281. The second economy :
Author: Steve Grobman, Allison Cerra ; foreword by Christopher Young
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Internet-- Security measures
Classification :
QA76
.
9
.
A25
G78
2016


282. The second economy :
Author: Steve Grobman, Allison Cerra ; foreword by Christopher Young
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Internet-- Security measures.
Classification :
QA76
.
9
.
A25


283. The smart girl's guide to privacy :
Author: Violet Blue.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Internet and women.,Internet-- Safety measures.,Internet-- Security measures.,Privacy, Right of.
Classification :
HV6773
.
B56
2015


284. The web application hacker's handbook
Author: / Dafydd Stuttard, Marcus Pinto
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Internet, Security measures,Computer security
Classification :
TK
5105
.
875
2011


285. The web application hacker's handbook
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Internet ; Security measures. ; Computer security. ; Internet ; Security measures. ; sears. ; Computer security. ; sears. ;

286. The web application hacker's handbook :
Author: Dafydd Stuttard, Marcus Pinto.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Internet-- Security measures.
Classification :
TK
5105
.
875
.
I57
.
S78
2011


287. The web application hacker's handbook: discovering and exploiting security flaws
Author: Stuttard, Dafydd
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Internet,، Computer security
Classification :
TK
5105
.
875
.
I57
S85
2008


288. The web application hacker's handbook :discovering and exploiting security flaws
Author: Stuttard, Dafydd
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Security measures ، Internet,، Computer security
Classification :
TK
5105
.
875
.
I57
S85
2008


289. The web application hacker's handbook : discovering and exploiting security flaws
Author: Stuttard, Dafydd
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Security measures ، Internet,، Computer security
Classification :
TK
5105
.
875
.
I57
S85
2008


290. The zero trust framework
Author: Ravindra Das.,Das, Ravindra,
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer networks,Computer security.,Trust.,Internet users,Security measures.,Identification.,Internet users.

291. Trust and new technologies marketing and management on the Internet and mobile media
Author: / editors, Teemu Kautonen, Heikki Karjaluoto
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Electronic commerce , Security measures,Internet marketing , Security measures,Business enterprises , Computer networks , Security measures,Electronic commerce , Management,Consumentengedrag , gtt,Vertrouwen. , gtt,Internet. , gtt,Draadloze communicatie. , gtt
Classification :
HF5415
.
1265
.
T78
2008


292. Trust and trustworthy computing
Author: Jonathan M. McCune ... [et al.]&, eds
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computer security, Congresses,Internet, Security measures, Congresses
Classification :
QA
،
76
.
9
،.
A25
,
T738
،
2011


293. Trust and trustworthy computing :
Author: Alessandro Acquisti, Sean W. Smith, Ahmad-Reza Sadeghi (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Internet-- Security measures, Congresses.
Classification :
QA76
.
9
.
A25
T78
2010


294. Trust in cyberspace /
Author: Fred B. Schneider, editor ; Committee on Information Systems Trustworthiness, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Internet-- Security measures.,Telecommunication policy-- United States.,Computer Security.,Internet.,Public Policy.,Telecommunications.,BUSINESS & ECONOMICS-- Industries-- Media & Communications.,Computer networks-- Security measures.,COMPUTERS.,Electrical & Computer Engineering.,Engineering & Applied Sciences.,Internet / Security.,Internet-- Security measures.,Internet.,Sicherheit,TECHNOLOGY & ENGINEERING-- Telecommunications.,Telecommunication policy.,Telecommunications.,Telekommunikationspolitik,Verteiltes System,United States.,USA., 7, 7
Classification :
TK5105
.
59
.
T78
1999eb


295. Trust on the world wide web :
Author: Jennifer Golbeck.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,World Wide Web-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,World Wide Web-- Security measures.
Classification :
QA76
.
9
.
A25
G625
2008eb


296. Trustworthy Internet
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Congresses. ; Internet ; Security measures ; Congresses. ; Wireless communication systems ; Security measures ; Congresses. ; Data protection ; Congresses. ; Privacy, Right of ; Congresses. ; Digital communications

297. Trustworthy Internet
Author: / Nicola Blefari-Melazzi, Giuseppe Bianchi, Luca Salgarelli, editors
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Congresses,Internet--Security measures--Congresses,Wireless communication systems--Security measures--Congresses,Data protection--Congresses,Privacy, Right of--Congresses,Digital communications--Congresses
Classification :
TK
,
5105
.
59
,.
T79
,
2010


298. Trustworthy Internet
Author: \ Nicola Blefari-Melazzi, Giuseppe Bianchi, Luca Salgarelli, editors.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks-- Security measures, Congresses.,Internet-- Security measures, Congresses.,Wireless communication systems-- Security measures, Congresses.,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,اینترنت -- تدابیر ایمنی -- کنگره ها,ارتباطات بیسیم -- تدابیر ایمنی -- کنگره ها
Classification :
TK
5105
.
59
.
T7
2010
E-Book
,


299. Trustworthy internet /
Author: Nicola Blefari-Melazzi, Giuseppe Bianchi, Luca Salgarelli, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Internet-- Security measures, Congresses.,Computer science.
Classification :
TK5105
.
875
.
I57
T78
2011


300. Ubiquitous computing and computing security of IoT /
Author: N. Jeyanthi, Ajith Abraham, Hamid Mcheick, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Internet of things-- Security measures.,Ubiquitous computing.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Ubiquitous computing.
Classification :
TK5105
.
8857
.
U25
2019

