21. Artificial Intelligence and Security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Data encryption (Computer science). ; Computer Communication Networks. ; Artificial intelligence. ; Computer vision. ; Systems and Data Security. ;

23. BL,BL
Author: / Marshall G.S. Hodgson. ,20090530 0
Library: Library of Islamic Parliament (Tehran)
Subject:

24. Communication networks for smart grids :
Author: Kenneth C. Budka, Jayant G. Deshpande, Marina Thottan
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Smart power grids.,Computer Communication Networks.,Computer Science.,Data Encryption.,Power Electronics, Electrical Machines and Networks.
Classification :
TK3105


25. Communication networks for smart grids
Author: / Kenneth C. Budka, Jayant G. Deshpande, Marina Thottan
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Smart power grids,Computer networks,Computer Science,Computer Communication Networks,Data Encryption,Power Electronics, Electrical Machines and Networks
Classification :
E-BOOK

26. Communications and multimedia security :
Author: Bart De Decker [and others] (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Telecommunication systems-- Security measures, Congresses
Classification :
TK5105
.
59
.
I35
2011


27. Computer security :
Author: Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25


28. Critical information infrastructures security :
Author: Christos Xenakis, Stephen Wolthusen (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
C75
2010


29. Critical infrastructure protection V :
Author: Jonathan Butts, Sujeet Shenoi (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Cyberinfrastructure-- Security measures, Congresses.
Classification :
TK5105
.
59
.
I35
2011


30. Cryptography:
Author: edited by Ed Dawson, Jovan Golić.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Data encryption (Computer science)

31. Cryptology and network security :
Author: Jan Camenisch, Panos Papadimitratos (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer Communication Networks.,Computers and Society.,Cryptology.,Information Systems and Communication Service.,Software Engineering/Programming and Operating Systems.,Computer networking & communications.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- Online Services-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Ethical & social aspects of IT.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25


32. Decrypted Secrets :
Author: by Friedrich L. Bauer.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory.,Computer science.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
B947
2000


33. Emerging security algorithms and techniques /
Author: editors, Khaleel Ahmad, M.N. Doja, Nur Izura Udzir, Manu Pratap Singh.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Cryptography.,Data encryption (Computer science),Computer security.,COMPUTERS-- Computer Graphics-- Game Programming & Design.,COMPUTERS-- General.,COMPUTERS-- Security-- Cryptography.,COMPUTERS-- Security-- General.,Cryptography.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
E466
2019eb


34. Financial Cryptography and Data Security :
Author: edited by Jim Blyth, Sven Dietrich, L. Jean Camp.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Data encryption (Computer science)

35. Foundations of Security Analysis and Design III :
Author: edited by Alessandro Aldini, Roberto Gorrieri, Fabio Martinelli.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Data encryption (Computer science)

36. Handbook of computer networks and cyber security
Author: Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Computer networks.,Computer security.
Classification :
TK5105
.
5


37. Holistic approach to quantum cryptography in cyber security
Author: edited Shashi Bhushan... [et al.].
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Data encryption (Computer science),Computer networks,Quantum cryptography.,Security measures.,Risk Analysis Assessment.

38. INetSec 2009 - Open Research Problems in Network Security :
Author: edited by Jan Camenisch, Dogan Kesdogan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Data encryption (Computer science),Data protection.

39. 20090601 ,Includes bibliographical references and index. 0
Author: 20090602 ,20090602 0
Library: Library of Islamic Parliament (Tehran)
Subject:

40. Information Security Practice and Experience
Author: edited by Mark D. Ryan, Ben Smyth, Guilin Wang
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks,Computer science,Data encryption (Computer science),Data protection,Information storage and retrieval systems,Information Systems,Computer Communication Networks,Computer Science,Computers and Society,Data Encryption,Information Storage and Retrieval,Management of Computing and Information Systems,Systems and Data Security
