1. Accountability and Security in the Cloud
Author: \ Massimo Felici , Carmen Fernández-Gago (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Cloud computing -- Security measures -- Congresses.,Data protection -- Congresses,Data encryption (Computer science) -- Congresses.,محاسبات ابری -- تدابیر ایمنی -- کنگره ها ,حفاظت اطلاعات -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
QA
76
.
585
.
A25
2015
E-Book
,
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
2. Advances in cryptology-- ASIACRYPT 2011 :
Author: edited by Dong Hoon Lee, Xiaoyun Wang
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
.
I58
2011
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
3. CCS'10 : proceedings of the 17th ACM Conference on Computer and Communications Security, October 4-8, 2010, Chicago, Illinois, USA
Author: ]general chair, Ehab Al-Shaer; program chairs, Angelos D. Keromytis, Vitaly Shmatikov[; sponsored by, ACM SIGSAC; supported by, National Science Foundation...]et al.[
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Data encryption )Computer science(
Classification :
QA
76
.
9
.
A25A26
2010
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
4. Data privacy management, cryptocurrencies and blockchain technology :
Author: Joaquin Garcia-Alfaro, Jordi Herrera-Joancomartí, Giovanni Livraga, Ruben Rios (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computers and Society.,Information Systems and Communication Service.,Software Engineering/Programming and Operating Systems.,Systems and Data Security.,Computer networking & communications.,Computer security.,Computer security.,Computers-- Online Services-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data protection.,Ethical & social aspects of IT.,Software Engineering.
Classification :
QA76
.
9
.
A25
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
5. Fast software encryption
Author: / Seokhie Hong, Tetsu Iwata (Eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Data encryption (Computer science), Congresses,Software protection, Congresses,Computer security, Congresses
Classification :
QA76
.
9
.
A25F74
2010
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
6. Information Hiding
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses,Data encryption (Computer science) -- Congresses,Data protection -- Congresses,کامپیوترها -- ایمنی اطلاعات -- کنگرهها,رمزگذاری دادهها -- کنگرهها,حفاظت دادهها -- کنگرهها
Classification :
E-Book
,
![](/design/images/bookmore.png)
7. Information Systems Security and privacy.
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.,Data protection -- Congresses.,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,رمزگذاری دادهها -- کنگرهها ,حفاظت اطلاعات -- کنگرهها
Classification :
TK
5105
.
59
.
I532
2015
E-Book
,
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
8. Information Theoretic Security
Author: \ Anja Lehmann, Stefan Wolf (eds.).
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer security -- Congresses.,Data protection -- Congresses.,رمزگذاری دادهها -- کنگرهها,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,حفاظت اطلاعات -- کنگرهها
Classification :
QA
76
.
9
.
I5
2015
E-Book
,
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
9. Information and Communications Security
Author: \ Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks -- Security measures -- Congresses,Data protection -- Congresses,Data encryption (Computer science) -- Congresses,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها,حفاظت اطلاعات -- کنگرهها,رمزگذاری دادهها -- کنگرهها
Classification :
TK
5105
.
59
.
I25
I58
2016
E-Book
,
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
10. Information and Communications Security
Author: \ [Edited by] Lucas C. K. Hui...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Data protection -- Congresses.,Data encryption (Computer science) -- Congresses.,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,حفاظت اطلاعات -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
TK
5105
.
59
.
I5
2015
E-Book
,
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
11. Information hiding :
Author: Tomáš Filler [and others] (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
I3
2011
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
12. Information security and privacy
Author: Willy Susilo, Yi Mu, Jennifer Seberry (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
A279
2012eb
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
13. Information systems security and privacy :
Author: edited by Paolo Mori, Steven Furnell, Olivier Camp.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
14. Information theoretic securit
Author: / Reihaneh Safavi-Naini (ed.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Cryptography--Congresses,Data encryption (Computer science)--Congresses,Data protection--Congresses,Electronic books.
![](/design/images/bookmore.png)
15. Information theoretic security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ; Cryptography ; Congresses. ; Data encryption (Computer science) ; Congresses. ; Data protection ; Congresses. ;
![](/design/images/bookmore.png)
16. Information theoretic security
Author: Yvo Desmedt (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
I33
2007eb
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
17. Privacy technologies and policy :
Author: Manel Medina, Andreas Mitrakas, Kai Rannenberg, Erich Schweighofer, Nikolaos Tsouroulas (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer security.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
18. Privacy technologies and policy :
Author: Maurizio Naldi, Giuseppe F. Italiano, Kai Rannenberg, Manel Medina, Athena Bourka (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer security.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
19. Provable Security : 11th International Conference, ProvSec 2017 Xian, China, October 23 25, 2017 Proceedings
Author: Editors Tatsuaki Okamoto, Man Ho Au, Yong Yu, Yannan Li
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security -- Congresses,، Data encryption )Computer science( -- Congresses,، Data protection -- Congresses
Classification :
QA
76
.
9
.
A25P787
2017
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
20. Provable security.
Author: \ Man-Ho Au, Atsuko Miyaji (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,Data encryption (Computer science),Data Protection,کامپیوترها,رمزگذاری دادهها,حفاظت اطلاعات , -- Congresses, -- Congresses, -- Congresses, -- کنگرهها, -- کنگرهها, -- کنگرهها, -- ایمنی اطلاعات,a03,a05,a07,a03,a05,a07
Classification :
QA
76
.
9
.
A25
P7
2015
E-Book
,
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)