581. SSH, the secure shell :
Author: Daniel J. Barrett and Richard E. Silverman
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: UNIX shells,Computer networks-- Security measures,Data encryption (Computer science)
Classification :
QA76
.
76
.
O63
B369
2001


582. SSH, the secure shell
Author: / Daniel J. Barrett and Richard E. Silverman
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: UNIX shells.,Data encryption (Computer science),Computer networks--Security measures
Classification :
QA
,
76
.
76
,.
O63
,
B369
,
2001


583. SSH, the secure shell : the defenitive guide
Author: Daniel J. Barrett and Richard E. Silverman
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، UNIX Shells,، Data encryption )Computer science(,، Computer networks -- Security measures
Classification :
QA
76
.
76
.
O63B27
2001


584. SSH, the secure shell: the definitive guide
Author: Barrett, Daniel J
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Data encryption )Computer science(,، Computer networks-- Security measures
Classification :
QA
76
.
76
.
O63
.
B369
2001


585. Secret history :
Author: Craig P. Bauer, York College of Pennsylvania and National Security Agency, Center for Cryptologic History, 2011-2012 Scholar-in-Residence
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Ciphers,Computer security,Cryptography-- History,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
B384
2013


586. Secure XML
Author: / Donald E. Eastlake III, Kitty Niles
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: XML (Document markup language),Computer security,Computer networks- Security measures,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
,
E32
2002


587. Secure XML
Author: / Donald E. Eastlake III, Kitty Niles
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: XML (Document markup language),Computer security,Computer networks- Security measures,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
,
E32
2002


588. Secure XML :
Author: Donald E. Eastlake III, Kitty Niles.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),XML (Document markup language)

589. Secure data management : VLDB 2004 workshop, SDM 2004, Toronto, Canada, August 30, 2004 : proceedings
Author: Willem Jonker, Milan Petkovic )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Database security,Congresses ، Data encryption )Computer science(,Congresses ، Data protection,Congresses ، Computers -- Access control,Congresses ، Database management
Classification :
QA
76
.
L28
Vol
.
3178


590. Secure data management : second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005 : proceedings
Author: Willem Jonker, Milan Petkovic )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Database security,Congresses ، Data encryption )Computer science(,Congresses ، Data protection,Congresses ، Computers -- Access control,Congresses ، Database management
Classification :
QA
76
.
L28
Vol
.
3674


591. Secure messaging with PGP and S/MIME
Author: Oppliger, Rolf.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Telecommunication systems,، PGP )Computer file(,، Data encryption )Computer science(,Security measures ، Electronic mail systems
Classification :
TK
5102
.
85
.
O67
2001


592. Secure messaging with PGP and S/MIME
Author: Rolf Oppliger
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Telecommunication systems,، PGP )Computer file(,، Data encryption )Computer science(,Security measure ، Electronic commerce
Classification :
TK
5102
.
85
.
O67


593. Securing SQL Server :
Author: Peter A. Carter
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: SQL server,Database security,Computer Science,Database Management,Systems and Data Security
Classification :
QA76
.
9
.
D314


594. Securing digital video
Author: / Eric Diehl
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Digital video--Security measures,Digital rights management.,Data protection.,Data encryption (Computer science)
Classification :
TK6680
.
5
.
D54
2012


595. Securing digital video
Author: Eric Diehl
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Data protection,Digital rights management,Digital video-- Security measures
Classification :
TK6680
.
5
.
D54
2012eb


596. Securing information and communications systems
Author: Steven M. Furnell ... [et al.]&, editors
Library: Central Library and Document Center of Shahid Madani University of Azarbayjan (East Azarbaijan)
Subject: Computer security,Computer networks- Security measures,Data encryption (Computer science)
Classification :
QA
,
76
.
9
,.
A25S375
,
2008


597. Securing information and communications systems :
Author: Steven M. Furnell [and others], editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Chiffrement (Informatique),Infrastructure à clé publique (Sécurité informatique),Réseaux d'ordinateurs-- Sécurité-- Mesures.,Sécurité informatique.,Systèmes informatiques-- Sécurité-- Mesures.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
S37563
2008eb


598. Securing information and communications systems
Author:
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer security,Computer networks--Security measures,Data encryption (Computer science)
Classification :
QA
76
.
9
.
A25
S375
2008


599. Security, Privacy, and Anonymity in Computation, Communication, and Storage :
Author: edited by Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence.,Computer network architectures.,Computer science.,Data protection.,Information systems.,Artificial intelligence.,Computer network architectures.,Computer science.,Data protection.
Classification :
QA76
.
9
.
A25


600. Security, Privacy, and Applied Cryptography Engineering
Author: \ Claude Carlet, M. Anwar Hasan, Vishal Saraswat (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer security -- Congresses,رمزگذاری دادهها -- کنگرهها ,کامپیوترها -- ایمنی اطلاعات -- کنگرهها
Classification :
E-Book
,
