81. Actually useful internet secuity techniques
Author: / Larry J. Hughes
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Internet (Computer network),Computer networks- Security measuer
Classification :
TK5101
.
59
.
H83
1995


82. Adaptive cryptographic access control /
Author: Anne V.D.M. Kayem, Selim G. Akl, Patrick Martinches
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science,Computers-- Access control,Data encryption (Computer science),Database security
Classification :
QA76
.
9
.
A25
K39
2010eb


83. Adaptive security management architecture
Author: / James S. Tiller
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures
Classification :
E-BOOK

84. Administering Windows Vista security
Author: / Mark Minasi, Byron Hynes
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Microsoft Windows (Computer file),Computer security
Classification :
QA76
.
9
.
A25
,
M5825
2007


85. Administering Windows Vista security
Author: / Mark Minasi, Byron Hynes
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Microsoft Windows (Computer file),Computer security
Classification :
QA76
.
9
.
A25
,
M5825
2007


86. Administering Windows Vista security
Author: Mark Minasi, Byron Hynes.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Microsoft Windows (Computer file),Computer security.

87. Administering Windows Vista security : the big surprises
Author: Mark Minasi, Byron Hynes
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Microsoft Windows )Computer file(,، Computer security
Classification :
QA
76
.
9
.
A25M56


88. Advanced API Security :
Author: Prabath Siriwardena.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Application software-- Security measures.,Computer security.,Computers, Special purpose.,Data protection.,Programming languages (Electronic computers)
Classification :
QA75
.
5-76
.
95


89. Advanced CISSP prep guide: exam Q & A
Author: Krutz, Ronald L.
Library: Central Library and Documentation Center (Kerman)
Subject: Certification ، Electronic data processing personnel,Examinations ، Computer networks - Security measures
Classification :
QA
76
.
3
.
K76
2003


90. Advanced Computing and Systems for Security.
Author: edited by Rituparna Chaki, Agostino Cortesi, Khalid Saeed, Nabendu Chaki.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Big data.,Computer security, Congresses.,Computer security.,Computer vision.,Engineering.,Big data.,Computer security.,Computer vision.,Engineering.
Classification :
Q342


91. Advanced Concepts for Intelligent Vision Systems.
Author: \ [Edited by] Sebastiano Battiato...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer science,کامپیوتر,a04,a04,Computer vision -- Congresses.,Computer security,بینایی ماشین -- کنگره ها ,کامپیوترها -- ایمنی اطلاعات
Classification :
TA
1634
.
A3
2015
E-Book
,


92. Advanced DPA Theory and Practice
Author: \ Eric Peeters
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science),رمزگذاری دادهها,a04,a04,Embedded computer systems -- Security measures.,سیستمهای کامپیوتری درونهای -- تدابیر ایمنی
Classification :
E-Book
,

93. Advanced DPA theory and practice
Author: Eric Peeters
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography,Data encryption (Computer science),Embedded computer systems-- Security measures
Classification :
TK7895
.
E42
P44
2013


94. Advanced IPSEC VPN architecture and design /
Author: Vijay Bollapragada, Mohamed Khalid, Scott Wainner.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Extranets (Computer networks),IPSec (Computer network protocol)-- Security measures.,Electrical & Computer Engineering.,Engineering & Applied Sciences.,Extranets (Computer networks),Telecommunications.
Classification :
TK5105
.
567
.
B65
2005


95. Advanced Security Technologies in Networking
Author: edited by Borka Jrman-Blazic, Wolfgang S. Schneider and Tomaz Klobucar
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computer Security,Computer Networks -- security measures
Classification :
TK
،
5105
.
5
،.
N46
,
A37
،
2001


96. Advanced computer science applications
Author: / edited by Karan Singh, Latha Banda, Manisha Manjul.
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer science,Computer networks,Machine learning.,Artificial intelligence.,Technological innovations.,Security measures.

97. Advanced computing and systems for security.
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ;

98. Advanced computing and systems for security.
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ;

99. Advanced computing and systems for security
Author: / Edited by Rituparna Chaki... [et al.].
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computational intelligence -- Congresses.,Machine learning -- Congresses.,Computer security -- Congresses.,Computational intelligence, Machine learning, Computer security.

100. Advanced computing and systems for security.
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ;
