441. Trusted systems :
Author: edited by Liqun Chen, Moti Yung
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011


442. Trusted systems
Author: Liqun Chen, Moti Yung, Liehuang Zhu (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011eb


443. Trusted systems
Author: Chris J. Mitchell, Allan Tomlinson (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2012eb


444. Trustworthy computing and services
Author: Yuyu Yuan, Xu Wu, Yueming Lu (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I83
2012


445. Unix secure shell
Author: Carasik, Anne H
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، UNIX )Computer file(,، UNIX shells,، Computer networks-- Management,، Data encryption )Computer science(,، Computer networks-- Security measures
Classification :
QA
76
.
76
.
O63
.
C37
1999


446. Visual cryptography and secret image sharing
Author: edited by Stelvio Cimato, Ching-Nung Yang.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer file sharing -- Security measures.,Data encryption (Computer science),Image processing -- Security measures.
Classification :
TA1637
.
E358
2012


447. Writing secure code
Author: / Michael Howard and David LeBlanc
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
,
H698
2002


448. Writing secure code
Author: / Michael Howard and David LeBlanc
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
,
H698
2003


449. Writing secure code
Author: / Michael Howard and David LeBlanc
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Computer security,Data encryption (Computer science)
Classification :
QA
76
.
9
.
A25H698
2002


450. Writing secure code for Windows Vista
Author: / Michael Howard, David LeBlanc
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Microsoft Windows (Computer file),Data encryption (Computer science),Operating systems (Computers)
Classification :
QA76
.
9
.
A25
,
H6984
2007


451. Zero trust networks
Author: Razi Rais ... [et al.].,Rais, Razi
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security.,Computer networks,Data encryption (Computer science),Trust.,Computer networks,Computer security.,Data encryption (Computer science),Security measures.,Security measures.

452. based encryption-Introduction to identity
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ; Public key cryptography. ; Public key infrastructure (Computer security) ;

453. challenges and applications--Trusted computing
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ; Data encryption (Computer science) ; Congresses. ; Public key infrastructure (Computer security) ; Congresses. ;

454. coding theory,cryptography and related areas:proceeding of an international conference on coding theory,cryptography and related areas,held in guanajuato,mexico,in april 1998
Author: Johannes Buchmann ]et al[
Library: Central library and Documentation Center (Zanjan)
Subject: ، codings theory- congresses,، Data encryption )computer Science(- Congresses,، Data tramsmission systems- security measures- congresses
Classification :
TK
5102
.
I5
C6
2000


455. امنيت داده و ارتباطات صنعت برق بر اساس استاندارد IEC62351
Author:
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: برق -- سيستم ها -- تدابير ايمني ◄ Electric power systems -- Security measures ◄ رمزگذاري داده ها ◄ Data encryption (Computer science) ◄ رمزنگاري ◄ Cryptography
Classification :
333
الف
792


456. ایجاد زیرساخت برای امنیت ابری راهکارها
Author: / تالیف راگو یلوری، انریکه کاسترو-لئون,عنوان اصلی: Building the infrastructure for cloud security : a solutions view,2014.,یلوری,Yeluri
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: رایانش ابری,Cloud computing,رمزگذاری دادهها,Data encryption (Computer science), -- تدابیر ایمنی, -- Security measures,a01,a01,a02,a02
Classification :
ٰ
QA
۷۶
/
۵۸۵
/
ی
۸
الف
۹ ۱۳۹۸


457. ایجاد زیرساخت برای امنیت ابری راهکارها
Author: / تالیف راگو یلوری، انریکه کاسترو-لئون,عنوان اصلی: Building the infrastructure for cloud security : a solutions view,2014.,یلوری,Yeluri
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: رایانش ابری,Cloud computing,رمزگذاری دادهها,Data encryption (Computer science), -- تدابیر ایمنی, -- Security measures,a01,a01,a02,a02
Classification :
QA
۷۶
/
۵۸۵
/
ی
۸
الف
۹ ۱۳۹۸


458. پدافند سایبری سامانه و شبکه کنترل صنعتی : (معماری، پروتکل ها، آسیب پذیری ها، تهدیدات، مخاطرات و راهکارهای مصون سازی سایبری)
Author: / تالیف و تصنیف علی ناصری,پشت جلد به انگلیسی: Ali Naseri. Cyber defense of industrial control system and network,ناصری
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: رمزگذاری دادهها,Data encryption (Computer science),رمزنگاری,Cryptography,کامپیوترها,Computer security,کامپیوترها,Computers,فضای مجازی,Cyberspace, -- رمزگان, -- Code words, -- ایمنی اطلاعات, -- کنترل دستیابی, -- Access control, -- تدابیر ایمنی, -- Security measures,a01,a01,a02,a02,a03,a03,a04,a04,a05,a05
Classification :
QA
۷۶
/
۹
/
ر
۸
ن
۲ ۱۴۰۰


459. رمزنگاری مشبکه- مبنا
Author: / مولف امیر حسنیکرباسی,ص. ع. به انگلیسی: .Amir Hassani Karbasi. Lattice-based cryptography.
Library: (East Azarbaijan)
Subject: رمزگذاری دادهها,(Data encryption (Computer science,رمزنگاری,Cryptography,شبکههای کامپیوتری -- تدابیر ایمنی,Security measures -- Computer networks
Classification :
QA
۷۶
/
۹
/
ح
۵
ر
۸ ۱۳۹۶


460. رمزنگاری و امنیت شبکه( مبانی و راهکارها)
Author: / تالیف ویلیام استالینگز,استالینگز,Stallings
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: شبكه هاي كامپيوتري - تدابير ايمني Computer networks - Security measures,رمزگذاري داده ها Data encryption (Computer science),نظريه رمز گذاري Coding theory,كامپيوترها - ايمني اطلاعات Computer security
Classification :
TK
۵۱۰۵
/
۵۹
/
الف
۵
ر
۸ ۱۳۹۷

