121. Guide to computer network security
Author: Joseph Migga Kizza
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control,Computer networks-- Security measures
Classification :
TK5105
.
59


122. Handbook of financial cryptography and security
Author: edited by Burton Rosenberg
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Security measures ، Electronic funds transfers,Security measures ، Electronic commerce,، Computer networks -- Security measures,Security measures ، Internet,، Data encryption )Computer science(
Classification :
HG
1710
.
H263


123. Hands-on cybersecurity with Blockchain :
Author: Rajneesh Gupta.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Blockchains (Databases),Computer networks-- Security measures.,Computer security.,Database security.,Denial of service attacks.,Blockchains (Databases),Computer networks-- Security measures.,Computer security.,Computer security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Online Safety & Privacy.,Data capture & analysis.,Database security.,Denial of service attacks.,Network security.
Classification :
QA76
.
9
.
A25
G87
2018


124. Hiding in plain sight
Author: / Eric Cole
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Cryptography,Computer networks- Security measures
Classification :
QA76
.
9
.
A25
,
C598
2003


125. Hiding in plain sight
Author: / Eric Cole
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Cryptography.,Computer networks--Security measures
Classification :
QA
,
76
.
9
,.
A25
,
C598
,
2003


126. Hiding in plain sight :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Cryptography ; Computer networks ; Security measures ;

127. Hiding in plain sight
Author: / Eric Cole
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security,Cryptography,Computer networks, Security measures
Classification :
QA76
.
9
.
A25C598
2003


128. Holistic approach to quantum cryptography in cyber security
Author: edited Shashi Bhushan... [et al.].
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Data encryption (Computer science),Computer networks,Quantum cryptography.,Security measures.,Risk Analysis Assessment.

129. (ISC)² CISSP certified information systems security professional: official study guide
Author: / Mike Chapple, James Michael Stewart, Darril Gibson.,Chapple, Mike, 1975- ,
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: کامپیوترها,Computer security,شبکههای کامپیوتری,Computer networks,داده پردازی ,Electronic data processing personnel,مهندسان مخابرات,Telecommunications engineers,شبکههای کامپیوتری,Computer networks,کامپیوترها,Computer security,داده پردازی ,Electronic data processing personnel,مهندسان مخابرات,Telecommunications engineers, -- راهنمای مطالعه, -- Study guides, -- راهنمای مطالعه, -- Study guides, -- گواهینامه, -- Certification, -- گواهینامه, -- Certification, -- آزمونها, -- Examinations, -- آزمونها, -- Examinations, -- گواهینامه , -- Certification, -- آزمونها, -- Examinations, -- آزمونها, -- Examinations, -- گواهینامه , -- Certification,a03,a03,a05,a05,a07,a07,a09,a09,a11,a11,a13,a13,a15,a15,a17,a17,Computer security.,Computer networks.,Security measures.,Electronic data processing.,Telecommunications engineers.
Classification :
QA76
.
3


130. (ISC)² CISSP certified information systems security professional official study guide /
Author: Mike Chapple, James Michael Stewart, Darril Gibson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Examinations, Study guides.,Electronic data processing personnel-- Certification.,Telecommunications engineers-- Certification.,Computer networks-- Security measures-- Examinations.,Computer security-- Examinations.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Electronic data processing personnel-- Certification.,Telecommunications engineers-- Certification.
Classification :
QA76
.
3
.
C4255
2018


131. Implementing SSL/TLS using cryptography and PKI /
Author: Joshua Davies.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Data encryption (Computer science)
Classification :
TK5105
.
59
.
D39
2011


132. Information and communications security :
Author: Sihan Qing [and others] (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011


133. Information assurance architecture /
Author: Keith D. WIllett.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Communication systems-- Management.,Computer networks-- Security measures.,Computer security.,Data protection.,Information resources management.,Information technology-- Management.,Business enterprises-- Communication systems-- Management.,Computer networks-- Security measures.,Computer security.,Data protection.,Information resources management.,Information technology-- Management.
Classification :
QA76
.
9
.
A25
W5487
2008


134. Information security: a practical approach
Author: Bhaskar, S. M.
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: ، Computer security,Security measures ، Computer networks,، Public key cryptography
Classification :
QA
76
.
9
.
A25
B473
2008


135. Information security and privacy :
Author: Julian Jang-Jaccard, Fuchun Guo (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computers-- Access control, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
A279
2019eb


136. Information to Cryptography : Principles and Applications
Author: Delfs, Hans
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer Security◄Cryptography◄Computer networks-Security measures
Classification :
005
D
351
i


137. Innovative security solutions for information technology and communications :
Author: Jean-Louis Lanet, Cristian Toma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Information technology-- Security measures, Congresses.,Computer networks-- Security measures.,Computer security.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25


138. Internet and intranet security management
Author: / Lech Janczewski
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Internet- Security measures,Intranets (Computer networks)- Security measures,Computers- Access control,Cryptography
Classification :
TK5105
.
875
.
I57
,
J358
2000


139. Internet and intranet security management
Author: Janczewski, Lech,1943-
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Internet- Security measures►Intranets (Computer networks)- Security measures►Computers- Access control►Cryptography
Classification :
5105
.
875
.
I57
,
J358

140. Internet and intranet security management
Author: / Lech Janczewski
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Internet- Security measures,Intranets (Computer networks)- Security measures,Computers- Access control,Cryptography
Classification :
E-BOOK
