61. Secure multi-party non-repudiation protocols and application
Author: / by Jos?� A. Onieva, Javier Lopez, Jianying Zhou
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Electronic commerce--Security measures,Business enterprises--Computer networks--Security measures
Classification :
QA
,
76
.
9
,.
A25
,
O55
,
2009eb
62. Secure transaction protocol analysi
Author: / Qingfeng Chen, Chengqi Zhang, Shichao Zhang
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Electronic commerce--Security measures,Computer network protocols.
63. Secure transaction protocol analysis
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ; Electronic commerce ; Security measures. ; Computer network protocols. ;
64. Securing E-Business applications and communications
پدیدآورنده : Held, Jonathan S.
موضوع : ، Computer security,، Electronic commerce-- Security measures,، Computer networks-- Security measures
۲ نسخه از این کتاب در ۲ کتابخانه موجود است.
65. Securing E-Business applications and communications
Author: Held, Jonathan S.
Library: Central library and information center (Khorasan Razavi)
Subject: ، Computer security,Security measures ، Electronic commerce,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
H435
2001
66. Securing E-business applications and communications
Author: Held, Jonathan S.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,Security measures ، Electronic commerce,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
H435
2001
67. Selling online with ... first virtual holdings, INC
Author: Loshin, Pete
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، First Virtual )Computer system(,، Electronic commerce,Security measures ، Internet
Classification :
HF
5548
.
32
.
L66
68. Techniques and applications for advanced information privacy and securit
Author: / Hamid R. Nemati, [editor]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Information technology--Security measures,Electronic commerce--Security measures,Computer security.,Data protection.
Classification :
HF
,
5548
.
37
,.
T43
,
2009
69. Techniques and applications for advanced information privacy and security :
Author: Hamid R. Nemati, editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Electronic commerce-- Security measures.,Information technology-- Security measures.,Computer security.,Data protection.,Electronic commerce-- Security measures.,Information technology-- Security measures.
Classification :
HF5548
.
37
.
T43
2009
70. Techniques and applications for advanced information privacy and security : emerging organizational, ethical, and human issues
Author: ]edited by[ Hamid R. Nemati
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Security measures ، Electronic commerce,Security measures ، Information technology,، Computer security,، Data protection
Classification :
HF
5548
.
37
.
T43
2009
71. The E-Privacy imperative
Author: / Mark S. Merkow, James Breithaupt
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Electronic commerce,Electronic commerce- Security measures,Business enterprises- Computer networks- Security measures,Privacy, Right of
Classification :
HF5548
.
32
.
M47
2002
72. The E-Privacy imperative
Author: / Mark S. Merkow, James Breithaupt
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Electronic commerce,Electronic commerce- Security measures,Business enterprises- Computer networks- Security measures,Privacy, Right of
Classification :
HF5548
.
32
.
M47
2002
73. The E-Privacy imperative protect your customers' Internet privacy and ensure your company's survival in the electronic age
Author: Merkow, Mark S.,Mark S. Merkow, James Breithaupt
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Electronic commerce,، Electronic commerce- Security measures,، Business enterprises- Computer networks- Security measures,، Privacy, Right of
Classification :
HF
5548
.
32
.
M47
2002
74. The Internet security guidebook : from planning to deployment
Author: Ellis, Juanita
Library: Library of College of Science University of Tehran (Tehran)
Subject: ، Computer networks -- Security measures,Security measures ، Internet )Computer network(,Security measures ، Electronic commerce
Classification :
TK
5105
.
59
.
E44
2001
75. The Internet security guidebook : from planning to deployment
Author: Ellis, Juanita
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,Security measures ، Internet,Security measures ، Electronic commerce
Classification :
TK
5105
.
59
.
E43
76. The death of the internet
Author: edited by Markus Jakobsson
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes,Data protection,Electronic commerce-- Security measures,Internet-- Security measures
Classification :
TK5105
.
875
.
I57
.
J34
2012
77. Trust and new technologies marketing and management on the Internet and mobile media
Author: editors, Teemu Kautonen, Heikki Karjaluoto
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Electronic commerce , Security measures,، Internet marketing , Security measures,، Business enterprises , Computer networks , Security measures,، Electronic commerce , Management,، Consumentengedrag , gtt,، Vertrouwen. , gtt,، Internet. , gtt,، Draadloze communicatie. , gtt
Classification :
HF
5415
.
1265
T78
2008
78. Trust in E-services
Author:
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Electronic commerce--Security measures.,Web services.,Trust,Computer systems--Reliability.
Classification :
HF
5548
.
32
.
T745
2007
79. Trust in E-services: technologies, practices and challenges
Author: [edited by] Ronggong Song, Larry Korba, George Yee
Library: Library of Faculty of Entrepreneurship University of Tehran (Tehran)
Subject: Electronic commerce -- Security measures,Web services,Trust,Computer systems -- Reliability
Classification :
HF
5548
.
32
.
T74
2007
80. Trust in E-services :technologies, practices and challenges
Author: ]edited by[ Ronggong Song, Larry Korba, George Yee
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: Security measures ، Electronic commerce,، Web services,، Trust,Reliability ، Computer systems
Classification :
HF
5548
.
32
.
T745