81. Designing privacy enhancing technologies : International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000 : proceedings
Author: Hannes Federrath )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computer networks -- Security measures
Classification :
QA
76
.
L28
Vol
.
2009
82. Detection of intrusions and malware, and vulnerability assessmen
Author: / Christian Kreibich, Marko Jahnke (Eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures, Congresses,Computer networks, Access control, Congresses,Electronic books
Classification :
TK5105
.
59
.
D56
2010
83. Detection of intrusions and malware, and vulnerability assessment :
Author: Thorsten Holz, Herbert Bos (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Computers-- Access control-- Evaluation, Congresses,Computers-- Access control, Congresses,Malware (Computer software), Congresses
Classification :
QA76
.
9
.
A25
84. Detection of intrusions and malware, and vulnerability assessment
Author: / Christian Kreibich, Marko Jahnke (Eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures, Congresses,Computer networks, Access control, Congresses
Classification :
TK5105
.
59
.
D56
2010
85. Detection of intrusions and malware, and vulnerability assessment
Author: Ulrich Flegel, Danilo Bruschi (eds.)
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computers, Access control, Congresses,Computers, Access control, Evaluation, Congresses,Computer networks, Security measures, Congresses,Computer security, Congresses,Malware (Computer software), Congresses,Eindringerkennung, Kongress, Como <2009>,Kryptoanalyse, Kongress, Como <2009>,Malware, Kongress, Como <2009>,Softwareschwachstelle, Kongress, Como <2009>,Zugriffskontrolle, Kongress, Como <2009>,Como (2009), swd,Kongress., swd,Eindringerkennung., swd,Kryptoanalyse., swd,Malware., swd,Softwareschwachstelle., swd,Zugriffskontrolle., swd
Classification :
QA
،
76
.
9
،.
A25
,
D563
،
2009
86. Detection of intrusions and malware, and vulnerability assessment
Author: / Klaus Julisch, Christopher Kruegel (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computers--Access control--Congresses,Computers--Access control--Evaluation--Congresses,Computer networks--Security measures--Congresses,Computer security--Congresses,Intrusions,Malware,Vulnerability assessment,DIMVA
Classification :
QA
,
76
.
9
,.
A25
,
D563
,
2005
87. E-business and telecommunication networks
Author:
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Telecommunication--Security measures--Congresses,Signal processing--Congresses,Wireless communication systems--Congresses,Electronic commerce--Congresses,Computer networks--Congresses
Classification :
TK
,
5105
.
5
,
157135
,
2008
{
1648
},
3c04493cc6fb2a631804f7
88. E-business and telecommunications:4th international conference, ICETE 2007, Barcelona, Spain, July 28-31, 2007, revised selected papers
Author: [edited by] Joaquim Filipe, Mohammad S. Obaidat
Library: Library of Faculty of Entrepreneurship University of Tehran (Tehran)
Subject: Computer networks -- Congresses,Electronic commerce -- Congresses,Telecommunication -- Security measures -- Congresses,Wireless communication systems -- Congresses,Signal processing -- Congresses
89. EC2ND 2005 :
Author: Andrew Blyth (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses
Classification :
TK5105
.
59
.
E97
2006
90. Engineering secure software and systems
Author: Gilles Barthe, Benjamin Livshits, Riccardo Scandariato (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Software engineering, Congresses
Classification :
QA76
.
9
.
A25
E54
2011eb
91. Financial cryptography: First International Conference, FC'97, Anguilla, British West Indies, Feb. 24-28, 1997: proceedings
Author: FC'79 )7991: Anguilla(
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Electronic funds transfers-- Security measures-- Congresses,، Internet )Computer network(-- Security measures-- Congresses,، Computer networks-- Security measures-- Congresses,، Data encryption )Computer science(-- Congresses
Classification :
HG
1710
.
F35
1997
92. Financial cryptography (Online)
Author: Rafael Hirschfeld (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Electronic funds transfers-- Security measures, Congresses.,Internet-- Security measures, Congresses.
93. Financial cryptography and data security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Congresses. ; Data encryption (Computer science) ; Congresses. ; Electronic commerce ; Security measures ; Congresses. ; Electronic funds transfers ; Security measures ; Congresses. ; Internet ; Security measures ;
94. Financial cryptography: 4th international conference, FC 2000, Anguilla, British West Indies, February 20-24, 2000: proceedings
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Electronic funds transfers-- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Electronic commerce-- Security measures,Congresses ، Internet-- Security measures,Congresses ، Computer networks-- Security measures
Classification :
HG
1710
.
F35
2000
95. Financial cryptography: 8th international conference, FC 2004, Key West, FL, USA, February 9-12, 2004 : revised papers
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Electronic funds transfers-- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Electronic commerce-- Security measures,Congresses ، Internet-- Security measures,Congresses ، Computer networks-- Security measures
Classification :
HG
1710
.
F35
2004
96. First IEEE International Workshop on Critical Infrastructure Protection: proceedings: IWCIP 2005, 3-4 November 2005, Darmstadt, Germany
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computer networks-- Security measures,Prevention ، Cyberterrorism,Congresses ، Emergency management
Classification :
QA
76
.
9
.
A25
.
I339
2005
97. Foundations of security analysis and design III
Author: / Alessandro Aldini, Roberto Gorrieri, Fabio Martinelli (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Computer networks--Security measures--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
F685
,
2005
98. Foundations of security analysis and design IV :
Author: Alessandro Aldini, Roberto Gorrieri (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.
99. Future Network Systems and Security
Author: \ [Edited by] Robin Doss, Selwyn Piramuthu and Wei Zhou
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer science,کامپیوتر,a03,a03,Computer networks -- Congresses.,Computer networks -- Security measures -- Congresses.,شبکههای کامپیوتری -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
TK
5105
.
5
.
F8
2015
E-Book
,
100. Future challenges in security and privacy for academia and industry : 26th IFIP TC 11 International Information Security Conference, SEC 2011, Lucerne, Switzerland, June 7-9, 2011 : Proceedings
Author: Jan Camenisch ]and others[ )eds.(
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computer networks - Security measures
Classification :
QA
76
.
9
.
A25
I45
2011