141. Information security applications
Author: Souhwan Jung, Moti Yung (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
W577
2011eb


142. Information security applications
Author: Dong Hoon Lee, Moti Yung (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Database security, Congresses
Classification :
QA76
.
9
.
A25
W57
2012eb


143. Information security practice and experience
Author: Mark D. Ryan, Ben Smyth, Guilin Wang (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I855
2012eb


144. Information systems security and privacy :
Author: edited by Paolo Mori, Steven Furnell, Olivier Camp.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25


145. Information theoretic security
Author: Adam Smith (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I25
2012eb


146. Innovative Security Solutions for Information Technology and Communications.
Author: \ Ion Bica , David Naccache, Emil Simion (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses.,Computer networks -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
QA
76
.
9
.
I55
2015
E-Book
,


147. Innovative security solutions for information technology and communications :
Author: Jean-Louis Lanet, Cristian Toma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Information technology-- Security measures, Congresses.,Computer networks-- Security measures.,Computer security.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25


148. Intelligent, secure, and dependable systems in distributed and cloud environments :
Author: Issa Traore, Isaac Woungang, Sherif Saad Ahmed, Yasir Malik (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures, Congresses.,Computer networks-- Security measures, Congresses.,Artificial intelligence.,Coding theory & cryptology.,Computer networks-- Security measures.,Computer security.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Information retrieval.,Network hardware.
Classification :
TK5105
.
59


149. Internet security for business
Author:
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Business enterprises- Computer networks- Security measures ► Internet (Computer network)- Security measures ► World Wide Web (Information retrieval system)- Security measures ► Electronic funds transfers- Security measures ► Data encryption (Computer science)
Classification :
658
I61


150. Introduction to certificateless cryptography /
Author: Hu Xiong, Zhen Qin, Athanasios V. Vasilakos
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Data encryption (Computer science),Identification,Public key cryptography,Public key infrastructure (Computer security)
Classification :
QA76
.
9
.
A25
X75
2017


151. Introduction to computer and network security :
Author: Richard R. Brooks, Clemson University, South Carolina, USA
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Data encryption (Computer science),Data protection
Classification :
QA76
.
9
.
A25
B7745
2014


152. Introduction to Cryptography
Author: Hans Delfs and Helmut Knebl
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Data encryption (Computer science),Wireless communication systems -- Security measures,Computer networks -- Security measures
Classification :
QA
،
76
.
9
،.
D34
,
I721
،
2007


153. Make a shield from wisdom :
Author: 20090507 0
Library: Library of Islamic Parliament (Tehran)
Subject:

154. Malicious attack propagation and source identification /
Author: Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, Wanlei Zhou.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Communications engineering-- telecommunications.,Computer networks-- Security measures.,Computer security.,Computer security.,COMPUTERS-- Security-- General.,Data encryption (Computer science),Network hardware.
Classification :
QA76
.
9
.
A25


155. Modern Cryptography
Author: \ Chuck Easttom
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science),Information networks -- Security measures -- Mathematics.,رمزگذاری دادهها,شبکههای اطلاعرسانی -- تدابیر ایمنی -- ریاضیات
Classification :
E-Book
,

156. Modern cryptography :
Author: Chuck Easttom
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Mathematics,Computer security-- Mathematics,Data encryption (Computer science),Information networks-- Security measures-- Mathematics
Classification :
TK5102
.
94


157. Network science and cybersecurity /
Author: Robinson E. Pino, editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Internet-- Security measures.
Classification :
TK5105
.
59
.
N48
2014eb


158. Netzwerk- und Datensicherheit :
Author: Martin Kappes.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures.,Computer security.,Data encryption (Computer science)
Classification :
TK5105
.
59
M378
2013


159. Next generation SSH2 implementation :
Author: Dale Liu, lead author and technical editor ; Max Caceres [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: UNIX Shells.,UNIX Shells.,UNIX Shells.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
L585
2009eb


160. Non-repudiation in electronic commerce
Author: Zhou, Jianying
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Electronic commerce-- Computer network resources,، Business enterprises-- Computer networks-- Security measures,، Data encryption )Computer science(,، Internet-- Security measures
Classification :
HF
5548
.
32
.
Z49
2001

