261. Securing information and communications systems :
Author: Steven M. Furnell [and others], editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Chiffrement (Informatique),Infrastructure à clé publique (Sécurité informatique),Réseaux d'ordinateurs-- Sécurité-- Mesures.,Sécurité informatique.,Systèmes informatiques-- Sécurité-- Mesures.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
S37563
2008eb


262. Securing information and communications systems
Author:
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer security,Computer networks--Security measures,Data encryption (Computer science)
Classification :
QA
76
.
9
.
A25
S375
2008


263. Security, Privacy, and Anonymity in Computation, Communication, and Storage :
Author: edited by Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence.,Computer network architectures.,Computer science.,Data protection.,Information systems.,Artificial intelligence.,Computer network architectures.,Computer science.,Data protection.
Classification :
QA76
.
9
.
A25


264. Security Protocols
Author: edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Computer science.,Computer software.,Data encryption (Computer science),Information storage and retrieval systems.

265. Security Protocols
Author: edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Computer software.,Data encryption (Computer science),Data protection.,Information Systems.

266. Security and Privacy \U+2013\ Silver Linings in the Cloud
Author: edited by Kai Rannenberg, Vijay Varadharajan, Christian Weber.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Computer science.,Computer software.,Data encryption (Computer science),Information storage and retrieval systems.

267. Security and Privacy in Mobile Information and Communication Systems
Author: edited by Andreas U. Schmidt, Giovanni Russello, Antonio Lioy, Neeli R. Prasad, Shiguo Lian.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Computer science.,Computer software.,Data encryption (Computer science),Information storage and retrieval systems.

268. Security and Trust Management
Author: \ Sara Foresti (Ed.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,رمزگذاری دادهها -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
QA
76
.
9
.
S4
2015
E-Book
,


269. Security and Trust Management
Author: edited by Catherine Meadows, Carmen Fernandez-Gago
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks,Computer science,Data encryption (Computer science),Data protection,Information Systems,Computer Communication Networks,Computer Science,Computers and Society,Data Encryption,Information Systems Applications (incl. Internet),Management of Computing and Information Systems,Systems and Data Security

270. Security and cryptography for networks :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ;

271. Security and privacy in communication networks :
Author: Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25


272. Security and privacy in communication networks
Author: / Muttukrishnan Rajarajan ... [et al.] (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Telecommunication systems--Security measures--Congresses,Computer networks--Security measures--Congresses,Data encryption (Computer science)--Congresses
Classification :
TK5102
.
85
.
S43
2012


273. Security and privacy in social network
Author: / Yaniv Altshuler ... [et al., editors]
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Online social networks, Security measures,Data encryption (Computer science),Data protection,Computer crimes, Prevention,Electronic books
Classification :
E-BOOK

274. Security and trust management :
Author: Sara Foresti (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Algorithm Analysis and Problem Complexity.,Data Encryption.,Management of Computing and Information Systems.
Classification :
QA76
.
9
.
A25


275. Security and trust management :
Author: Sokratis K. Katsikas, Cristina Alcaraz (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer programming-- software development.,Computer security.,Computer security.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Computers-- Programming-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Information retrieval.,Information technology: general issues.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25
S76
2018


276. Security and trust management
Author: Catherine Meadows, Carmen Fernandez-Gago (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
S86
2011eb


277. Security aspects in information technology :
Author: Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Information technology-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
I58
2011


278. Security for cloud computing
Author: / Flavio Lombardi, Roberto Di Pietro
Library: Library of College of Science University of Tehran (Tehran)
Subject: Cloud computing -- Security measures
Classification :
TK
5105
.
59
.
L66
2015


279. Security for cloud storage systems /
Author: Kan Yang, Xiaohua Jia.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures.,Computer networks-- Security measures.
Classification :
TK5105
.
59


280. Security for cloud storage systems
Author: / Kan Yang
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Cloud computing -- Security measures,Computer networks -- Security measures,COMPUTERS -- Internet / Security
Classification :
TK
