81. Cryptology and network security :
Author: Srdjan Capkun, Sherman S.M. Chow (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Coding theory & cryptology.,Computer networks-- Security measures.,Computers-- Database Management-- Data Mining.,Computers-- Information Technology.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data mining.,Ethical & social aspects of IT.,Information retrieval.,Software Engineering.
Classification :
QA76
.
9
.
A25


82. Data privacy management and autonomous spontaneous security :
Author: Roberto Di Pietro [and others] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.

83. Data privacy management and autonomous spontaneus [sic] security
Author: Joaquin Garcia-Alfaro ... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A97
D76
2011eb


84. E-Voting and Identity
Author: edited by Peter Y. A. Ryan, Berry Schoenmakers.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Computer science.,Data encryption (Computer science),Data protection.,Information storage and retrieval systems.,Software engineering.

85. Engineering secure software and systems
Author: Gilles Barthe, Benjamin Livshits, Riccardo Scandariato (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Software engineering, Congresses
Classification :
QA76
.
9
.
A25
E54
2011eb


86. Engineering secure two-party computation protocols
Author: Thomas Schneider
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols,Computer networks-- Security measures,Data encryption (Computer science)
Classification :
TK5105
.
55
.
S36
2012eb


87. Financial Cryptography and Data Security :
Author: edited by Jim Blyth, Sven Dietrich, L. Jean Camp.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Data encryption (Computer science)

88. Financial cryptography: First International Conference, FC'97, Anguilla, British West Indies, Feb. 24-28, 1997: proceedings
Author: FC'79 )7991: Anguilla(
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Electronic funds transfers-- Security measures-- Congresses,، Internet )Computer network(-- Security measures-- Congresses,، Computer networks-- Security measures-- Congresses,، Data encryption )Computer science(-- Congresses
Classification :
HG
1710
.
F35
1997


89. Financial cryptography (Online)
Author: Rafael Hirschfeld (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Electronic funds transfers-- Security measures, Congresses.,Internet-- Security measures, Congresses.

90. Financial cryptography and data security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Congresses. ; Data encryption (Computer science) ; Congresses. ; Electronic commerce ; Security measures ; Congresses. ; Electronic funds transfers ; Security measures ; Congresses. ; Internet ; Security measures ;

91. Financial cryptography: 4th international conference, FC 2000, Anguilla, British West Indies, February 20-24, 2000: proceedings
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Electronic funds transfers-- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Electronic commerce-- Security measures,Congresses ، Internet-- Security measures,Congresses ، Computer networks-- Security measures
Classification :
HG
1710
.
F35
2000


92. Financial cryptography: 8th international conference, FC 2004, Key West, FL, USA, February 9-12, 2004 : revised papers
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Electronic funds transfers-- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Electronic commerce-- Security measures,Congresses ، Internet-- Security measures,Congresses ، Computer networks-- Security measures
Classification :
HG
1710
.
F35
2004


93. Foundations of Security Analysis and Design III :
Author: edited by Alessandro Aldini, Roberto Gorrieri, Fabio Martinelli.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Data encryption (Computer science)

94. Hacking point of sale
Author: Slava Gomzin
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures,Data encryption (Computer science),Electronic funds transfers-- Security measures,Point-of-sale systems
Classification :
HD30
.
38
.
G66
2014


95. Holistic approach to quantum cryptography in cyber security
Author: edited Shashi Bhushan... [et al.].
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Data encryption (Computer science),Computer networks,Quantum cryptography.,Security measures.,Risk Analysis Assessment.

96. Implementing SSH
Author: Himanshu Dwivedi
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: UNIX Shells,Computer networks- Security measures,Data encryption (Computer science)
Classification :
QA
,
76
.
76
,.
O63
,
D895
,
2004


97. Implementing SSH
Author: / Himanshu Dwivedi
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: UNIX Shells,Computer networks- Security measures,Data encryption (Computer science)
Classification :
QA76
.
76
.
O63
,
D895
2004


98. Implementing SSL/TLS using cryptography and PKI /
Author: Joshua Davies.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Data encryption (Computer science)
Classification :
TK5105
.
59
.
D39
2011


99. Information Security Practice and Experience
Author: edited by Mark D. Ryan, Ben Smyth, Guilin Wang
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks,Computer science,Data encryption (Computer science),Data protection,Information storage and retrieval systems,Information Systems,Computer Communication Networks,Computer Science,Computers and Society,Data Encryption,Information Storage and Retrieval,Management of Computing and Information Systems,Systems and Data Security

100. Information Security Practice and Experience
Author: \ Javier Lopez , Yongdong Wu (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses.,Computer networks -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
QA
76
.
9
.
A25I5
2015
E-Book
,

