1. A survey of data leakage detection and prevention solutions
Author: Asaf Shabtai, Yuval Elovici, Lior Rokach
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data protection,Database management,Database security
Classification :
QA76
.
9
.
A25
S46
2012eb


2. Advances in cryptology-- ASIACRYPT 2011 :
Author: edited by Dong Hoon Lee, Xiaoyun Wang
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
.
I58
2011


3. Contemporary computing :
Author: Sanjay Ranka [and others] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science, Congresses.,Soft computing, Congresses.,Computer science.,Computer science.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Informatique.,Soft computing.,Soft computing.
Classification :
QA75
.
5
.
I584
2009


4. Data and applications security and privacy XXVI
Author: Nora Cuppens-Boulahia, Frédéric Cuppens, Joaquin Garcia-Alfaro (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data protection, Congresses,Database security, Congresses,Internet-- Security measures, Congresses
Classification :
QA76
.
9
.
D314
I34
2012eb


5. Data security and security data
Author: Lachlan M. MacKinnon (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data protection, Congresses,Database management, Congresses,Database security, Congresses
Classification :
QA76
.
9
.
D3
B75
2010eb


6. Database security and auditing
Author: Hassan A Afyouni,
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Computer security,Data protection,Database security
Classification :
QA
,
76
.
9
,.
A25A56
,
2006


7. Digital Literacy for Dummies /
Author: by Faithe Wempen
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer literacy,Information literacy,Internet literacy
Classification :
QA76
.
9
.
C64
W46
2015


8. Electric, electronic and control engineering
Author: editors, Fun Shao, Wise Shu and Tracy Tian.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Automatic control -- Congresses.,Electrical engineering -- Congresses.,Electronics -- Congresses.
Classification :
TK5
.
E358
9999


9. Emerging security algorithms and techniques /
Author: editors, Khaleel Ahmad, M.N. Doja, Nur Izura Udzir, Manu Pratap Singh.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Cryptography.,Data encryption (Computer science),Computer security.,COMPUTERS-- Computer Graphics-- Game Programming & Design.,COMPUTERS-- General.,COMPUTERS-- Security-- Cryptography.,COMPUTERS-- Security-- General.,Cryptography.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
E466
2019eb


10. Expert Oracle and Java security :
Author: David Coffin
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Oracle (Computer file),Data encryption (Computer science),Data protection,Database security,Java (Computer program language)
Classification :
QA76
.
9
.
D314
C64
2011


11. Google hacking for penetration testers.dollar5Volume 2 /
Author: Johnny Long.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Google.,Google.,Google.,Computer networks-- Security measures.,Computer security.,Internet programming.,Internet-- Security measures.,Web search engines.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Online Services.,COMPUTERS-- System Administration-- Storage & Retrieval.,Internet programming.,Internet-- Security measures.,Web search engines.
Classification :
TK5105
.
885
.
G66
L66
2008eb


12. Hadoop security /
Author: Ben Spivey & Joey Echeverria
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Data protection,Database security
Classification :
QA76
.
9
.
D5


13. Hands-on cybersecurity with Blockchain :
Author: Rajneesh Gupta.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Blockchains (Databases),Computer networks-- Security measures.,Computer security.,Database security.,Denial of service attacks.,Blockchains (Databases),Computer networks-- Security measures.,Computer security.,Computer security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Online Safety & Privacy.,Data capture & analysis.,Database security.,Denial of service attacks.,Network security.
Classification :
QA76
.
9
.
A25
G87
2018


14. Honeypots :a new paradigm to information security
Author: Joshi, R. C.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Hackers,، Firewalls )Computer security(,Security measures ، Computer networks,Security measures ، Wireless communication systems
Classification :
QA
76
.
9
.
A25
J66
2011


15. How to Secure and Audit Oracle 10g and 11g
Author: \ Ron Ben Natan; Foreword by Pete Finnigan
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,Data protection,Database security,امنیت کامپیوتر,حفاظت دادهها,پایگاههای اطلاعاتی -- امنیت
Classification :
E-Book
,

16. How to secure and audit Oracle 10g and 11g
Author: Ben-Natan, Ron
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Oracle (Computer file) ► Computer security ► Data protection ► Database security
Classification :
76
.
9
.
A25
B446

17. Implementing database security and auditing
Author: / Roy [i.e. Ron] Ben Natan
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Data protection,Database security
Classification :
QA76
.
9
.
A25
,
B45
2005


18. Information security in research and business :
Author: edited by Louise Yngström, Jan Carlsen.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business -- Data processing -- Security measures -- Congresses.,Business -- Data processing -- Security measures.,Computer security -- Congresses.
Classification :
QA76
.
9
.
A25
E358
1997


19. Information storage and management :
Author: edited by G. Somasundaram, Alok Shrivastava.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer storage devices.,Data protection.,Information storage and retrieval systems.,Computer storage devices.,COMPUTERS-- Database Management-- General.,COMPUTERS-- Desktop Applications-- Databases.,COMPUTERS-- System Administration-- Storage & Retrieval.,Data protection.,Information storage and retrieval systems.,Information storage and retrieval systems.,Information technology.
Classification :
QA76
.
9
.
D3
I54
2009eb


20. Information systems methodology :
Author: ed. by G. Bracchi ...
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Datenverarbeitung.,Informationssystem,Informationssystem.
Classification :
T58
.
6
E339
1978

