481. Pairing-based cryptography-- Pairing 2012
Author: Michel Abdalla, Tanja Lange (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2012


482. Passwords :
Author: Brian Lennon.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computers-- Access control-- Passwords.,Cryptography.,Data encryption (Computer science),Electronic surveillance.,Philology.,54.62 machine readable data.,54.62 machine readable data.,Computers-- Access control-- Passwords.,Cryptography.,Data encryption (Computer science),Digital Humanities,Electronic surveillance.,Kryptologie,Passwort,Philologie,Philology.,Textverarbeitung
Classification :
QA76
.
9
.
A25
L485
2018


483. Policies and research in identity management :
Author: Simone Fischer-Hübner, Elisabeth de Leeuw, Chris Mitchell (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Access control -- Congresses.,Computer networks -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
S566
2013


484. Policy-based autonomic data governance /
Author: Seraphin Calo, Elisa Bertino, Dinesh Verma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Autonomic computing.,Computer networks-- Security measures.,Computer security.,Autonomic computing.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25
P65
2019


485. Post-Quantum Cryptography :
Author: Jintai Ding, Rainer Steinwandt (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses.,Quantum computers, Congresses.,Data encryption (Computer science),Quantum computers.
Classification :
QA76
.
9
.
A25


486. Post-quantum cryptography
Author: Philippe Gaborit (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses,Quantum computers, Congresses
Classification :
QA76
.
9
.
A25
.
P63
2013


487. Post-quantum cryptography :
Author: Bo-Yin Yang (edition)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
P73
2011


488. Post-quantum cryptography :
Author: edited by Tanja Lange, Rainer Steinwandt.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses.,Quantum computers, Congresses.,Coding theory & cryptology.,Computer architecture & logic design.,Computers-- Information Theory.,Computers-- Logic Design.,Computers-- Security-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Quantum computers.,Software Engineering.
Classification :
QA76
.
9
.
A25


489. Post-quantum cryptography
Author: \ Tsuyoshi Takagi (Ed.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Quantum computers -- Congresses.,Computer security -- Congresses.,رمزگذاری دادهها -- کنگرهها ,کامپیوترهای کوانتومی -- کنگره ها ,کامپیوترها -- ایمنی اطلاعات -- کنگرهها
Classification :
QA
76
.
9
.
P6
2016
E-Book
,


490. Practical Hadoop security /
Author: Bhushan Lakhe
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Apache Hadoop,Data encryption (Computer science),Data protection,Database security
Classification :
QA76
.
9
.
D314
L35
2014


491. Practical Mobile Forensics :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cell phone systems-- Security measures.,Mobile computing-- Security measures.,Computer networking & communications.,Computer security.,Computers-- Hardware-- Handheld Devices.,Computers-- Networking-- General.,Computers-- Security-- General.,Mobile phones: consumer/user guides.,Portable & handheld devices: consumer/user guides.
Classification :
QA76
.
9
.
A25
.
P733
2018


492. Practical cryptography :algorithms and implementations using C++
Author: edited by Saiful Azad, Al-Sakib Khan Pathan
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: ، Data encryption )Computer science(,، Coding theory,Data processing ، Cryptography,، C++ )Computer program language(,، COMPUTERS / Programming Languages / General,، COMPUTERS / Software Development & Engineering / General,، COMPUTERS / Security / Cryptography
Classification :
QA
76
.
9
.
A25
P725


493. Practical cryptography for data internetworks
Author: Stallings, William.
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer networks - Security measures , Data encryption )Computer science( , Coding theory , Computer security
Classification :
TK
5105
.
59
.
S73
1996


494. Practical cryptography in Python :
Author: Seth James Nielson, Christopher K. Monson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography.,Data encryption (Computer science),Python (Computer program language),Cryptography.,Data encryption (Computer science),Python (Computer program language)
Classification :
QA76
.
9
.
A25


495. Practical cyber intelligence :
Author: Wilson Bautista Jr.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Cyber intelligence (Computer security),Cyberterrorism-- Prevention.,Information technology-- Security measures.,Coding theory & cryptology.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer science.,COMPUTERS / Security / General,Cyber intelligence (Computer security),Cybernetics & systems theory.,Cyberterrorism-- Prevention.,Data encryption.,Information technology-- Security measures.
Classification :
HV6773


496. Principles of Security and Trust
Author: \ Martín Abadi, Steve Kremer (eds.).
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses. ,Data encryption (Computer science) -- Congresses. ,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
QA76
.
9
.
A25
P66
2015
E-Book
,


497. Principles of security and trust :
Author: Flemming Nielson, David Sands (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer security.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
P67
2019eb


498. Principles of security and trust :
Author: Lujo Bauer, Ralf Küsters (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Algorithms & data structures.,Computer science.,Computer security.,Computer security.,Computers-- Computer Science.,Computers-- Hardware-- Handheld Devices.,Computers-- Information Theory.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Data encryption (Computer science),Information technology: general issues.,Systems analysis & design.
Classification :
QA76
.
9
.
A25
P67
2018eb


499. Principles of security and trust :
Author: David Basin, John C. Mitchell (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
D385
2013


500. Privacy Technologies and Policy
Author: \ Bettina Berendt, ... [et al.] (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,Data encryption (Computer science),کامپیوترها,رمزگذاری دادهها, -- Congresses, -- Congresses, -- کنگرهها, -- کنگرهها, -- ایمنی اطلاعات,a03,a05,a03,a05
Classification :
QA
76
.
9
.
A25
A5
2016
E-Book
,

