61. Cryptography and network security: principles and practice
Author: Stallings, William
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Security measures ، Computer networks,، Data encryption )Computer science(,، Coding theory,، Computer security
Classification :
TK
5105
.
59
.
S713
2005
62. Cryptography and network security : principles and practice
Author: Stallings, William, 5491-
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,، Data encryption )Computer science(,، Coding theory,، Computer security
Classification :
TK
5105
.
59
.
S82C7
2011
63. Cryptography and network security: principles and practice
Author: Stallings, William
Library: (Semnan)
Subject: Security measures ، Computer networks,، Data encryption )Computer science(,، Coding theory,، Computer security
Classification :
TK
5105
.
59
.
S7C7
64. Cryptography and network security: principles and practice [electronic resource]
Author: / William Stallings
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Computer networks--Security measures,Data encryption (Computer science),Coding theory,Computer security
Classification :
EB
,
TK5105
.
59
.
S713
1999
65. Cryptology and network security :
Author: Jan Camenisch, Panos Papadimitratos (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer Communication Networks.,Computers and Society.,Cryptology.,Information Systems and Communication Service.,Software Engineering/Programming and Operating Systems.,Computer networking & communications.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- Online Services-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Ethical & social aspects of IT.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25
66. Cryptology and network security :
Author: Srdjan Capkun, Sherman S.M. Chow (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Coding theory & cryptology.,Computer networks-- Security measures.,Computers-- Database Management-- Data Mining.,Computers-- Information Technology.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data mining.,Ethical & social aspects of IT.,Information retrieval.,Software Engineering.
Classification :
QA76
.
9
.
A25
67. Data privacy management and autonomous spontaneous security :
Author: Roberto Di Pietro [and others] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.
68. Data privacy management and autonomous spontaneus [sic] security
Author: Joaquin Garcia-Alfaro ... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A97
D76
2011eb
69. Engineering secure software and systems
Author: Gilles Barthe, Benjamin Livshits, Riccardo Scandariato (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Software engineering, Congresses
Classification :
QA76
.
9
.
A25
E54
2011eb
70. Engineering secure two-party computation protocols
Author: Thomas Schneider
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols,Computer networks-- Security measures,Data encryption (Computer science)
Classification :
TK5105
.
55
.
S36
2012eb
71. Financial cryptography: First International Conference, FC'97, Anguilla, British West Indies, Feb. 24-28, 1997: proceedings
Author: FC'79 )7991: Anguilla(
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Electronic funds transfers-- Security measures-- Congresses,، Internet )Computer network(-- Security measures-- Congresses,، Computer networks-- Security measures-- Congresses,، Data encryption )Computer science(-- Congresses
Classification :
HG
1710
.
F35
1997
72. Financial cryptography (Online)
Author: Rafael Hirschfeld (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Electronic funds transfers-- Security measures, Congresses.,Internet-- Security measures, Congresses.
73. Financial cryptography and data security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Congresses. ; Data encryption (Computer science) ; Congresses. ; Electronic commerce ; Security measures ; Congresses. ; Electronic funds transfers ; Security measures ; Congresses. ; Internet ; Security measures ;
74. Financial cryptography: 4th international conference, FC 2000, Anguilla, British West Indies, February 20-24, 2000: proceedings
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Electronic funds transfers-- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Electronic commerce-- Security measures,Congresses ، Internet-- Security measures,Congresses ، Computer networks-- Security measures
Classification :
HG
1710
.
F35
2000
75. Financial cryptography: 8th international conference, FC 2004, Key West, FL, USA, February 9-12, 2004 : revised papers
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Electronic funds transfers-- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Electronic commerce-- Security measures,Congresses ، Internet-- Security measures,Congresses ، Computer networks-- Security measures
Classification :
HG
1710
.
F35
2004
76. Hacking point of sale
Author: Slava Gomzin
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures,Data encryption (Computer science),Electronic funds transfers-- Security measures,Point-of-sale systems
Classification :
HD30
.
38
.
G66
2014
77. Implementing SSH
Author: Himanshu Dwivedi
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: UNIX Shells,Computer networks- Security measures,Data encryption (Computer science)
Classification :
QA
,
76
.
76
,.
O63
,
D895
,
2004
78. Implementing SSH
Author: / Himanshu Dwivedi
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: UNIX Shells,Computer networks- Security measures,Data encryption (Computer science)
Classification :
QA76
.
76
.
O63
,
D895
2004
79. Implementing SSL/TLS using cryptography and PKI /
Author: Joshua Davies.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Data encryption (Computer science)
Classification :
TK5105
.
59
.
D39
2011
80. Information Security Practice and Experience
Author: \ Javier Lopez , Yongdong Wu (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses.,Computer networks -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
QA
76
.
9
.
A25I5
2015
E-Book
,