84. BL
Author: Seán Duffy, editor ; associate editors, Ailbhe MacShamhráin, James Moynes.
Library: Library of Islamic Parliament (Tehran)
Subject:

85. BL
پدیدآورنده : edited by François Debrix and Mark J. Lacy.
موضوع :
۲ نسخه از این کتاب در ۱ کتابخانه موجود است.
87. BL,Archives and archivists : key collaborators in the digital lbirary / William E. Landis, Robin L. Chandler -- Committing to memory : a project to publish and preserve California local history digital resources / Adrian L. Turner -- Technologically enhanced archival collections : using the buddy system / Dayna Holz -- California cultures : implementing a model for virtual collections / Genie Guerard, Robin L. Chandler -- The importance of user-centered design : exploring findings and methods / Rosalie Lack -- How and why of user studies : RLG's RedLightGreen as a case study / Merrilee Proffitt -- From horse-drawn wagon to hot rod : the University of California's digital image service experience / Maureen A. Burns -- Archiving web sites for preservation and access : MODS, METS and MINERVA / Rebecca Guenther, Leslie Myrick -- Video preservation and digital reformatting : pain and possibility / Jerome McDonough, Mona Jimenez -- Digital archiving and preservation : technologies and processes for a trusted repository / Ronald Jantz, Michael Giarlo -- The complexities of digital resources : collection boundaries and management responsibilities / Joan
Author: Philip Mattar, editor in chief. ,William E. Landis, Robin L. Chandler, editors.
Library: Library of Islamic Parliament (Tehran)
Subject:

88. BL,BL
Author: / Marshall G.S. Hodgson. ,20090530 0
Library: Library of Islamic Parliament (Tehran)
Subject:

89. BackTrack 4
Author: Shakeel Ali, Tedi Heriyanto.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Evaluation.
Classification :
TK5105
.
59
.
A45
2011eb


90. Cognitive radio networking and security
Author: / K. J. Ray Liu, Beibei Wang
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Cognitive radio networks,Game theory,Computer networks--Security measures,Wireless communication systems
Classification :
TK
5103
.
4815
.
L5
2011


91. Computational Intelligence and Intelligent Systems :
Author: Zhihua Cai ... [et al.] (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence.,Computer science.,Computer simulation.

92. Computer security :
Author: Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25


93. Conflict transformation and peacebuilding :
Author: edited by Bruce W. Dayt
Library: Library of Islamic Parliament (Tehran)
Subject:

94. Contemporary computing :
Author: Sanjay Ranka [and others] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science, Congresses.,Soft computing, Congresses.,Computer science.,Computer science.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Informatique.,Soft computing.,Soft computing.
Classification :
QA75
.
5
.
I584
2009


95. Critical information infrastructures security :
Author: Christos Xenakis, Stephen Wolthusen (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
C75
2010


96. Data privacy management and autonomous spontaneous security :
Author: Roberto Di Pietro [and others] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.

97. Detection of intrusions and malware, and vulnerability assessment :
Author: Thorsten Holz, Herbert Bos (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Computers-- Access control-- Evaluation, Congresses,Computers-- Access control, Congresses,Malware (Computer software), Congresses
Classification :
QA76
.
9
.
A25


98. Detection of intrusions and malware, and vulnerability assessment
Author: / Klaus Julisch, Christopher Kruegel (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computers--Access control--Congresses,Computers--Access control--Evaluation--Congresses,Computer networks--Security measures--Congresses,Computer security--Congresses,Intrusions,Malware,Vulnerability assessment,DIMVA
Classification :
QA
,
76
.
9
,.
A25
,
D563
,
2005


99. Detection of intrusions and malware, and vulnerability assessment
Author: Ulrich Flegel, Danilo Bruschi (eds.)
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computers, Access control, Congresses,Computers, Access control, Evaluation, Congresses,Computer networks, Security measures, Congresses,Computer security, Congresses,Malware (Computer software), Congresses,Eindringerkennung, Kongress, Como <2009>,Kryptoanalyse, Kongress, Como <2009>,Malware, Kongress, Como <2009>,Softwareschwachstelle, Kongress, Como <2009>,Zugriffskontrolle, Kongress, Como <2009>,Como (2009), swd,Kongress., swd,Eindringerkennung., swd,Kryptoanalyse., swd,Malware., swd,Softwareschwachstelle., swd,Zugriffskontrolle., swd
Classification :
QA
،
76
.
9
،.
A25
,
D563
،
2009


100. Detection of intrusions and malware, and vulnerability assessment : Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005 : proceedings
Author: Klaus Julisch, Christopher Kruegel )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computers -- Access control,Evaluation -- Congresses ، Computers -- Access control,Congresses ، Computer networks -- Security measures,Congresses ، Computer security
Classification :
QA
76
.
L28
Vol
.
3548

