221. Practical cyber intelligence :
Author: Wilson Bautista Jr.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Cyber intelligence (Computer security),Cyberterrorism-- Prevention.,Information technology-- Security measures.,Coding theory & cryptology.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer science.,COMPUTERS / Security / General,Cyber intelligence (Computer security),Cybernetics & systems theory.,Cyberterrorism-- Prevention.,Data encryption.,Information technology-- Security measures.
Classification :
HV6773


222. Principles of robotics & artificial intelligence /
Author: editor, Donald R. Franceschetti, PhD.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence.,Robotics.,Artificial intelligence.,Robotics.
Classification :
TJ211
.
P75
2018


223. Principles of security and trust :
Author: David Basin, John C. Mitchell (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
D385
2013


224. Privacy and Identity Management for Life
Author: edited by Michele Bezzi, Penny Duquenoy, Simone Fischer-Hübner, Marit Hansen, Ge Zhang.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Computer science.,Computer software.,Data encryption (Computer science),Information storage and retrieval systems.

225. Privacy and Identity Management for Life :
Author: edited by Jan Camenisch, Bruno Crispo, Simone Fischer-Hübner, Ronald Leenes, Giovanni Russello.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
E358
2012


226. Pro PHP security
Author: Chris Snyder, Thomas Myer, Michael Southwell
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: PHP (Computer program language), Handbooks, manuals, etc,Web site development, Security measures, Handbooks, manuals, etc,Web sites, Security measures, Handbooks, manuals, etc,PHP (Computer language), sears,Internet software., sears,Computer networks, Security measures., sears
Classification :
QA
،
76
.
73
،.
P224
,
S59
،
2010


227. Proceedings of International Conference on Recent Advancement on Computer and Communication :
Author: Basant Tiwari, Vivek Tiwari, Kinkar Chandra Das, Durgesh Kumar Mishra, Jagdish C. Bansal, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks, Congresses.,Internet of things, Congresses.,Computer networks.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Internet of things.
Classification :
TK5105
.
5


228. Proceedings of The IFIP TC 11 23rd International Information Security Conference
Author: / edited by Sushil Jajodia, Pierangela Samarati, Stelvio Cimato.
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer networks -- Security measures -- Congresses, Computers -- Access control -- Congresses, Computer security -- Congresses,Computer networks -- Access control -- Congresses,Data protection -- Congresses
Classification :
QA
76
.
9
.
A25I461
2008


229. Proceedings of The Ifip Tc 11 23rd International Information Security Conference :
Author: edited by Sushil Jajodia, Pierangela Samarati, Stelvio Cimato, Sushil Jajodia, Pierangela Samarati, Stelvio Cimato.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Computers -- Law and legislation.,Data protection.

230. Proceedings of the Third International Conference on Soft Computing for Problem Solving :
Author: edited by Millie Pant, Kusum Deep, Atulya Nagar, Jagdish Chand Bansal.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Applied mathematics.,Artificial intelligence.,Engineering.
Classification :
QA76
.
9
.
S63
E358
2014


231. Proceedings of the sixth International Conference on Green and Human Information Technology :
Author: Seong Oun Hwang, Syh Yuan Tan, Franklin Bien, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Information technology, Congresses.,Sustainable engineering, Congresses.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Information technology.,Sustainable engineering.
Classification :
T58
.
5


232. Progress in cryptology--AFRICACRYPT 2009 :
Author: Bart Preneel (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Computers-- Access control, Congresses.,Cryptography, Congresses.,Data encryption (Computer science), Congresses.,Computer Security.,Computer security.,Computers-- Access control.,Cryptography.,Data encryption (Computer science),Informatique.,Kryptologie
Classification :
QA76
.
9
.
A25
I58
2009


233. Progress in cryptology - INDOCRYPT 2011 :
Author: Daniel J. Bernstein, Sanjit Chatterjee (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011


234. Protocols for authentication and key establishment
Author: by Colin Boyd, Anish Mathuria.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols.,Computer networks -- Security measures.,Data encryption (Computer science)
Classification :
TK5105
.
59
B936
2011


235. Provable security :
Author: Joonsang Baek, Willy Susilo, Jongkil Kim (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer Systems Organization and Communication Networks.,Computing Milieux.,Cryptology.,Data Structures and Information Theory.,Software Engineering/Programming and Operating Systems.,Algorithms & data structures.,Computer networking & communications.,Computer security.,Computers-- Hardware-- General.,Computers-- Information Theory.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Data protection.,Information technology: general issues.,Software Engineering.
Classification :
QA76
.
9
.
A25


236. Public-Key Cryptography
Author: by Arto Salomaa.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Data encryption (Computer science)

237. Public-Key Cryptography
Author: by Arto Salomaa.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Data encryption (Computer science)

238. Public Key Cryptography ђ́أ PKC 2012
Author: edited by Marc Fischlin, Johannes Buchmann, Mark Manulis
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computational complexity,Computer Communication Networks,Computer science,Computer software,Data encryption (Computer science),Data protection,Information Systems,Algorithm Analysis and Problem Complexity,Computer Communication Networks,Computer Science,Data Encryption,Discrete Mathematics in Computer Science,Management of Computing and Information Systems,Systems and Data Security

239. Public key infrastructures, services and applications
Author: Fabio Martinelli, Bart Preneel (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Data encryption (Computer science), Congresses,Public key cryptography, Congresses,Public key infrastructure (Computer security), Congresses

240. RFID Security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Engineering. ; Computer Communication Networks. ; Data encryption (Computer science). ; Electronics. ; Telecommunication. ; Systems engineering. ; Engineering. ; Circuits and Systems. ; Signal, Image and Speech Processing. ; Communications Engineering, Ne
