135. A multidisciplinary introduction to information security /
Author: [edited by] Stig F. Mjølsnes
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Multidisciplinary design optimization
Classification :
QA76
.
9
.
A25
M845
2012


136. A survey of Islamic history -- Why an introduction to Islam specifically for Jews? -- Arabs and Israelites -- Pre-Islamic origins -- The emergence of Islam -- Muhammad and the Jews of Medina -- The death of the prophet and the expansion of the community -- The conquests -- The caliphal dynasties -- The decline of the Muslim world -- God, the Qur'an, and Islamic law -- God -- The five doctrines or "pillars of faith" -- The evolution of a formal theology -- The Qur'an -- The interpretive tradition -- The prophetic record -- Islamic law -- The workings of shari'a -- The umma: Islam in practice -- The umma and the caliphate -- The five pillars of Islam -- A sixth pillar? Jihad -- The range of practice among Muslims -- Sufism -- The shi'a -- Mosque and clergy -- The calendar -- The Muslim life-cycle -- Personal observance. 0
Author: Reuven Firestone.
Library: Library of Islamic Parliament (Tehran)
Subject:

137. AVIEN malware defense guide for the Enterprise /
Author: David Harley [and others] ; foreword by Robert S. Vibert.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Computer viruses.,Computer networks-- Security measures.,Computer security-- Management.,Computer viruses.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
A873
2007eb


138. Access to online resources :
Author: by Kristina Botyriute.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Collection management (Libraries),Computer networks-- Security measures.,Database security.,Electronic information resources-- Access control.,Electronic information resources-- Management.,Computer Security.,Information Services.,Internet.,Collection management (Libraries),Computer networks-- Security measures.,Database security.,Electronic information resources-- Access control.,Library & information sciences.
Classification :
Z695
.
24


139. Adaptive security management architecture
Author: / James S. Tiller
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures
Classification :
E-BOOK

140. Advanced relay technologies in next generation wireless communications /
Author: edited by Ionnis Krikidis and Gan Zheng.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Antenna arrays.,Computer networks.,Electromagnetic interference.,Energy conservation.,Telecommunication-- Security measures.,Wireless communication systems.,antenna arrays.,Antenna arrays.,Computer networks.,cooperative communication.,Electromagnetic interference.,energy conservation.,Energy conservation.,free-space optical communication.,MIMO communication.,next generation networks.,radiofrequency interference.,radiofrequency power transmission.,relay networks (telecommunication),TECHNOLOGY & ENGINEERING-- Mechanical.,telecommunication power management.,Telecommunication-- Security measures.,telecommunication security.,Wireless communication systems
Classification :
TK5103
.
2

