401. The information security dictionary: defining the terms that define security for E-business, internet, information, and wireless technology
Author: Gattiker, Urs E.
Library: Central Library of APLL (Tehran)
Subject: ، Computer networks - Security measures - Dictionaries,، Computer security - Dictionaries,، Information technology - Security measures - Dictionaries
Classification :
TK
5105
.
59
.
G3
2004


402. The information systems security officer's guide :
Author: Dr. Gerald L. Kovaich
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security

403. The internet of risky things :
Author: Sean Smith.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Embedded Internet devices.,Internet of things-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Hardware.,COMPUTERS-- Internet.,COMPUTERS-- Security-- Online Safety & Privacy.,Embedded Internet devices.,TECHNOLOGY & ENGINEERING-- Industrial Technology.,TECHNOLOGY & ENGINEERING-- Mobile & Wireless Communications.,TECHNOLOGY & ENGINEERING-- Remote Sensing & Geographic Information Systems.,TECHNOLOGY & ENGINEERING-- Robotics.,TECHNOLOGY & ENGINEERING-- Sensors.
Classification :
TK5105
.
8857
.
S65
2017


404. The roots of reading comprehension instruction / P. David Pearson -- The development of children's reading comprehension / Scott G. Paris and Ellen E. Hamilton -- In search of the "simple view" of reading comprehension / James V. Hoffman -- Identifying and describing constructively responsive comprehension strategies in new and traditional forms of reading / Peter Afflerbach and Byeong-Young Cho -- Helping readers make sense of print : research that supports a whole language pedagogy / Kenneth S. Goodman and Yetta M. Goodman -- The role of cognitive flexibility in reading comprehension : past, present, and future / Kelly B. Cartwright -- Ways of meaning making : sociocultural perspectives on reading comprehension / James Gavelek and Patrick Bresnahan -- Transactional theory and critical theory in reading comprehension / James S. Damico, Gerald Campano, and Jerome C. Harste -- Grounding reading comprehension in the neuroscience literatures / George G. Hruby -- Text comprehension : a retrospective, perspective, and prospective / Emily Fox and Patricia A. Alexander -- Disciplinary comprehension / Cynthia Shanahan -- The agency and artistry of meaning makers within and across digital spaces / Robert J. Tierney -- Comprehension and computer technology : past results, current knowledge, and future promises / Michael L. Kamil and Helen Kim Chou -- Motivation and reading comprehension / Samuel D. Miller and Beverly S. Faircloth -- Vocabulary and reading comprehension : the nexus of meaning / James F. Baumann -- Cognitive strategy instruction / Janice A. Dole, Jeffery D. Nokes, and Dina Drits -- Metacognitive processes and reading comprehension / Linda Baker and Lisa Carter Beall -- Self-regulated comprehension / Dixie D. Massey -- Formal and informal measures of reading comprehension / Lauren Leslie and Joanne Caldwell -- Assessing comprehension of young children / Katherine A. Dougherty Stahl -- Approaches to teaching reading comprehension / Taffy E. Raphael ... [et al.] -- Comprehension and discussion of text / Janice F. Almasi and Keli Garas-York -- Comprehension instruction in kindergarten through grade three / Cathy Collins Block and Jan Lacina -- Developing higher order comprehension in the middle grades / Ruth Wharton-McDonald and Shannon Swiger -- Improving adolescent comprehension : developing comprehension strategies in the content areas / Mark W. Conley -- Comprehension difficulties among struggling readers / Richard L. Allington and Ann McGill-Franzen -- Reading comprehension and diversity in historical perspective : literacy, power, and native Hawaiians / Kathryn H. Au and Julie Kaomea -- Culturally relevant pedagogy and reading comprehension / Colleen M. Fairbanks ... [et al.] -- Reading comprehension and English language learners / Kathryn Prater -- Family literacy and reading comprehension / Patricia A. Edwards and Jennifer D. Turner -- Improving comprehension instruction through quality professional development / Misty Sailors -- Public policy and the future of reading comprehension research / Cathy Roller -- Where to from here? : themes, trends, and questions / Gerald G. Duffy ... [et al.]. 0
Author: edited by Susan E. Israel, Gerald G. Duffy.
Library: Library of Islamic Parliament (Tehran)
Subject:

405. The superpowers -- "The Arabs are coming!" -- "Jihad!" -- The co-opted caliphate and the stumbling Jihad -- The year 711 -- Picking up the pieces after Rome -- The myth of Poitiers -- The fall and rise of the Umayyads -- Saving the popes -- An empire of force and faith -- Carolingian Jihads: Roncesvalles and Saxony -- The great mosque -- The first Europe, briefly -- Equipoise--delicate and doomed -- Disequilibrium Pelayo's revenge -- Knowledge transmitted, rationa
Author: David Levering Lewis.
Library: Library of Islamic Parliament (Tehran)
Subject:

