21. Infosecurity 2008 threat analysis /
Author: [authors, Champ Clark III ... [et al.]] ; foreword by Richard Ford
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Computers-- Access control,Data protection,Database security,Telecommunication-- Security measures

22. Intelligence computation and evolutionary computation :
Author: Zhenyu Du (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computational intelligence -- Congresses.,Evolutionary computation -- Congresses.,Intelligence informatique -- Congrès.

23. Introduction to e-commerce /
Author: by Zheng Qin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Electronic commerce, Case studies.,Electronic commerce.,BUSINESS & ECONOMICS-- E-Commerce-- Auctions & Small Business.,BUSINESS & ECONOMICS-- E-Commerce-- Internet Marketing.,BUSINESS & ECONOMICS-- Mail Order.,BUSINESS & ECONOMICS-- Marketing-- Telemarketing.,COMPUTERS-- Electronic Commerce.,Electronic commerce.,Informatique.
Classification :
HF5548
.
32


24. Metasploit Penetration Testing Cookbook :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Computers-- Access control.,Data protection.,Information technology-- Security measures.,Computer networking & communications.,Computer networks-- Security measures.,Computer security-- Management.,Computer security.,Computers-- Access control.,Computers-- Networking-- Security.,Computers-- Security-- General.,Computers-- System Administration-- General.,Data protection.,Information technology-- Security measures.,Network security.
Classification :
QA76
.
9
.
A25
.
T459
2018eb


25. Microsoft System center configuration manager 2007 administrator's companion
Author: Steven D. Kaczmarek with the Microsoft System center configuration manager team.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Management.,COMPUTERS -- Data Transmission Systems -- General.,Microsoft System center configuration manager.
Classification :
TK5105
.
5
S748
2008


26. Migrating to MariaDB :
Author: William Wood.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: MariaDB.,MariaDB.,Database management-- Computer programs.,Open source software.,Database management-- Computer programs.,Open source software.
Classification :
QA76
.
9
.
D3
W66
2016


27. New technologies for digital crime and forensics: devices, applications, and software
Author: Chang-Tsun Li and Anthony T.S. Ho, editors
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Technological innovations ، Criminal investigation
Classification :
HV
8073
.
N468


28. Oracle high availability, disaster recovery, and cloud services :
Author: Y.V. Ravi Kumar, Nassyam Basha, Krishna Kumar K.M., Bal Mukund Sharma and Konstantin Kerekovski.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Oracle (Computer file),Oracle (Computer file),Cloud computing.,Relational databases.,Cloud computing.,COMPUTERS-- Databases-- General.,Relational databases.
Classification :
QA76
.
9
.
D3


29. Policy-based autonomic data governance /
Author: Seraphin Calo, Elisa Bertino, Dinesh Verma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Autonomic computing.,Computer networks-- Security measures.,Computer security.,Autonomic computing.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25
P65
2019


30. Practical Hadoop security /
Author: Bhushan Lakhe
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Apache Hadoop,Data encryption (Computer science),Data protection,Database security
Classification :
QA76
.
9
.
D314
L35
2014


31. Privacy in statistical databases
Author: Josep Domingo-Ferrer, Ilenia Tinnirello (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data protection, Congresses,Database security, Congresses,Statistics-- Databases, Congresses
Classification :
QA76
.
9
.
D314
P73
2012eb


32. Privacy-preserving data mining :
Author: edited by Charu C. Aggarwal and Philip S. Yu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data mining.,Data protection.,Computer security.,Computer security.,COMPUTERS-- Database Management-- Data Mining.,Data mining.,Data mining.,Data protection.,Data protection.,Informatique.
Classification :
QA76
.
9
.
D343
P75
2008eb


33. Proceedings of The IFIP TC 11 23rd International Information Security Conference
Author: / edited by Sushil Jajodia, Pierangela Samarati, Stelvio Cimato.
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer networks -- Security measures -- Congresses, Computers -- Access control -- Congresses, Computer security -- Congresses,Computer networks -- Access control -- Congresses,Data protection -- Congresses
Classification :
QA
76
.
9
.
A25I461
2008


34. Proceedings of The Ifip Tc 11 23rd International Information Security Conference :
Author: edited by Sushil Jajodia, Pierangela Samarati, Stelvio Cimato, Sushil Jajodia, Pierangela Samarati, Stelvio Cimato.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Computers -- Law and legislation.,Data protection.

35. Quality of protection :
Author: edited by Dieter Gollmann, Fabio Massacci, Artsiom Yautsiukhin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Quality control, Congresses.,Computer networks-- Standards, Congresses.,Computer security-- Quality control, Congresses.,Computer security-- Standards, Congresses.,Computer networks-- Quality control.,Computer networks-- Quality control.,Computer networks-- Standards.,Computer networks-- Standards.,Computer security-- Quality control.,Computer security-- Standards.,Computer security-- Standards.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Informatique.
Classification :
QA76
.
9
.
A25
Q35
2006eb


36. Recent trends in network security and applications :
Author: Natarajan Meghanathan ... [et al.] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,COMPUTERS -- Internet -- Security.,COMPUTERS -- Networking -- Security.

37. Regulating new technologies in uncertain times /
Author: Leonie Reins, editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Big data-- Law and legislation.,Computer security.,Mass media-- Law and legislation.,Technological innovations-- Law and legislation.,Computer security.,Mass media-- Law and legislation.,Technological innovations-- Law and legislation.
Classification :
K487
.
T4
R44
2019


38. Research Directions in Data and Applications Security Ifip Tc11
Author: Wg11.3 Sixteenth Annual Conference on Data and Applications Security July 28-31, 2002, Cambridge, Uk.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject:
Classification :
QA76
.
9
.
D314
W475
2013


39. Research directions in database security
Author: Teresa F. Lunt ed.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Datenbanksystem,Datensicherung,Kongress
Classification :
QA76
.
9
.
D314
T474
1992


40. SAP security configuration and deployment :
Author: Leslie Wun-Young, technical editor; Joey Hirao [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises -- Computer networks -- Security measures.,Business information services -- Security measures.,SAP ERP.
Classification :
HF5548
.
37
L475
2009

