121. Efficient and Interpretable Machine Learning Algorithms for Predictive Analyses in Metagenomic Data
Author: Rahman, Mohammad Arifur
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence,Bioinformatics,Computer science,Epidemiology,Genetics,Microbiology

122. Elements of computer security
Author: / David Salomon
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security,Computer networks, Security measures
Classification :
QA76
.
9
.
A2S35
2010


123. Encyclopedia of Computer Science and Technology /
Author: edited by Phillip A. Laplante.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Information technology, Encyclopedias.,Computation.,Networks.,Software Engineering & Systems Development.,Information technology.
Classification :
T58
.
5
.
E53
2017


124. Enterprise Mac security :
Author: Charles Edge, Daniel O'Donnell
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Macintosh (Computer)
Classification :
QA76
.
9
.
A25


125. Enterprise Mac security
Author: Charles Edge, William Barker, et al
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Mac OS,Computer security

126. Evolving ourselves :
Author: Juan Enriquez and Steve Gullans.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Human evolution.,Mutation (Biology),Natural selection.,Biological Evolution.,Selection, Genetic.,Auslese,Evolution,Genmutation,Human evolution.,Mensch,Mutation (Biology),Natural selection.,Technischer Fortschritt,Überleben
Classification :
GN281
.
E57
2015


127. Executive guide to preventing information technology disasters
Author: Richard Ennals.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: administration système.,Information technology -- Management.,Management information systems.
Classification :
T58
.
64
R534
1995


128. Feigin & Cherry's textbook of pediatric infectious diseases /
Author: [edited by] Ralph D. Feigin [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Communicable diseases in children.,Child.,Communicable Diseases.,Pediatrics-- methods.
Classification :
RJ401
.
T49
2009


129. Fields' virology
Author: / editors-in-chief, David M. Knipe, Peter M. Howley
Library: Library of College of Science University of Tehran (Tehran)
Subject: Virology,Viruses
Classification :
QR
360
.
V5125
2001


130. Fields virology [electronic resource]
Author:
Library: Central library of medical university of Isfahan (Esfahan)
Subject: Viruses,Virus Diseases

131. Fields virology [electronic resources/
Author: editors-in-chief, David M. Knipe, Peter M. Howley ; associate editors, Jeffrey I. Cohen ... [et al.].
Library: Central library of medical university of Isfahan (Esfahan)
Subject: Viruses,Virus Diseases

132. Fundamentals of complex networks :
Author: Guanrong Chen, City University of Hong Kong, China, Xiaofan Wang, Shanghai Jiao Tong University, Shanghai, China, Xiang Li, Fudan University, Shanghai, China
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: System theory.
Classification :
Q295


133. Fundamentals of network security /
Author: John E. Canavan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,COMPUTER INFORMATION SECURITY.,Computer networks-- Security measures.,COMPUTER NETWORKS.,COMPUTER PROGRAM INTEGRITY.,Computer security.,COMPUTER VIRUSES.,COMPUTERS.,OPERATING SYSTEMS (COMPUTERS),Réseaux d'ordinateurs-- Mesures de sûreté.
Classification :
QA76
.
9
.
A25
C364
2001


134. Fuzzing for software security testing and quality assurance /
Author: Ari Takanen, Jared DeMott, Charlie Miller, Atte Kettunen.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer software-- Development.,Computer networks-- Security measures.,Computer security.,Computer software-- Development.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
F89
2018eb


135. Genes, memes, culture, and mental illness :
Author: Hoyle Leigh
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Memes,Memetics,Mental illness-- Genetic aspects,Culture,Mental Disorders-- genetics
Classification :
RC455
.
4
.
G4
L44
2010


136. Hackers [
Author: / United Artists Pictures presents an Iain Softley film ; producers, Michael Peyser, Ralph Winter ; written by Rafael Moreu ; directed by Iain Softley
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer hackers,Computer viruses,Computer crimes,Feature films,Fiction films,Thrillers (Motion pictures),Video recordings for the hearing impaired,Suspense films,Thrillers (Motion pictures)

137. Handbook of water and wastewater treatment plant operations
Author: / Frank R. Spellman
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Water treatment plants--Handbooks, manuals, etc,Sewage disposal plants--Handbooks, manuals, etc,Water--Purification--Handbooks, manuals, etc,Sewage--Purification--Handbooks, manuals, etc
Classification :
TD434
.
S64
2009


138. Honeypot frameworks and their applications :
Author: Chee Keong Ng, Lei Pan, Yang Xiang.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Malware (Computer software)-- Prevention.,Computer modelling & simulation.,Computer networking & communications.,Computer security.,Computer security.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Viruses & Malware.,Mathematical physics.,Maths for computer scientists.
Classification :
QA76
.
9
.
A25


139. Hospital epidemiology and infection control /
Author: [edited by] C. Glen Mayhall.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cross infection-- Prevention.,Nosocomial infections-- Epidemiology.,Nosocomial infections-- Prevention.,Bioterrorism.,Cross Infection-- epidemiology.,Cross Infection-- prevention & control.,Infection Control-- methods.,Cross infection-- Prevention.,Nosocomial infections-- Epidemiology.,Nosocomial infections-- Prevention.
Classification :
RA969
.
H635
2012


140. How to be invisible :
Author: J.J. Luna.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- United States.,Identification-- United States.,Privacy, Right of-- United States.,Computer security.,Identification.,Privacy, Right of.,United States., 7
Classification :
JC596
.
2
.
U5
L86
2004

