Applied Cryptography and Network Security
Author: \ [Edited by] Steven M. Bellovin...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Telecommunication -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.,مخابرات -- تدابیر ایمنی -- کنگره ها,رمزگذاری دادهها -- کنگرهها
Classification :
E-Book
,

4. Applied Cryptography and Network Security
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Telecommunication -- Security measures -- Congresses,Data encryption (Computer science) -- Congresses,Cryptography -- Congresses,مخابرات -- تدابیر ایمنی -- کنگرهها,رمزگذاری دادهها -- کنگرهها,رمزنگاری -- کنگرهها
Classification :
E-Book
,

5. Applied Cryptography and Network Security
Author: \ [Edited by] Michel Abdalla...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Telecommunication -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.,مخابرات -- تدابیر ایمنی -- کنگره ها,رمزگذاری دادهها -- کنگرهها
Classification :
E-Book
,

6. Applied Cryptography and Network Security
Author: \ Jianying Zhou, Moti Yung, Feng Bao (eds.).
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Telecommunication -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses,مخابرات -- تدابیر ایمنی -- کنگره ها,رمزگذاری دادهها -- کنگرهها
Classification :
E-Book
,

7. Applied Cryptography and Network Security
Author: \ Markus Jakobsson, Moti Yung, Jianying Zhou (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Telecommunication -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.,مخابرات -- تدابیر ایمنی -- کنگره ها,رمزگذاری دادهها -- کنگرهها
Classification :
E-Book
,

8. Applied cryptography
Author: / Bruce Schneier
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Telecommunication--Security measures,Cryptography.,Cryptology
Classification :
QA
,
76
.
9
,.
A25
,
S35
,
1996


9. Applied cryptography
Author: / Bruce Schneier
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Telecommunication- Security measures,Cryptography
Classification :
QA76
.
9
.
A25
,
S35
1994


10. Applied cryptography and network security
Author: \ Jianying Zhou, Moti Yung, Yongfei Han, (eds.).
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: مخابرات--اقدامات تامینی -- کنگره ها,Telecommunication -- Security measures -- Congresses.
Classification :
TK5102
.
94
.
A28
2003
E-book
,


11. Applied cryptography and network security
Author: \ Jonathan Katz, Moti Yung (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Telecommunication-- Security measures-- Congresses.,Data encryption (Computer science)-- Congresses.,Cryptography-- Congresses.,مخابرات -- تدابیر ایمنی -- کنگره ها,رمزگذاری دادهها -- کنگرهها
Classification :
TK5102
.
94
.
A28
2007
E-Book
,


12. Applied cryptography and network security
Author: / Markus Jakobsson , Moti Yung , Jianying Zhou (eds.)
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Telecommunication -- Security measures -- congresses,Data encription (Computer science),Criptography -- congresses
Classification :
TK
5102
.
94
.
A28
2004


13. Applied cryptography and network security : Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004 : proceedings
Author: Markus Jakobsson, Moti Yung, Jianying Zhou )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
3089


14. Applied cryptography and network security : Third International Conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings
Author: John Ioannidis, Angelos Keromytis, Moti Yung )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
3531


15. Applied cryptography and network security : first International Conference, ACNS 2003, Kunming, China, October 16-19, 2003 : proceedings
Author: Jianying Zhou, Moti Yung, Yongfei Han, )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
2846


16. Applied cryptography and network security: 6th international conference, ACNS 2008, New York, NY, USA, June 3-6, 2008 : proceedings
Author: Steven M. Bellovin ... ]et al.[ )eds.(
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Congresses ، Telecommunication - Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
TK
5102
.
94
.
A28


17. Applied cryptography and network security : third international conference, ACNS 2005, New York, NY, USA, June 7-10, 2005 : proceedings
Author: John Ioannidis, Angelos Keromytis, Moti Yung )eds.(
Library: Library of College of Science University of Tehran (Tehran)
Subject: Congresses ، Telecommunication -- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Cryptography
Classification :
TK
5102
.
85
.
A26
2005


18. Applied cryptography : protocols, algorithms, and source code in C
پدیدآورنده : Schneier, Bruce
موضوع : ، Computer security,، Telecommunication-- Security measures,، Cryptography
۲ نسخه از این کتاب در ۱ کتابخانه موجود است.
19. Applied cryptography : protocols, algorithms, and source code in C
Author: Schneier, Bruce
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer security, Telecommunication - Security measures, Cryptography
Classification :
QA
76
.
9
.
A25
S35
1996


20. Applied cryptography: protocols, algorithms, and source code in C
Author: Schneier, Bruce
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Computer security,Security measures ، Telecommunication,، Cryptography
Classification :
QA
76
.
9
.
A25
S35
1996

