81. Holistic approach to quantum cryptography in cyber security
Author: edited Shashi Bhushan... [et al.].
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Data encryption (Computer science),Computer networks,Quantum cryptography.,Security measures.,Risk Analysis Assessment.

82. Implementing SSH
Author: Himanshu Dwivedi
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: UNIX Shells,Computer networks- Security measures,Data encryption (Computer science)
Classification :
QA
,
76
.
76
,.
O63
,
D895
,
2004


83. Implementing SSH
Author: / Himanshu Dwivedi
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: UNIX Shells,Computer networks- Security measures,Data encryption (Computer science)
Classification :
QA76
.
76
.
O63
,
D895
2004


84. Implementing SSL/TLS using cryptography and PKI /
Author: Joshua Davies.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Data encryption (Computer science)
Classification :
TK5105
.
59
.
D39
2011


85. Information Security Practice and Experience
Author: \ Javier Lopez , Yongdong Wu (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses.,Computer networks -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
QA
76
.
9
.
A25I5
2015
E-Book
,


86. Information Security and Privacy
Author: \ Ernest Foo , Douglas Stebila (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها,رمزگذاری دادهها -- کنگرهها,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
QA
76
.
9
.
A25I5
2015
E-Book
,


87. Information Systems Security :
Author: Sushil Jajodia, Chandan Mazumdar (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
I25
2011


88. Information Systems Security and privacy.
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.,Data protection -- Congresses.,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,رمزگذاری دادهها -- کنگرهها ,حفاظت اطلاعات -- کنگرهها
Classification :
TK
5105
.
59
.
I532
2015
E-Book
,


89. Information and Communications Security
Author: \ Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks -- Security measures -- Congresses,Data protection -- Congresses,Data encryption (Computer science) -- Congresses,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها,حفاظت اطلاعات -- کنگرهها,رمزگذاری دادهها -- کنگرهها
Classification :
TK
5105
.
59
.
I25
I58
2016
E-Book
,


90. Information and Communications Security
Author: \ [Edited by] Lucas C. K. Hui...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Data protection -- Congresses.,Data encryption (Computer science) -- Congresses.,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,حفاظت اطلاعات -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
TK
5105
.
59
.
I5
2015
E-Book
,


91. Information and communications security
Author: Tat Wing Chim, Tsz Hon Yuen (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.

92. Information and communications security :
Author: Sihan Qing [and others] (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011


93. Information security applications
Author: Souhwan Jung, Moti Yung (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
W577
2011eb


94. Information security applications
Author: Dong Hoon Lee, Moti Yung (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Database security, Congresses
Classification :
QA76
.
9
.
A25
W57
2012eb


95. Information security practice and experience
Author: Mark D. Ryan, Ben Smyth, Guilin Wang (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I855
2012eb


96. Information systems security and privacy :
Author: edited by Paolo Mori, Steven Furnell, Olivier Camp.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25


97. Information theoretic security
Author: Adam Smith (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I25
2012eb


98. Innovative Security Solutions for Information Technology and Communications.
Author: \ Ion Bica , David Naccache, Emil Simion (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses.,Computer networks -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
QA
76
.
9
.
I55
2015
E-Book
,


99. Introduction to certificateless cryptography /
Author: Hu Xiong, Zhen Qin, Athanasios V. Vasilakos
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Data encryption (Computer science),Identification,Public key cryptography,Public key infrastructure (Computer security)
Classification :
QA76
.
9
.
A25
X75
2017


100. Introduction to computer and network security :
Author: Richard R. Brooks, Clemson University, South Carolina, USA
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Data encryption (Computer science),Data protection
Classification :
QA76
.
9
.
A25
B7745
2014

