9. .....................
Author: Terry Bernstein...]et al.[
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Computer networks - Security measures ، Business enterprises,Security measures ، Internet )Computer network(,Security measures ، World Wide Web )Information retrieval system(,Security measures ، Electronic funds transfers,، Data encryption )Computer science(
Classification :
HD
30
.
38
.
I57
1996


10. A practical guide to TPM 2.0 :
Author: Will Arthur, David Challener, Kenneth Goldman
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Computer Science.,Data Encryption.,Software Engineering/Programming and Operating Systems.
Classification :
QA76
.
9
.
A25


11. AQA A level Computer Science.
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science, Problems, exercises, etc.,Computer science.,Computer science.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.
Classification :
QA76


12. Advanced computing and systems for security
Author: / Edited by Rituparna Chaki... [et al.].
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computational intelligence -- Congresses.,Machine learning -- Congresses.,Computer security -- Congresses.,Computational intelligence, Machine learning, Computer security.

13. Advanced security technologies in networking
Author: edited by Borka Jerman-Blazic, Wolfgang S. Schneider and Tomaz Klobucar
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,Security measures ، Telecommunication,، Data encryption )Computer science(,، Electronic commerce
Classification :
TK
5105
.
59
.
A3


14. Advanced smart computing technologies in cybersecurity and forensics
Author: / edited by Keshav Kaushik ... [et al.].
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security.,Computer crimes,Investigation.

15. Advances in Computer Systems Architecture (vol. # 3740) :
Author: edited by Chip-Hong Chang, Thambipillai Srikanthan, Jingling Xue.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Data transmission systems.

16. Advances in Cryptology - ASIACRYPT '91 :
Author: edited by Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer communication networks.,Computer science.,Operating systems (Computers)
Classification :
QA76
.
9
.
A25
E358
1993


17. Advances in Cryptology -- ASIACRYPT'94 :
Author: edited by Josef Pieprzyk, Reihanah Safavi-Naini.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Data encryption (Computer science)

18. Advances in Cryptology -- EUROCRYPT 2019 :
Author: Yuval Ishai, Vincent Rijmen (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25


19. Advances in Cryptology – EUROCRYPT 2015
Author: \ edited by Elisabeth Oswald, Marc Fischlin.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer security -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها ,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
QA76
.
9
.
A38
2015
E-Book
,

