21. Computer security - ESORICS 2012
Author: Sara Foresti, Moti Yung, Fabio Martinelli (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
E98
2012eb


22. Critical information infrastructure security :
Author: Sandro Bologna, Bernhard Hämmerli, Dimitris Gritzalis, Stephen Wolthusen (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
C75
2011


23. Critical information infrastructures security :
Author: Eric Luiijf, Inga Žutautaitė, Bernhard M. Hämmerli (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
C75
2018eb


24. Critical information infrastructures security :
Author: Christos Xenakis, Stephen Wolthusen (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
C75
2010


25. Critical infrastructure protection
Author: / Javier Lopez, Roberto Setola, Stephen D. Wolthusen (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks--Security measures,Information networks--Security measures,Data encryption (Computer science),Data structures (Computer science),Information technology--Security measures
Classification :
TK5105
.
59
.
C725
2012


26. Critical infrastructure protection
Author: Javier Lopez, Roberto Setola, Stephen D. Wolthusen (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Data encryption (Computer science),Data structures (Computer science),Information networks-- Security measures,Information technology-- Security measures
Classification :
TK5105
.
59
.
C725
2012eb


27. Cryptanalytic attacks on RSA
Author: Yan, Song Y.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Data encryption )Computer science(,Security measures ، Computer networks,، Cryptography
Classification :
QA
76
.
9
.
A25
Y34


28. Cryptanalytic attacks on RSA
Author: / Song Y. Yan
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Data encryption (Computer science),Computer networks--Security measures,Cryptography.
Classification :
QA
,
76
.
9
,.
A25
,
Y34
,
2007


29. Cryptography and Network Security
Author: \ William Stallings.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks -- Security measures.,Data encryption (Computer science),Coding theory.,Computer security.,شبکههای کامپیوتری -- تدابیر ایمنی,رمزگذاری دادهها ,نظریه رمزگذاری
Classification :
TK5105
.
59
.
S71C7
2011


30. Cryptography and Network Security: princilpes and Practice
Author: William Stallings
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computer networks -- security measures,Data encryption (computer science),Coding theory,Computer security
Classification :
TK
،
5105
.
59
،.
S713
،
2006


31. Cryptography and network security
Author: Forouzan, Behrouz A.
Library: (Semnan)
Subject: Security measures ، Computer networks,، Data encryption )Computer science(,، Coding theory,، Computer security
Classification :
TK
5105
.
59
.
F67
2008


32. Cryptography and network security
Author: / William Stallings
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks--Security measures,Data encryption (Computer science),Coding theory,Computer security
Classification :
TK5105
.
59
.
S713
2014


33. Cryptography and network security :
Author: / William Stallings
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Data encryption (Computer science),Coding theory,Computer security
Classification :
E-BOOK

34. Cryptography and network security
Author: / William Stallings
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks - Security measures,Data encryption (Computer science),Coding theory,Computer security
Classification :
TK5105
.
59
.
S713
2006


35. Cryptography and network security
Author: / William Stallings
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Computer networks -- Security measures,Data encryption (Computer science),Coding theory,Computer security
Classification :
TK
5105
.
59
.
S713
2011


36. Cryptography and network security
Author: / William Stallings
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks- Security measures,Data encryption (Computer science),Coding theory,Computer security
Classification :
TK5105
.
59
.
S713
2006


37. Cryptography and network security
Author: / Behrouz A Forouzan
Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)
Subject: Computer networks -- Security measures,Data encryption (Computer science),Coding theory
Classification :
TK5105
.
59
.
F66
2008


38. Cryptography and network security
Author: / William Stallings
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Computer networks--Security measures,Data encryption (Computer science),Coding theory,Computer security
Classification :
TK5105
.
59
.
S713
2006


39. Cryptography and network security
Author: / William Stallings
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Data encryption (Computer science),Coding theory.,Computer security.
Classification :
TK
,
5105
.
59
,.
S713
,
2006


40. Cryptography and network security
Author: / William Stalling
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Computer networks -- Security measures,Data encryption (Computer science),Coding theory,Computer security
Classification :
TK
5105
.
59
.
S713
2003

