61. JZ6045,<The> hidden face of Eve :
Author: by Lars Kirchhoff. ,William E. Landis, Robin L. Chandler, editors.
Library: Library of Islamic Parliament (Tehran)
Subject:

62. Make a shield from wisdom :
Author: 20090507 0
Library: Library of Islamic Parliament (Tehran)
Subject:

66. Secure Internet practices :
Author: Patrick McBride [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures.,Computer networks-- Security measures.,Internet-- Security measures.,Gestion-- Informatique-- Sécurité-- Mesures.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Business-- Data processing-- Security measures.,Computer networks-- Security measures.,Internet-- Security measures.
Classification :
TK5105
.
59
.
S435
2002


67. Secure Internet practices : best practices for securing systems in the Internet and e-Business age
Author:
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: ، Computer networks--Security measures,، Internet--Security measures,، Business--Data processing--Security measures
Classification :
TK
5105
.
59
.
S43
2002


68. Secure Internet practices : best practices for securing systems in the Internet and e-Business age
Author: Patrick McBride...]et al.[
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,Security measures ، Internet,Data processing -- Security measures ، Business
Classification :
TK
5105
.
59
.
S4


69. Secure Internet practices : best practices for securing systems in the Internet and e-Business age
Author: Patricia McBride ... ]et al.[
Library: Central Library and Documentation Center (Kerman)
Subject: ، Computer networks - Security measures,، Internet - Security measures,Security measures ، Business - Data processing
Classification :
TK
5105
.
59
.
S435
2002


70. Transactions on large-scale data- and knowledge-centered systems XXXVII /
Author: edited by Abdelkader Hameurlain, Roland Wagner.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data mining, Congresses.,Database management, Congresses.,Artificial intelligence.,Artificial intelligence.,Computer networks.,Computer science.,Computer security.,Computer security.,Computers-- Database Management-- Data Mining.,Computers-- Hardware-- Network Hardware.,Computers-- Intelligence (AI) & Semantics.,Computers-- Operating Systems-- General.,Computers-- Security-- General.,Computers-- Software Development & Engineering-- General.,Data mining.,Data mining.,Network hardware.,Operating systems (Computers),Operating systems.,Software engineering.,Software Engineering.
Classification :
QA76
.
9
.
A25


71. 0203931254 (ebook)
Author: edited by Nancy Snow, Philip M. Taylor.
Library: Library of Islamic Parliament (Tehran)
Subject:

73. xiv, 237 p. :
Author: Chris Johnson & Jolyon Leslie.
Library: Library of Islamic Parliament (Tehran)
Subject:

74. xviii, 5,Intern
Author: Carl F. Goodman. ,Jung Wook Cho.
Library: Library of Islamic Parliament (Tehran)
Subject:
