521. The design of Rijndael: AES--the Advanced Encryption Standard
Author: Daemen, Joan
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Passwords ، Computer security,، Data encryption )Computer science(
Classification :
QA
76
.
9
.
A25
D32
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
522. The hacker and the state :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Cyber intelligence (Computer security) ; Hacking ; Political aspects. ; Cyberterrorism. ; Cyberspace operations (Military science) ; Cyberspace ; Political aspects. ;
![](/design/images/bookmore.png)
523. The truth machine :the blockchain and the future of everything
Author: Casey, Michael
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Electronic funds transfers,، Blockchains )Databases(,، Bitcoin,، Data encryption )Computer science(,، Database security
Classification :
HG
1710
.
C373
2018
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
524. Theoretical Computer Science and Discrete Mathematics
Author: \ [Edited by] S. Arumugam...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer science,کامپیوتر,a03,a03,Computer security.,کامپیوترها -- ایمنی اطلاعات
Classification :
E-Book
,
![](/design/images/bookmore.png)
525. Theory of Cryptography :
Author: Amos Beimel, Stefan Dziembowski (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses.,Business & Economics-- Information Management.,Computer security.,Computers-- Hardware-- Network Hardware.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Data encryption (Computer science),Data encryption.,Ethical & social aspects of IT.,Information architecture.,Law-- Science & Technology.,Legal aspects of IT.,Network hardware.
Classification :
QA76
.
9
.
A25
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
526. Theory of Cryptography.
Author: \ Eyal Kushilevitz , Tal Malkin (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer security -- Congresses.,رمزگذاری دادهها -- کنگرهها ,کامپیوترها -- ایمنی اطلاعات -- کنگرهها
Classification :
TK
5102
.
94
.
T46
2016
E-Book
,
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
527. Theory of Cryptography
Author: \ Eyal Kushilevitz , Tal Malkin (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science),رمزگذاری دادهها -- کنگرهها ,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,رمزگذاری دادهها
Classification :
QA
76
.
9
.
T46
2016
E-Book
,
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
528. Theory of quantum computation, communication and cryptography
Author: Andrew Childs, Michele Mosca (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography, Congresses,Data encryption (Computer science), Congresses,Quantum communication-- Security measures, Congresses,Quantum computers, Congresses
Classification :
QA76
.
889
.
T63
2009
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
529. Theory of security and applications
Author: Sebastian Mödersheim, Catuscia Palamidessi (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
J65
2012eb
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
530. Topics in Cryptology – CT-RSA 2016
Author: \ Kazue Sako (Ed.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Data protection -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها ,حفاظت اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
QA
76
.
9
.
T6
2016
E-Book
,
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
531. Transactions on Computational Science XXVI
Author: \ [edited by] Marina L. Gavrilova...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer science,Artificial intelligence,کامپیوتر,هوش مصنوعی,a03,a04,a03,a04,Computer security.,کامپیوترها -- ایمنی اطلاعات
Classification :
QA
76
.
T7
2016
E-Book
,
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
532. Transactions on Data Hiding and Multimedia Security X
Author: \ Yun Q. Shi (Ed.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science),رمزگذاری دادهها,a03,a03,Multimedia systems -- Security measures.,سامانههای چندرسانهای -- تدابیر ایمنی
Classification :
QA
76
.
9
.
T7
2015
E-Book
,
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
533. Transactions on Large-Scale Data- and Knowledge- Centered Systems XXIII
Author: \ Abdelkader Hameurlain, ... [et al.] (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,Data encryption (Computer science),Computer networks,کامپیوترها,رمزگذاری دادهها,شبکههای کامپیوتری, -- Congresses, -- Congresses, -- Congresses, -- کنگرهها, -- کنگرهها, -- کنگرهها, -- Security measures, -- ایمنی اطلاعات, -- اقدامات تامینی,a03,a05,a07,a03,a05,a07
Classification :
QA
76
.
9
.
D3T7
2016
E-Book
,
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
534. Transactions on computational science XVIII
Author: Marina L. Gavrilova, C.J. Kenneth Tan, Arjan Kuijper (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer science,Sensor networks
Classification :
QA76
.
T73
2013
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
535. Transactions on data hiding and multimedia security VI /
Author: Yun Q. Shi [and others] (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Data protection,Multimedia systems-- Security measures,Algorithm Analysis and Problem Complexity,Computer Science,Computers and Society,Data Encryption,Pattern Recognition,Systems and Data Security
Classification :
QA76
.
9
.
A25
T73
2011
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
536. Trust and Trustworthy Computing
Author: \ Mauro Conti, Matthias Schunter, Ioannis Askoxylakis (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science),Computer security,رمزگذاری دادهها,کامپیوترها, -- Congresses, -- کنگرهها, -- ایمنی اطلاعات,a03,a05,a03,a05,Computers and Society,کامپیوترها و جامعه
Classification :
QA
76
.
9
.
A25
T79
2015
E-Book
,
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
537. Trust and trustworthy computing
Author: Stefan Katzenbeisser ... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
T78
2012eb
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
538. Trust management VII :
Author: Carmen Fernández-Gago [and others] (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
C376
2013
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
539. Trusted Systems
Author: \ Moti Yung, Liehuang Zhu, Yanjiang Yang (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,Computer networks,Data encryption (Computer science),کامپیوترها,شبکههای کامپیوتری,رمزگذاری دادهها, -- Congresses, -- Congresses, -- Congresses, -- کنگرهها, -- کنگرهها, -- کنگرهها, -- Security measures, -- ایمنی اطلاعات, -- اقدامات تامینی,a03,a05,a07,a03,a05,a07
Classification :
QA
76
.
9
.
A25
I58
2015
E-Book
,
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
540. Trusted computing--challenges and application
Author: / Peter Lipp, Ahmad-Reza Sadeghi, Klaus-Michael Koch (Eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Data encryption (Computer science)--Congresses,Public key infrastructure (Computer security)--Congresses
![](/design/images/bookmore.png)