1. Advances in information and computer security :
Author: Tetsu Iwata, Masakatsu Nishigaki (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses,Computer security-- Congresses,Electronic information resources-- Access control-- Congresses
Classification :
QA76
.
9
.
A25
I58
2011


2. Advances in information and computer security
Author: / Isao Echizen, Noboru Kunihiro, Ryoichi Sasaki (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security, Congresses,Computer networks, Access control, Congresses,Computer networks, Security measures, Congresses
Classification :
QA76
.
9
.
A25I58
2010


3. Advances in security technology
Author: Haeng-kon Kim, Tai-hoon Kim, Akingbehin Kiumi (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses,Internet-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
S438
2008eb


4. Botnet detection
Author: edited by Wenke Lee, Cliff Wang and David Dagon.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses.,Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data protection, Congresses.

5. Communications and multimedia security. volume 3, IFIP Joint TC6/TC11 Working Conference on Communications and Multimedia Security, 22-23 Sept. 1997, Athens, Greece
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Computer security,Congresses ، Telecommunication-- Security measures,Congresses ، Multimedia systems-- Security measures,Congresses ، Computer networks-- Security measures,Congresses ، Telecommunication-- Access control,Congresses ، Multimedia systems-- Access control,Congresses ، Computer networks-- Access control
Classification :
QA
76
.
9
.
A25
.
I455
1997


6. Computer network security
Author: / Igor Kotenko, Victor Skormin (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures, Congresses,Computer networks, Access control, Congresses
Classification :
QA76
.
9
.
A25I58
2010


7. Cryptology and network security
Author: Juan A. Garay, Atsuko Miyaji, Akira Otsuka (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I5534
2009eb


8. Detection of intrusions and malware, and vulnerability assessmen
Author: / Christian Kreibich, Marko Jahnke (Eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures, Congresses,Computer networks, Access control, Congresses,Electronic books
Classification :
TK5105
.
59
.
D56
2010


9. Detection of intrusions and malware, and vulnerability assessment :
Author: Thorsten Holz, Herbert Bos (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Computers-- Access control-- Evaluation, Congresses,Computers-- Access control, Congresses,Malware (Computer software), Congresses
Classification :
QA76
.
9
.
A25


10. Detection of intrusions and malware, and vulnerability assessment
Author: / Christian Kreibich, Marko Jahnke (Eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures, Congresses,Computer networks, Access control, Congresses
Classification :
TK5105
.
59
.
D56
2010


11. Detection of intrusions and malware, and vulnerability assessment
Author: Ulrich Flegel, Danilo Bruschi (eds.)
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computers, Access control, Congresses,Computers, Access control, Evaluation, Congresses,Computer networks, Security measures, Congresses,Computer security, Congresses,Malware (Computer software), Congresses,Eindringerkennung, Kongress, Como <2009>,Kryptoanalyse, Kongress, Como <2009>,Malware, Kongress, Como <2009>,Softwareschwachstelle, Kongress, Como <2009>,Zugriffskontrolle, Kongress, Como <2009>,Como (2009), swd,Kongress., swd,Eindringerkennung., swd,Kryptoanalyse., swd,Malware., swd,Softwareschwachstelle., swd,Zugriffskontrolle., swd
Classification :
QA
،
76
.
9
،.
A25
,
D563
،
2009


12. Detection of intrusions and malware, and vulnerability assessment
Author: / Klaus Julisch, Christopher Kruegel (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computers--Access control--Congresses,Computers--Access control--Evaluation--Congresses,Computer networks--Security measures--Congresses,Computer security--Congresses,Intrusions,Malware,Vulnerability assessment,DIMVA
Classification :
QA
,
76
.
9
,.
A25
,
D563
,
2005


13. Future of trust in computing
Author: David Gawrock... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
F888
2008eb


14. Global security, safety, and sustainability
Author: Hamid Jahankhani, Ali G. Hessami, Feng Hsu (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses,Data protection, Congresses,Internet-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
I344
2009eb


15. Information security and privacy :
Author: Julian Jang-Jaccard, Fuchun Guo (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computers-- Access control, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
A279
2019eb


16. Policies and research in identity management :
Author: Simone Fischer-Hübner, Elisabeth de Leeuw, Chris Mitchell (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Access control -- Congresses.,Computer networks -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
S566
2013


17. Security and trust management :
Author: Rafael Accorsi, Silvio Ranise (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses
Classification :
QA76
.
9
.
A25
S76
2013


18. Security in computing and communications :
Author: Sabu M. Thampi, Pradeep K. Atrey, Chun-I Fan, Gregorio Martinez Perez (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computers-- Access control, Congresses
Classification :
TK5105
.
59
.
S73
2013


19. Security technology
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ; Computer networks ; Access control ; Congresses. ; Computer networks ; Security measures ; Congresses. ;

20. Security technology
Author: / Dominik aSl?ezak ... [et al.] (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Computer networks--Access control--Congresses,Computer networks--Security measures--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
S374
,
2009

