1. Access to online resources :
Author: by Kristina Botyriute.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Collection management (Libraries),Computer networks-- Security measures.,Database security.,Electronic information resources-- Access control.,Electronic information resources-- Management.,Computer Security.,Information Services.,Internet.,Collection management (Libraries),Computer networks-- Security measures.,Database security.,Electronic information resources-- Access control.,Library & information sciences.
Classification :
Z695
.
24


2. Big data analytics in cybersecurity /
Author: edited by Onur Savas, Julia Deng.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Big data.,Computer networks-- Security measures.,Computer security.,Database security.,Information technology-- Management.,Big Data,Big data.,Computer networks-- Security measures.,Computer security.,Database security.,Datenanalyse,Datensicherung,Information technology-- Management.
Classification :
QA76
.
9
.
A25
B54
2017


3. Computer Information Systems and Industrial Management
Author: \ Khalid Saeed, Władysław Homenda (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks -- Congresses.,Computer networks -- Security measures -- Congresses.,Database management -- Congresses.,شبکه های کامپیوتری - کنگره ها.,شبکه های کامپیوتری - اقدامات امنیتی - کنگره ها,مدیریت پایگاه داده - کنگره ها
Classification :
QA
164
.
C657
2015
E-Book
,


4. Computer information systems and industrial management
Author: / Agostino Cortesi ... [et al.] (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks--Congresses,Computer networks--Security measures--Congresses,Database management--Congresses
Classification :
TK5105
.
5
.
I58
2012


5. Computer information systems and industrial management :
Author: Khalid Saeed, Rituparna Chaki, Agostino Cortesi, Sławomir Wierzchoń (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer networks, Congresses,Database management, Congresses
Classification :
TK5105
.
5
.
I58
2013


6. Computer security
Author:
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Database security.,Computer security,Computer networks--Security measures
Classification :
QA
76
.
9
.
D314
N49
2010


7. Computer security: protecting digital resources
Author: Newman, Robert C.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Database security,، Computer security,Security measures ، Computer networks
Classification :
QA
76
.
9
.
D314
N49


8. Data and Applications Security and Privacy XXIX
Author: \ Pierangela Samarati (Ed.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses.,Computer networks -- Security measures -- Congresses.,Database management.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,پایگاههای اطلاعاتی -- مدیریت
Classification :
QA
76
.
9
.
A25D32
2015
E-Book
,


9. Database security /
Author: Alfred Basta, Melissa Zgola ; contributions made by Dana Bullaboy.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Database security.,Computer networks-- Security measures.,Computers and IT.,Computers and IT.,Database security.
Classification :
QA76
.
9
.
D314
B378
2012


10. Hack proofing ColdFusion
Author: Greg Meyer ... [et al.].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: ColdFusion.,Computer networks-- Security measures.,Computer security.,Database design.,World Wide Web-- Security measures.

11. Hack proofing ColdFusion
Author: Greg Meyer ... [et al.].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: ColdFusion.,Computer networks-- Security measures.,Computer security.,Database design.,World Wide Web-- Security measures.

12. Hack proofing ColdFusion
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: ColdFusion. ; Computer networks ; Security measures. ; Computer security. ; Database design. ; World Wide Web ; Security measures. ;

13. Handbook of Database Security
Author: / edited by Michael Gertz,Sushil Jajodia
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Database security,Computer networks -- Security measures
Classification :
QA
76
.
9
.
D314H26
2008
R


14. Handbook of database security
Author:
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Database security -- Handbooks, manuals, etc,Computer networks -- Security measures -- Handbooks, manuals, etc
Classification :
QA
76
.
9
.
D314
H26
2007
R


15. Handbook of database security
Author: / edited by Michael Gertz, Sushil Jajodia
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Database security.,Computer networks--Security measures
Classification :
QA
,
76
.
9
,.
D314
,
H26
,
2008


16. Handbook of database security
Author:
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Database security,Computer networks- Security measures,Computersicherheit.- swd,Datenbanksystem.- swd
Classification :
QA
,
76
.
9
,.
D314
,
H36
,
2008


17. Handbook of database security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Database security. ; Computer networks ; Security measures. ; Computersicherheit. ; swd. ; Datenbanksystem. ; swd. ;

18. Handbook of database security : applications and trends
Author: edited by Michael Gertz, Sushil Jajodia
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Handbooks, manuals, etc ، Database security,Handbooks, manuals, etc ، Computer networks -- Security measures
Classification :
QA
76
.
9
.
D314H26


19. Hands-on cybersecurity with Blockchain :
Author: Rajneesh Gupta.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Blockchains (Databases),Computer networks-- Security measures.,Computer security.,Database security.,Denial of service attacks.,Blockchains (Databases),Computer networks-- Security measures.,Computer security.,Computer security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Online Safety & Privacy.,Data capture & analysis.,Database security.,Denial of service attacks.,Network security.
Classification :
QA76
.
9
.
A25
G87
2018


20. How to cheat at designing security for a Windows Server 2003 network
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Database security,، Computer networks-- Security measures,، Computer security
Classification :
TK
5105
.
59
.
H69
2006