406. Toward a safer and more secure cyberspace /
Author: Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Cyberterrorism-- Prevention.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Cyberterrorism-- Prevention.
Classification :
QA76
.
9
.
A25
T695
2007eb


407. Transformational security awareness :
Author: Perry Carpenter.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,BUSINESS & ECONOMICS-- Production & Operations Management.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Operating Systems-- General.
Classification :
QA76
.
9
.
A25
C37
2019eb


408. Transforming cybersecurity using COBIT 5
Author: [by ISACA].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises -- Computer networks -- Security measures.,COBIT (Information technology management standard),Computer security.

409. Trust in cyberspace /
Author: Fred B. Schneider, editor ; Committee on Information Systems Trustworthiness, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Internet-- Security measures.,Telecommunication policy-- United States.,Computer Security.,Internet.,Public Policy.,Telecommunications.,BUSINESS & ECONOMICS-- Industries-- Media & Communications.,Computer networks-- Security measures.,COMPUTERS.,Electrical & Computer Engineering.,Engineering & Applied Sciences.,Internet / Security.,Internet-- Security measures.,Internet.,Sicherheit,TECHNOLOGY & ENGINEERING-- Telecommunications.,Telecommunication policy.,Telecommunications.,Telekommunikationspolitik,Verteiltes System,United States.,USA., 7, 7
Classification :
TK5105
.
59
.
T78
1999eb


410. Trust management VII :
Author: Carmen Fernández-Gago [and others] (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
C376
2013


411. Trusted computing platforms
Author: / Siani Pearson, editor
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security- Standards,Computer networks- Security measures,Electronic information resources- Access control
Classification :
QA76
.
9
.
A25
,
T75
2003


412. Vehicle safety communications
Author: Luca Delgrossi, Tao Zhang
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Automobiles-- Collision avoidance systems,Automobiles-- Safety appliances,Vehicular ad hoc networks (Computer networks)-- Safety measures
Classification :
TE228
.
37


413. Vehicle safety communications
Author: Luca Delgrossi, Tao Zhang.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Automobiles-- Collision avoidance systems.,Automobiles-- Safety appliances.,Vehicular ad hoc networks (Computer networks)-- Safety measures.

414. What every engineer should know about cyber security and digital forensics /
Author: Joanna F. DeFranco
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation,Computer networks-- Security measures,Computer security
Classification :
TK5105
.
59
.
D44
2014


415. Wireless Communications under Hostile Jamming :
Author: Tongtong Li, Tianlong Song, Yuan Liang.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Radio-- Interference.,Wireless communication systems-- Security measures.,Communications Engineering, Networks.,Computer Communication Networks.,Information Systems and Communication Service.,Signal, Image and Speech Processing.,Systems and Data Security.,Communications engineering / telecommunications.,Computer networking & communications.,Computer security.,COMPUTERS / Networking / Security.,COMPUTERS / Security / General.,Imaging systems & technology.,Network hardware.,Radio-- Interference.,Wireless communication systems-- Security measures.
Classification :
TK5103
.
2


416. Wireless networks
Author: / Cristina Comaniciu, Narayan B. Mandayam, H. Vincent Poor
Library: Central Library and Document Center of Arak University (Markazi)
Subject: Wireless communication systems --Security measures,Computer networks --Security measures,Demodulation (Electronics)
Classification :
621
.
3821
C728w


417. Wireless networks
Author: / Cristina Comaniciu, Narayan B. Mandayam, H. Vincent Poor., Comaniciu, Cristina.
Library: Library of College of Science University of Tehran (Tehran)
Subject: Includes bibliographical references and index., Cross-layer designs (Telecommunications), Wireless communication systems--Security measures., Computer networks--Security measures., Demodulation (Electronics)
Classification :
TK
5103
.
2
.
C64
2005


418. Wireless networks : multiuser detection in cross-layer design
Author: Cristina Comaniciu, Narayan B. Mandayam, H. Vincent Poor
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Security measures ، Wireless communication systems,، Computer networks -- Security measures,، Demodulation )Electronics(
Classification :
TK
5103
.
2
.
C65W5


420. 9780275990787 (alk. paper)
Author: edited by Linda S. Levstik, Cynthia A. Tyson.
Library: Library of Islamic Parliament (Tehran)
Subject:
