81. Cryptology and network security :
Author: Jan Camenisch, Panos Papadimitratos (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer Communication Networks.,Computers and Society.,Cryptology.,Information Systems and Communication Service.,Software Engineering/Programming and Operating Systems.,Computer networking & communications.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- Online Services-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Ethical & social aspects of IT.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25


82. Cryptology and network security
Author: / Feng Bao ... [et al.] (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Congresses,Cryptography--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
I5538
,
2007


83. Cryptology and network security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Congresses. ; Cryptography ; Congresses. ; Authentifikation. ; swd. ; Computersicherheit. ; swd. ; Datensicherung. ; swd. ; Kryptoanalyse. ; swd. ; Kryptosystem. ; swd. ; Passwort. ; swd. ; Privatsph?re. ; swd. ; Re

84. Cryptology and network security :
Author: Srdjan Capkun, Sherman S.M. Chow (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Coding theory & cryptology.,Computer networks-- Security measures.,Computers-- Database Management-- Data Mining.,Computers-- Information Technology.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data mining.,Ethical & social aspects of IT.,Information retrieval.,Software Engineering.
Classification :
QA76
.
9
.
A25


85. Cryptology and network security :6th international conference, CANS 2007 Singapore, December 8-10 2007 : proceedings
Author: ]edited by[ Feng Bao, San Ling, Tatsuaki Okamoto
Library: Library of Niroo Research Institue (Tehran)
Subject: Congresses ، Computer networks - Security measures,Congresses ، Cryptography
Classification :
QA
76
.
9
.
A25I5538
2007


86. Cyber security cryptography and machine learning :
Author: Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses.,Internet-- Security measures, Congresses.,Machine learning, Congresses.,Data encryption (Computer science),Internet-- Security measures.,Machine learning.
Classification :
QA76
.
9
.
A25


87. Data communications and networkin
Author: / Behrouz A. Forouzan with Sophia Chung Fegan
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Electronic mail messages.,Telematics.,File Transfer Protocol (Computer network protocol),World Wide Web.,HTTP (Computer network protocol),Simple Network Management Protocol (Computer network protocol),Multimedia communications.,Cryptography.,Computer networks--Security measures,Firewalls (Computer security),Extranets (Computer networks),IPSec (Computer network protocol)
Classification :
TK
,
5105
,.
F6617
,
2007


88. Disappearing cryptograph
Author: / Peter Wayner
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Cryptography.,Internet.
Classification :
TK
,
5105
.
59
,.
W39
,
2009


89. Disappearing cryptography
Author: / Peter Wayner
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures,Cryptogra,Inter,Digital watermark
Classification :
TK5105
.
59
.
W39
2002


90. Disappearing cryptography :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ;

91. Disappearing cryptography
Author: Peter Wayner
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Cryptography,Internet
Classification :
TK5105
.
59
.
W39
2009


92. Disappearing cryptography : information hiding :steganography & watermarking
Author: Wayner, Peter, 1964-
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer networks-Security measures ► Cryptography ► Internet ► Digital watermarking
Classification :
005
W985d


93. Disappearing cryptography: information hiding: steganography & watermarking
Author: Wayner, Peter
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Computer networks,، Cryptography,، Internet
Classification :
TK
5105
.
59
.
W39
2002


94. Distributed networks
Author: edited by Qurban A. Memon.
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Electronic data processing,Internetworking (Telecommunication),Distributed databases.,Computer networks,COMPUTERS / Software Development & Engineering / Systems Analysis & Design.,COMPUTERS / Security / Cryptography.,TECHNOLOGY & ENGINEERING / Electronics / General.,Distributed processing.,Security measures.,Computer networks.

95. Distributed networks: intelligence, security, and applications
Author: edited by Qurban A. Memon
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Distributed processing ، Electronic data processing,، Internetworking )Telecommunication(,، Distributed databases,Security measures ، Computer networks,، COMPUTERS / Software Development & Engineering / Systems Analysis & Design,، COMPUTERS / Security / Cryptography,، TECHNOLOGY & ENGINEERING / Electronics / General
Classification :
QA
76
.
9
.
D5
D55


96. Economics of information security /
Author: edited by L. Jean Camp, Stephen Lewis.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Electronic commerce-- Security measures.,Commerce électronique-- Sécurité-- Mesures.,Beveiliging.,BUSINESS & ECONOMICS-- Corporate Governance.,BUSINESS & ECONOMICS-- Leadership.,BUSINESS & ECONOMICS-- Organizational Development.,BUSINESS & ECONOMICS-- Workplace Culture.,E-commerce.,Electronic commerce-- Security measures.,Informatiesystemen.
Classification :
HF5548
.
37
.
E25
2004eb


97. Effective Python penetration testing :
Author: Rejah Rehim.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Penetration testing (Computer security),Python (Computer program language),Computer networks-- Security measures.,COMPUTERS-- Security-- Networking.,Penetration testing (Computer security),Python (Computer program language)
Classification :
QA76
.
9
.
A25


98. Essential cybersecurity science :
Author: Josiah Dykstra.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25
D95
2015


99. Financial cryptography: First International Conference, FC'97, Anguilla, British West Indies, Feb. 24-28, 1997: proceedings
Author: FC'79 )7991: Anguilla(
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Electronic funds transfers-- Security measures-- Congresses,، Internet )Computer network(-- Security measures-- Congresses,، Computer networks-- Security measures-- Congresses,، Data encryption )Computer science(-- Congresses
Classification :
HG
1710
.
F35
1997


100. Financial cryptography : First International Conference, FC'97, Anguilla, British West Indies, February 24-28, 1997 : proceedings
Author: Rafael Hirschfeld )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Security measures -- Congresses ، Electronic funds transfers,Security measures -- Congresses ، Internet,Congresses ، Computer networks -- Security measures,Congresses ، Data encryption )Computer science(
Classification :
QA
76
.
L28
Vol
.
1318

