21. Digital rights management : ACM CCS-9 workshop, DRM 2002, Washington, DC, USA, November 18, 2002 : revised papers
Author: Joan Feigenbaum )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Privacy, Right of,Congresses ، Data protection
Classification :
QA
76
.
L28
Vol
.
2696


22. Enterprise Web services security
Author: Rickland Hollar, Richard Murphy.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures.,Web services.,Web sites -- Security measures.
Classification :
TK5105
.
59
R535
2006


23. Exploding data :reclaiming our cybersecurity in the digital age
Author: Chertoff, Michael
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Law and legislation ، Data protection - United States,Government policy ، Data protection - United States,Data protection ، Conflict of laws - United States,Law and legislation ، Computer security - United States,Government policy ، Computer security - United States,، Privacy, Right of - United States,Law and legislation ، Internet - United States,، Information warfare )International law(
Classification :
KF
1263
.
C65
C44
2018


24. Fuzzing for software security testing and quality assurance /
Author: Ari Takanen, Jared DeMott, Charlie Miller, Atte Kettunen.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer software-- Development.,Computer networks-- Security measures.,Computer security.,Computer software-- Development.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
F89
2018eb


25. 2001 IEEE Symposium on Security and Privacy: S&P 2001: proceedings: 14-16 May, 2000]sic[, Oakland, California
Author: IEEE Symposium on Security and Privacy )1002: Oakland, California(
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Computers- Access control- Congresses,، Data protection- Congresses,، Privacy, Right of- Congresses,، Telecommunication- Security measures- Congresses
Classification :
QA
76
.
9
.
A25
S377
2001


26. 2001 IEEE Symposium on Security and Privacy: S&P 2001: proceedings: 14-16 May, 2000]sic[, Oakland, California
Author: sponsored by IEEE Computer Society Technical Committee on Security and Privacy
Library: Central Library and Documentation Center (Kerman)
Subject: Congresses ، Computers - Access control,Congresses ، Data protection,Congresses ، Privacy, Right of,Security measures - Congresses ، Telecommunication
Classification :
QA
76
.
9
.
A25
I344
2001


27. 20090601 ,Includes bibliographical references and index. 0
Author: 20090602 ,20090602 0
Library: Library of Islamic Parliament (Tehran)
Subject:

28. Information assurance and security ethics in complex systems
Author: / [edited by]Melissa Jane Dar
Library: Insurance Research Institute Library (Tehran)
Subject: Computer security,Data protection,Privacy, Right of,Information technology, Security measures
Classification :
QA76
.
9
.
I5
2011


29. Information assurance architecture /
Author: Keith D. WIllett.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Communication systems-- Management.,Computer networks-- Security measures.,Computer security.,Data protection.,Information resources management.,Information technology-- Management.,Business enterprises-- Communication systems-- Management.,Computer networks-- Security measures.,Computer security.,Data protection.,Information resources management.,Information technology-- Management.
Classification :
QA76
.
9
.
A25
W5487
2008


30. Information communication technology law, protection, and access rights global approaches and issues
Author: Irene Maria Portela, Maria Manuela Cruz-Cunha ]editors[
Library: Vali Asr University Central Library (Kerman)
Subject: Information superhighway,Information superhighway,Information superhighway,Information superhighway,Internet,Electronic records,Data protection,Privacy, Right of,Intellectual property
Classification :
K
564
.
C6I543
2010


31. Information privacy fundamentals for librarians and information professionals
Author: / Cherie L. Givens
Library: Library and knowledge management of the management schools of Tehran University (Tehran)
Subject: Records--Access control--United States,Data protection--Law and legislation--United States,Computer security--Law and legislation--United States,Privacy, Right of--United States,Library legislation--United States,Information services--Law and legislation--United States
Classification :
025
.
5
G539i
2015


32. Information security a manager's guide to thwarting data thieves and hackers
Author: / Philip Alexander
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Business enterprises , Computer networks , Security measures,Information technology , Security measures,Computer security,Data protection
Classification :
HF5548
.
37
.
A44
2008


33. Information security and privacy
Author: / Josef Pieprzyk, Hossein Ghodosi, Ed. Dawson (Eds.)
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computers -- Access control -- Congresses,Computer security -- Congresses,Data protection -- Congresses,Privacy, Right of -- Congresses
Classification :
QA
76
.
9
.
A251


34. Information security and privacy : First Australasian Conference, ACISP'96, wollongong, NSW, Australia, June 24-26, 1996 : proceedings
Author: Josef Pieprzyk, Jennifer Seberry )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
Classification :
QA
76
.
L28
Vol
.
1172


35. Information security and privacy : Second Australian Conference,ACISP'97, Sydney, NSW, Australia, June 7-9, 1997 : proceedings
Author: Vijay Varadharajan, Josef Pieprzyk, Yi Mu, )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
Classification :
QA
76
.
L28
Vol
.
1270


36. Information security and privacy : Third Australasian Conference, ACISP'98, Brisbane, Australia, July 13-15, 1998 : proceedings
Author: Colin Boyd, Ed Dawson, )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
Classification :
QA
76
.
L28
Vol
.
1438


37. Information security and privacy : 5th Australasian Conference, ACISP'2000, Brisbane, Australia, July 10-12, 2000 : proceedings
Author: Ed Dawson, Andrew Clark, Colin Boyd )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
Classification :
QA
76
.
L28
Vol
.
1841


38. Information security and privacy : 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings
Author: Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
Classification :
QA
76
.
L28
Vol
.
3108


39. Information security and privacy : 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999 : proceedings
Author: Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Privacy, Right of
Classification :
QA
76
.
L28
Vol
.
1587


40. Information security and privacy : 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002 : proceedings
Author: Lynn Batten, Jennifer Seberry )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Data protection,Congresses ، Privacy, Right of
Classification :
QA
76
.
L28
Vol
.
2384

