1721. Theoretic Approach-Network Security : A Decision and Game
Author: / Alpcan, Tansu
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: METHODS&COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, THEORY
Classification :
E-BOOK

1722. Theoretical aspects of distributed computing in sensor networks /
Author: Sotiris Nikoletseas, José D.P. Rolim, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Mobile computing.,Multisensor data fusion.,Sensor networks-- Data processing.,Informatique.,Mobile computing.,Multisensor data fusion.
Classification :
TK7872
.
D48
T44
2011


1723. Theory of Cryptography :
Author: Amos Beimel, Stefan Dziembowski (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses.,Business & Economics-- Information Management.,Computer security.,Computers-- Hardware-- Network Hardware.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Data encryption (Computer science),Data encryption.,Ethical & social aspects of IT.,Information architecture.,Law-- Science & Technology.,Legal aspects of IT.,Network hardware.
Classification :
QA76
.
9
.
A25


1724. Theory of cryptography
Author: Yuval Ishai (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
T44
2011


1725. Third International Congress on Information and Communication Technology :
Author: Sin-She Yang, Simon Sherratt, Nilanjan Dey, Amit Joshi, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks, Congresses.,Information technology, Congresses.,Internet of things, Congresses.,Computer networks.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Information technology.,Internet of things.
Classification :
T58
.
5


1726. Threat Modeling : Designing for Security
Author: / Shostack, Adam
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: COMPUTER SCIENCE, INFORMATION TECHNOLOGY
Classification :
E-BOOK

1727. Threat forecasting :
Author: John Pirc, David DeSanto, Iain Davison, Will Gragido
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Big data.,Computer security.
Classification :
QA76
.
9
.
A25


1728. Topical directions of informatics :
Author: by Ivan V. Sergienko
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.
Classification :
QA75
.
5


1729. Toward a safer and more secure cyberspace /
Author: Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Cyberterrorism-- Prevention.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Cyberterrorism-- Prevention.
Classification :
QA76
.
9
.
A25
T695
2007eb


1730. Towards hardware-intrinsic security :
Author: Ahmad-Reza Sadeghi, David Naccache, editors ; foreword by Pim Tuyls.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer input-output equipment.,Computer input-output equipment.,Informatique.
Classification :
TK7887
.
5
.
T69
2010eb


1731. Towards next generation grids :
Author: edited by Thierry Priol, Marco Vanneschi.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computational grids (Computer systems), Congresses.,Computational grids (Computer systems),Computational grids (Computer systems),COMPUTERS-- Client-Server Computing.,Informatique.
Classification :
QA76
.
9
.
C58
C675
2007eb


1732. Towards the Internet of Things :
Author: Mohammad Ali Jabraeil Jamali, Bahareh Bahrami, Arash Heidari, Parisa Allahverdizadeh, Farhad Norouzi.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Internet of things.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Internet of things.
Classification :
TK5105
.
8857


1733. Transactions on Computational Science X: Special Issue on Security in Computing, Part I
Author: / Luca Compagna, Paul El Khoury, Fabio Massacci (auth.), Marina L. Gavrilova, C. J. Kenneth Tan, Edward David Moreno (eds.)
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: ARCHITECTURE|COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, SOFTWARE ENGINEERING|ENGINEERING, MULTIDISCIPLINARY&COMPUTER SCIENCE, HARDWARE
Classification :
E-BOOK

1734. Transactions on Data Hiding and Multimedia Security IX
Author: / Yun Q. Shi, Feng Liu, Weiqi Yan
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: METHODS&COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, THEORY
Classification :
E-BOOK

1735. Transactions on Data Hiding and Multimedia Security VI
Author: / Fu Chang, Regunathan Radhakrishnan, Fulong Ma, Li Zhao (eds.)-Tsong Ng, Wei Su (auth.), Yun Q. Shi, Sabu Emmanuel, Mohan S. Kankanhalli, Shih-Patchara Sutthiwan, Yun Q. Shi, Hong Zhao, Tian
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: ARCHITECTURE|COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, SOFTWARE ENGINEERING&COMPUTER SCIENCE, HARDWARE
Classification :
E-BOOK

1736. Transactions on Data Hiding and Multimedia Security VIII
Author: / Yun Q. Shi, Stefan Katzenbeisser
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: METHODS&COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, THEORY
Classification :
E-BOOK

1737. Transactions on Data Hiding and Multimedia Security X
Author: / Yun Q. Shi
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: METHODS&COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, THEORY
Classification :
E-BOOK

1738. Transactions on computational science XXXIII /
Author: Marina L. Gavrilova, C.J. Kenneth Tan (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Internet of things.,Wireless communication systems.,Computer Applications.,Computer Communication Networks.,Logic Design.,Mathematics of Computing.,Operating Systems.,Theory of Computation.,Computer architecture & logic design.,Computer science.,Computers-- Computer Science.,Computers-- Data Processing.,Computers-- Hardware-- Network Hardware.,Computers-- Logic Design.,Computers-- Operating Systems-- General.,Information technology: general issues.,Internet of things.,Mathematical theory of computation.,Network hardware.,Operating systems.,Wireless communication systems.
Classification :
TK5105
.
8857


1739. Transformational security awareness :
Author: Perry Carpenter.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,BUSINESS & ECONOMICS-- Production & Operations Management.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Operating Systems-- General.
Classification :
QA76
.
9
.
A25
C37
2019eb

