701. Trusted platform module basic
Author: / by Steven Kinney
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Embedded computer systems.,Computer security.,Data encryption (Computer science)
Classification :
TK
,
7895
,.
E42
,
K56
,
2006eb


702. Trusted platform module basics
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Embedded computer systems. ; Computer security. ; Data encryption (Computer science) ;

703. Trusted platform module basics
Author: by Steven Kinney.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data encryption (Computer science),Embedded computer systems.

704. Trusted platform module basics
Author: / by Steven Kinney
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Embedded computer systems,Computer security,Data encryption (Computer science)
Classification :
E-BOOK

705. Trusted platform module basics
Author: / by Steven Kinney
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Embedded computer systems,Computer security,Data encryption (Computer science)
Classification :
TK7895
.
E42
,
K56
2006


706. Trusted platform module basics
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Embedded computer systems. ; Computer security. ; Data encryption (Computer science) ;

707. Trusted platform module basics. using TPM in embedded systems
Author: Kinney, Steven
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Embedded computer systems,، Computer security,، Data encryption )Computer science(
Classification :
TK
7895
.
E42K56
2006


708. Trusted systems :
Author: edited by Liqun Chen, Moti Yung
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011


709. Trusted systems
Author: Liqun Chen, Moti Yung, Liehuang Zhu (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011eb


710. Trusted systems
Author: Chris J. Mitchell, Allan Tomlinson (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2012eb


711. Trustworthy computing and services
Author: Yuyu Yuan, Xu Wu, Yueming Lu (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I83
2012


712. Trustworthy execution on mobile devices
Author: / Amit Vasudevan, Jonathan M. McCune, James Newsome
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer security,Mobile computing,Mobile communication systems -- Security measures,Computer Science,Systems and Data Security,Computer Communication Networks,Data Encryption,Communications Engineering, Networks
Classification :
QA76
.
9
.
A25


713. Trustworthy reconfigurable systems : enhancing the security capabilities of reconfigurable hardware architectures
Author: Feller,Thomas
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: ، Data encryption)computer science(,، computer security,، adaptive computing systems
Classification :
QA
76
.
9
.
F4


714. Understanding Intrusion Detection Through Visualization
Author: by Stefan Axelsson, David Sands.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Data encryption (Computer science),Data structures (Computer science)
Classification :
TK5105
.
59
B978
2006


715. Understanding cryptography :
Author: by Christof Paar, Jan Pelzl.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography-- Mathematics.,Cryptography.,Data encryption (Computer science),Cryptography-- Mathematics.,Cryptography.,Data encryption (Computer science),Informatique.
Classification :
QA76
.
9
.
A25
P437
2009


716. Unix secure shell
Author: Carasik, Anne H
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، UNIX )Computer file(,، UNIX shells,، Computer networks-- Management,، Data encryption )Computer science(,، Computer networks-- Security measures
Classification :
QA
76
.
76
.
O63
.
C37
1999


717. VIS '91 Verläßliche Informationssysteme :
Author: herausgegeben von Andreas Pfitzmann, Eckart Raubold.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Data encryption (Computer science),Information storage and retrieval systems.
Classification :
QA76
.
9
.
A25
H473
1991


718. Visual cryptography and secret image sharing
Author: edited by Stelvio Cimato, Ching-Nung Yang.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer file sharing -- Security measures.,Data encryption (Computer science),Image processing -- Security measures.
Classification :
TA1637
.
E358
2012


719. Watermarking systems engineering :
Author: Mauro Barni, Franco Bartolini
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
B3792
2004


720. Watermarking systems engineering
Author: / Mauro Barni, Franco Bartolini
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
,
B3792
2004

