1. A Question of Chemistry
Author: John Garratt,Tina Overton ,Terry Threlfall
Library: Central Library and Document Center of Shahid Madani University of Azarbayjan (East Azarbaijan)
Subject: Computer security,Computer architecture
Classification :
QD
,
39
,.
G27Q8
,
1999


2. Advances in computers.
Author: edited by Marshall C. Yovits.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Computers.,Electronic data processing.,ARCHITECTURE (COMPUTERS),COMPUTER INFORMATION SECURITY.,COMPUTER NETWORKS.,Computer science.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Computers.,COMPUTERS.,DATA PROCESSING.,DESIGN ANALYSIS.,Electronic data processing.,MAN-COMPUTER INTERFACE.,PROTOCOL (COMPUTERS),U.S.S.R., 7
Classification :
QA76
.
A3eb
vol
.
29


3. Architecting secure software systems
Author: / Asoke K. Talukder, Manish Chaitanya
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security.,Computer architecture.,Computer networks--Security measures

4. Architecting secure software systems
Author: / Asoke K. Talukder, Manish Chaitanya
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer architecture.,Computer networks--Security measures
Classification :
QA
,
76
.
9
,.
A25
,
T34
,
2009


5. Architecting secure software systems
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Computer architecture. ; Computer networks ; Security measures. ; Computer architecture. ; fast ; (OCoLC)fst00872026 ; Computer networks ; Security measures. ; fast ; (OCoLC)fst00872341 ; Computer security. ; fast ; (OCoLC)fst00872484

6. Architecting secure software systems
Author: Talukder, Asoke K.,Asoke K. Talukder, Manish Chaitanya
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Computer security,، Computer architecture,، Computer network
Classification :
QA
76
.
9
.
A25
T34
2009


7. CORBA security: an introduction to safe computing with objects
Author: Blakley, Bob.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,، CORBA )Computer architecture(,، Object-oriented methods )Computer science(
Classification :
QA
76
.
9
.
A25
B58
2000


8. CORBA security : an introduction to safe computing with objects
Author: Blakley, Bob, 0691-
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، CORBA )Computer architecture(,، Object-oriented methods )Computer science(
Classification :
QA
76
.
9
.
A25B53


9. Computer architecture and security :
Author: Shuangbao (Paul) Wang, Robert S. Ledley
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer architecture,Computer security,System design
Classification :
QA76
.
9
.
A73
W36
2013


10. Developing secure distributed systems with CORBA /
Author: Ulrich Lang, Rudolf Schreiner
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,CORBA (Computer architecture),Distributed operating systems (Computers)
Classification :
QA76
.
9
.
A73
L36
2002


11. Disruptive security technologies with mobile code and peer-to-peer networks
Author: / R.R. Brooks
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Peer-to-peer architecture (Computer networks),Computer networks--Security measures,Computer viruses.
Classification :
TK5105
.
525
.
B76
2005


12. Enterprise security
Author: Aaron Woody
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing,Computer architecture,Computer security
Classification :
TK5103
.
4885
.
W384
2013


13. Enterprise security architecture :
Author: John Sherwood, Andrew Clark, David Lynas
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing,Computer architecture,Computer security
Classification :
QA76
.
9
.
A25


14. Enterprise security with EJB and CORBA
Author: Hartman, Bret.,Bret Hartman, Donald Flinn, Konstantin Beznosov
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، JavaBeans,، Electronic commerce , Security measures,، Business enterprises , Computer networks , Security measures,، Java )Computer program language(,، CORBA )Computer architecture(,، Electronic books. , local
Classification :
HF
5548
.
32
.
H372
2001eb


15. Information security architecture :
Author: Jan Killmeyer Tudor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer architecture.,Computer security.,Computer architecture.,COMPUTER INFORMATION SECURITY.,COMPUTER NETWORKS.,COMPUTER PROGRAM INTEGRITY.,Computer security.,COMPUTER VIRUSES.,COMPUTERS.,Computersicherheit,OPERATING SYSTEMS (COMPUTERS)
Classification :
QA76
.
9
.
A25
T83
2001


16. Information security architecture
Author: / Jan Killmeyer,Tudor
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computer security,Computer architecture
Classification :
QA
76
.
9
.
A25T83


17. Information security architecture
پدیدآورنده : Jan Killmeyer Tudor
موضوع : Computer security,Computer architecture
۲ نسخه از این کتاب در ۲ کتابخانه موجود است.
18. Information security architecture: an integrated approach to security in the organization
Author: Tudor, Jan Killmeyer
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Computer security,، Computer architecture
Classification :
QA
76
.
9
.
A25
T83
2006


19. Internet of Things for architects :
Author: Perry Lea.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Architecture-- Technological innovations.,Computer architecture.,Computer network architectures-- Security measures.,Internet of things.,Architecture-- Technological innovations.,Cloud computing.,Computer architecture & logic design.,Computer architecture.,Computer networking & communications.,COMPUTERS / Computer Literacy.,COMPUTERS / Computer Science.,COMPUTERS / Data Processing.,COMPUTERS / Hardware / General.,COMPUTERS / Information Technology.,COMPUTERS / Machine Theory.,COMPUTERS / Reference.,Internet of things.
Classification :
TK5105
.
8857


20. Official (ISC)² guide to the ISSAP CBK /
Author: edited by Harold F. Tipton.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer architecture-- Examinations, Study guides.,Computer networks-- Examinations, Study guides.,Computer security-- Examinations, Study guides.,Electronic data processing personnel-- Certification.
