21. Cloud computing security :foundations and challenges
Author: editor, John R. Vacca
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Security measures ، Cloud computing,Security measures ، Computer networks,، Data protection,، Computer security
Classification :
QA
76
.
585
.
C5825


22. Collaborative computer security and trust managemen
Author: / Jean-Marc Seigneur, Adam Slagell
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Public key infrastructure (Computer security),Data protection.,Computer networks--Security measures,Computer crimes--Prevention
Classification :
QA
,
76
.
9
,.
A25
,
C6145
,
2010


23. Collaborative computer security and trust management
Author: ]edited by[ Jean-Marc Seigneur, Adam Slagell
Library: Central Library and Documentation Center (Semnan)
Subject: ، Computer security,، Public key infrastructure )Computer security(,، Data protection,Security measures ، Computer networks,Prevention ، Computer crimes
Classification :
QA
76
.
9
.
A25
C6145
2010


24. Collaborative computer security and trust management
Author: / [edited by] Jean-Marc Seigneur, Adam Slagell.
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer security,Public key infrastructure (Computer security),Data protection,Computer networks--Security measures,Computer crimes--Prevention.
Classification :
QA
76
.
9
.
A25
C614
2010


25. Collaborative computer security and trust management
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Public key infrastructure (Computer security) ; Data protection ; Computer networks ; Security measures ; Computer crimes ; Prevention ;

26. Collaborative computer security and trust management
Author: ]edited by[ Jean-Marc Seigneur, Adam Slagell
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,، Public key infrastructure )Computer security(,، Data protection,Security measures ، Computer networks,Prevention ، Computer crimes
Classification :
QA
76
.
9
.
A25
C6145
2010


27. CompTIA security+ guide to network security fundamentals /
Author: Mark Ciampa.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides.,Data protection.,Computer networks-- Security measures-- Examinations.,Data protection.
Classification :
TK5105
.
59
.
C52
2018


28. Computer and information security handbook
Author: edited by John R. Vacca
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Computer networks -- Security measures,، Data protection
Classification :
QA
76
.
9
.
A25C625
2017


29. #Counter hack
Author: #Ed Skoudis
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer networks- Security measures ،Data protection
Classification :
#
TK
،#.
S46


30. Cyber criminalité :
Author: Éric Filiol ; Phillipe Richard.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer crimes.,Computer security.,Data protection.,criminalité-- Internet.,sécurité informatique.,Criminalité informatique.,Entreprises-- Réseaux d'ordinateurs-- Sécurité-- Mesures.,Protection de l'information (Informatique),Sécurité informatique.,Business enterprises-- Computer networks-- Security measures.,Computer crimes.,Computer security.,Crime informatique.,Criminalité informatique.,criminalité-- Internet.,Data protection.,Fraude.,Internet.,Piratage informatique.,Pirate informatique.,Sécurité des données.,sécurité informatique.,Sécurité informatique.
Classification :
HV6773
.
F55
2006


31. Cyber-security and global information assurance :
Author: Kenneth J. Knapp [editor].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Cyberspace-- Security measures.,Data protection.,Information technology-- Security measures.,Computer networks-- Security measures.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25
C918
2009eb


32. Cyber security standards, practices and industrial applications :
Author: Junaid Ahmed Zubairi, Athar Mahboob.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data protection.,Electronic data processing departments-- Security measures.

33. DIM '05 : proceedings of the 2005 ACM Workshop on Digital Identity Management, November 11, 2005, Fairfax, Virginia, USA )co-located with CCS 2005(
Author:
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer networks -- Security measures,Congresses ، Computer security,Congresses ، Data protection
Classification :
TK
5105
.
59
.
A2282
2005


34. Data privacy
Author: Nataraj Venkataramanan and Ashwin Shriram.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Customer relations.,Data protection.,Management information systems-- Security measures.,Privacy, Right of.

35. Data security technologies in SAS 9.1.3.
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: SAS (Computer file),SAS (Computer file),Computer networks-- Security measures.,Computers-- Access control.,Data protection.,Computer networks-- Security measures.,Computers-- Access control.,Data protection.
Classification :
QA76
.
9
.
A25
D3532
2005


36. Defending the digital frontier
Author: / Mark W. Doll, Sajay Rai, Jose Granado
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures,Data protection
Classification :
E-BOOK

37. Defending the digital frontier :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Data protection ;

38. Defending the digital frontier
Author: / Mark W. Doll, Sajay Rai, Jose Granado
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Data protection.
Classification :
TK
,
5105
.
59
,.
D65
,
2003


39. Der IT Security Manager :
Author: Heinrich Kersten, Gerhard Klett ; herausgegeben von Heinrich Kersten und Klaus-Dieter Wolfenstetter.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures.,COMPUTERS / Security / General.,Data protection.
Classification :
QA76
.
9
.
A25
H456
9999


40. Digital signature
Author: Kailash n.gupta, kamlesh n.agarwala, prateek a.agarwala
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computer networks -- Security measures,Computer security,Data protection,Computer networks -- Security measures
Classification :
TK
،
5105
,.
59
،.
G8
,
D5
،
2005

