21. Applied cryptography and network security
Author: / Jianying Zhou, Moti Yung (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Data encryption (Computer science), Congresses,Computer networks, Security measures, Congresses,Computer networks, Access control, Congresses
Classification :
QA76
.
9
.
A25A26
2010


22. Applied cryptography and network security: 16th international conference, ACNS 2018, Leuven, Belgium, July 2-4, 2018: proceeding
Author: / edited by Bart Preneel, Frederik Vercauteren.
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,Computer networks -- Security measures.,Computer networks.,Data encryption.,Security measures.,Computer science.

23. Applied information security :
Author: David Basin, Patrick Schaller, Michael Schläpfer.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25
B37
2011


24. Applied information security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Data encryption (Computer science) ; Computer networks ; Security measures. ; Data protection. ;

25. Applied information security
Author: / David Basin, Patrick Schaller, Michael Schleapfer
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Data encryption (Computer science),Computer networks--Security measures,Data protection.
Classification :
QA
,
76
.
9
,.
A25
,
B3798
,
2011


26. Artificial Intelligence and Security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Data encryption (Computer science). ; Computer Communication Networks. ; Artificial intelligence. ; Computer vision. ; Systems and Data Security. ;

27. Communication networks for smart grids :
Author: Kenneth C. Budka, Jayant G. Deshpande, Marina Thottan
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Smart power grids.,Computer Communication Networks.,Computer Science.,Data Encryption.,Power Electronics, Electrical Machines and Networks.
Classification :
TK3105


28. Communication networks for smart grids
Author: / Kenneth C. Budka, Jayant G. Deshpande, Marina Thottan
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Smart power grids,Computer networks,Computer Science,Computer Communication Networks,Data Encryption,Power Electronics, Electrical Machines and Networks
Classification :
E-BOOK

29. Computer security :
Author: Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25


30. Computer security - ESORICS 2012
Author: Sara Foresti, Moti Yung, Fabio Martinelli (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
E98
2012eb


31. Critical information infrastructure security :
Author: Sandro Bologna, Bernhard Hämmerli, Dimitris Gritzalis, Stephen Wolthusen (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
C75
2011


32. Critical information infrastructures security :
Author: Eric Luiijf, Inga Žutautaitė, Bernhard M. Hämmerli (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
C75
2018eb


33. Critical information infrastructures security :
Author: Christos Xenakis, Stephen Wolthusen (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
C75
2010


34. Critical infrastructure protection
Author: / Javier Lopez, Roberto Setola, Stephen D. Wolthusen (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks--Security measures,Information networks--Security measures,Data encryption (Computer science),Data structures (Computer science),Information technology--Security measures
Classification :
TK5105
.
59
.
C725
2012


35. Critical infrastructure protection
Author: Javier Lopez, Roberto Setola, Stephen D. Wolthusen (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Data encryption (Computer science),Data structures (Computer science),Information networks-- Security measures,Information technology-- Security measures
Classification :
TK5105
.
59
.
C725
2012eb


36. Cryptanalytic attacks on RSA
Author: Yan, Song Y.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Data encryption )Computer science(,Security measures ، Computer networks,، Cryptography
Classification :
QA
76
.
9
.
A25
Y34


37. Cryptanalytic attacks on RSA
Author: / Song Y. Yan
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Data encryption (Computer science),Computer networks--Security measures,Cryptography.
Classification :
QA
,
76
.
9
,.
A25
,
Y34
,
2007


38. Cryptography:
Author: edited by Ed Dawson, Jovan Golić.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Data encryption (Computer science)

39. Cryptography and Network Security
Author: \ William Stallings.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks -- Security measures.,Data encryption (Computer science),Coding theory.,Computer security.,شبکههای کامپیوتری -- تدابیر ایمنی,رمزگذاری دادهها ,نظریه رمزگذاری
Classification :
TK5105
.
59
.
S71C7
2011


40. Cryptography and Network Security: princilpes and Practice
Author: William Stallings
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computer networks -- security measures,Data encryption (computer science),Coding theory,Computer security
Classification :
TK
،
5105
.
59
،.
S713
،
2006

