21. CISSP: (ISC)2 Certified Information Systems Security Professional official study guide
Author: / James Michael Stewart, Mike Chapple, Darril Gibson.,Stewart, James Michael,
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: کامپیوترها,Computer security,شبکههای کامپیوتری,Computer networks,داده پردازی ,Electronic data processing personnel,مهندسان مخابرات,Telecommunications engineers,شبکههای کامپیوتری,Computer networks,کامپیوترها,Computer security,داده پردازی ,Electronic data processing personnel,مهندسان مخابرات,Telecommunications engineers, -- راهنمای مطالعه, -- Study guides, -- راهنمای مطالعه, -- Study guides, -- گواهینامه, -- Certification, -- گواهینامه, -- Certification, -- آزمونها, -- Examinations, -- آزمونها, -- Examinations, -- گواهینامه , -- Certification, -- آزمونها, -- Examinations, -- آزمونها, -- Examinations, -- گواهینامه , -- Certification,a03,a03,a05,a05,a07,a07,a09,a09,a11,a11,a13,a13,a15,a15,a17,a17,Computer security.,Computer networks.,Security measures.,Electronic data processing.,Telecommunications engineers.
Classification :
QA76
.
3
.
T5735
2015


22. CompTIA Security+ Deluxe study guide
Author: Emmett Dulaney
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides,Computer security-- Examinations, Study guides,Electronic data processing personnel-- Certification
Classification :
QA76
.
3
.
D82279
2009


23. CompTIA security+ exam guide, (Exam SY0-501) /
Author: Dr. Wm. Arthur Conklin, Dr. Gregory White, Chuck Cothren, Roger L. Davis, Dwayne Williams.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Examinations, Study guides.,Computer technicians-- Certification, Study guides.,Electronic data processing personnel-- Certification, Study guides.,Computer networks-- Security measures-- Examinations.,Computer security-- Examinations.,Computer technicians-- Certification.,Electronic data processing personnel-- Certification.
Classification :
QA76
.
9
.
A25
.
C667565
2018


24. CompTIA security+ guide to network security fundamentals /
Author: Mark Ciampa.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides.,Data protection.,Computer networks-- Security measures-- Examinations.,Data protection.
Classification :
TK5105
.
59
.
C52
2018


25. Computation, cryptography, and network security
Author: Nicholas J. Daras, Michael Th. Rassias
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Engineering mathematics,Mathematical models ، Computer networks -- Security measures,، Mathematics
Classification :
TA
330
.
C65


26. Computer security :
Author: William Stallings, Lawrie Brown ; with contributions by Mick Bauer, Michael Howard
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides,Computer security,Computer security-- Examinations, Study guides,Electronic data processing personnel-- Certification, Study guides
Classification :
QA76
.
9
.
A25
S685
2012


27. Contemporary computing :
Author: Sanjay Ranka [and others] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science, Congresses.,Soft computing, Congresses.,Computer science.,Computer science.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Informatique.,Soft computing.,Soft computing.
Classification :
QA75
.
5
.
I584
2009


28. Cryptanalytic attacks on RSA
Author: Yan, Song Y.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Data encryption )Computer science(,Security measures ، Computer networks,، Cryptography
Classification :
QA
76
.
9
.
A25
Y34


29. Cryptanalytic attacks on RSA
Author: / Song Y. Yan
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Data encryption (Computer science),Computer networks--Security measures,Cryptography.
Classification :
QA
,
76
.
9
,.
A25
,
Y34
,
2007


30. Cryptography and Network Security
Author: \ William Stallings.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks -- Security measures.,Data encryption (Computer science),Coding theory.,Computer security.,شبکههای کامپیوتری -- تدابیر ایمنی,رمزگذاری دادهها ,نظریه رمزگذاری
Classification :
TK5105
.
59
.
S71C7
2011


31. Cryptography and Network Security
Author: / Behrouz A. Forouzan
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Computer networks -- Security measures
Classification :
Tk
5105
.
59
.
F6
2008


32. Cryptography and Network Security: princilpes and Practice
Author: William Stallings
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computer networks -- security measures,Data encryption (computer science),Coding theory,Computer security
Classification :
TK
،
5105
.
59
،.
S713
،
2006


33. Cryptography and network security
Author: Forouzan, Behrouz A.
Library: (Semnan)
Subject: Security measures ، Computer networks,، Data encryption )Computer science(,، Coding theory,، Computer security
Classification :
TK
5105
.
59
.
F67
2008


34. Cryptography and network security
Author: / William Stallings
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks--Security measures,Data encryption (Computer science),Coding theory,Computer security
Classification :
TK5105
.
59
.
S713
2014


35. Cryptography and network security :
Author: / William Stallings
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Data encryption (Computer science),Coding theory,Computer security
Classification :
E-BOOK

36. Cryptography and network security
Author: / William Stallings
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks - Security measures,Data encryption (Computer science),Coding theory,Computer security
Classification :
TK5105
.
59
.
S713
2006


37. Cryptography and network security
Author: / William Stallings
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Computer networks -- Security measures,Data encryption (Computer science),Coding theory,Computer security
Classification :
TK
5105
.
59
.
S713
2011


38. Cryptography and network security
Author: Forouzan, Behrouz A.
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer networks- Security measures ► Cryptography
Classification :
005
F727c


39. Cryptography and network security
Author: / William Stallings
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks- Security measures,Data encryption (Computer science),Coding theory,Computer security
Classification :
TK5105
.
59
.
S713
2006


40. Cryptography and network security
Author: / Behrouz A Forouzan
Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)
Subject: Computer networks -- Security measures,Data encryption (Computer science),Coding theory
Classification :
TK5105
.
59
.
F66
2008

