4. A multidisciplinary introduction to information security /
Author: [edited by] Stig F. Mjølsnes
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Multidisciplinary design optimization
Classification :
QA76
.
9
.
A25
M845
2012


6. BL,BL
Author: / Marshall G.S. Hodgson. ,20090530 0
Library: Library of Islamic Parliament (Tehran)
Subject:

7. Computer networks and Internets /
Author: Douglas E. Comer, Department of Computer Sciences, Purdue University, West Lafayette, IN 47907.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Internetworking (Telecommunication),Computer networks.,Internetworking (Telecommunication)
Classification :
TK5105
.
5
.
C5897
2015


8. Contemporary computing :
Author: Sanjay Ranka [and others] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science, Congresses.,Soft computing, Congresses.,Computer science.,Computer science.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Informatique.,Soft computing.,Soft computing.
Classification :
QA75
.
5
.
I584
2009


9. Financial cryptography and data security :
Author: Radu Sion (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Electronic commerce -- Security measures -- Congresses.,Electronic funds transfers -- Security measures -- Congresses.

10. Innovative security solutions for information technology and communications :
Author: Jean-Louis Lanet, Cristian Toma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Information technology-- Security measures, Congresses.,Computer networks-- Security measures.,Computer security.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25


11. Internet of vehicles :
Author: Andrzej M.J. Skulimowski, Zhengguo Sheng, Sondès Khemiri-Kallel, Christophe Cérin, Ching-Hsien Hsu (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Embedded Internet devices, Congresses.,Vehicular ad hoc networks (Computer networks), Congresses.,Artificial intelligence.,Computer security.,Computers-- Expert Systems.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Embedded Internet devices.,Expert systems-- knowledge-based systems.,Information retrieval.,Network hardware.,Vehicular ad hoc networks (Computer networks)
Classification :
TE228
.
38


12. Security of Information and communication networks
Author: Kartalopoulos, Stamatios V.
Library: Library of Niroo Research Institue (Tehran)
Subject: ، Management information systems,، Knowledge management,، Computer network protocols,Security measures ، Computer networks
Classification :
T
58
.
6
.
K37
2009


13. Security, privacy and trust in cloud systems /
Author: Surya Nepal, Mukaddim Pathan, editors
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures,Computer networks-- Security measures,Computer security
Classification :
QA76
.
585

