161. Non- repudiation in electronic commerce
Author: Zhou, Jianying
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Electronic commerce- Computer network resources ► Business enterprises- Computer networks- Security measures ► Data encryption (Computer science) ► Internet- Security measures
Classification :
005
Z44n


162. Outsourcing information security
Author: / C. Warren Axelrod
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks, Security measures, United States,Computers, Access control, United States,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
,
A88
2004


163. Outsourcing information security
Author: / C. Warren Axelrod
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures United States,Computers- Access control United States,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
,
A88
2004


164. Outsourcing information security [electronic resource]
Author: / C. Warren Axelrod
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Computer networks--Security measures--United States,Computers--Access control--United States,Data encryption (Computer science)
Classification :
EB
,
QA76
.
9
.
A25A88
2004

166. Policies and research in identity management :
Author: Simone Fischer-Hübner, Elisabeth de Leeuw, Chris Mitchell (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Access control -- Congresses.,Computer networks -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
S566
2013


167. Policy-based autonomic data governance /
Author: Seraphin Calo, Elisa Bertino, Dinesh Verma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Autonomic computing.,Computer networks-- Security measures.,Computer security.,Autonomic computing.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25
P65
2019


168. Practical cryptography for data internetworks
Author: Stallings, William.
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer networks - Security measures , Data encryption )Computer science( , Coding theory , Computer security
Classification :
TK
5105
.
59
.
S73
1996


169. Practical cyber intelligence :
Author: Wilson Bautista Jr.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Cyber intelligence (Computer security),Cyberterrorism-- Prevention.,Information technology-- Security measures.,Coding theory & cryptology.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer science.,COMPUTERS / Security / General,Cyber intelligence (Computer security),Cybernetics & systems theory.,Cyberterrorism-- Prevention.,Data encryption.,Information technology-- Security measures.
Classification :
HV6773


170. Principles of security and trust :
Author: David Basin, John C. Mitchell (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
D385
2013


171. Pro PHP security
Author: Chris Snyder, Thomas Myer, Michael Southwell
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: PHP (Computer program language), Handbooks, manuals, etc,Web site development, Security measures, Handbooks, manuals, etc,Web sites, Security measures, Handbooks, manuals, etc,PHP (Computer language), sears,Internet software., sears,Computer networks, Security measures., sears
Classification :
QA
،
76
.
73
،.
P224
,
S59
،
2010


172. Proceedings of The IFIP TC 11 23rd International Information Security Conference
Author: / edited by Sushil Jajodia, Pierangela Samarati, Stelvio Cimato.
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer networks -- Security measures -- Congresses, Computers -- Access control -- Congresses, Computer security -- Congresses,Computer networks -- Access control -- Congresses,Data protection -- Congresses
Classification :
QA
76
.
9
.
A25I461
2008


173. Protocols for authentication and key establishment
Author: by Colin Boyd, Anish Mathuria.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols.,Computer networks -- Security measures.,Data encryption (Computer science)
Classification :
TK5105
.
59
B936
2011


174. Public key infrastructures, services and applications
Author: Fabio Martinelli, Bart Preneel (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Data encryption (Computer science), Congresses,Public key cryptography, Congresses,Public key infrastructure (Computer security), Congresses

175. RFID: Security and privacy
Author: / Ari Juels, Christof Paar (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Radio frequency identification systems--Congresses,Data encryption (Computer science)--Congresses,Computer networks--Security measures--Congresses
Classification :
TK6570
.
I34R45
2012


176. RFID: Security and privacy
Author: Ari Juels, Christof Paar (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Data encryption (Computer science), Congresses,Radio frequency identification systems, Congresses
Classification :
TK6570
.
I34
R45
2011eb


177. RSA Security's official guide to cryptography
Author: / Steve Burnett and Stephen Paine
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Data encryption (Computer science),Cryptography
Classification :
E-BOOK

178. Rethinking public key infrastructures and digital certificates :
Author: / Stefan A. Brands
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer network protocols,Data encryption (Computer science),Public key infrastructure (Computer security)
Classification :
TK5105
.
59
.
B73
2000


179. Rethinking public key infrastructures and digital certificates
Author: / Stefan A. Brands
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures,Computer network protocols,Data encryption (Computer science),Public key infrastructure (Computer security)
Classification :
E-BOOK

180. Risks and Security of Internet and Systems :
Author: edited by Nora Cuppens, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquin Garcia-Alfaro.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Internet-- Security measures, Congresses.,Artificial intelligence.,Artificial intelligence.,Coding theory & cryptology.,Computer science.,Computers-- Expert Systems.,Computers-- Information Technology.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Computers, Special purpose.,Computers.,Data encryption (Computer science),Expert systems-- knowledge-based systems.,Information retrieval.,Information technology: general issues.,Software engineering.,Software Engineering.
Classification :
QA76
.
758
I58
2017

