21. How to cheat at designing security for a Windows Server 2003 network
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Database security,، Computer networks-- Security measures,، Computer security
Classification :
TK
5105
.
59
.
H69
2006


22. Oracle Identity and Access Manager 11g for administrators
Author: Atul Kumar
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Database security
Classification :
QA76
.
9
.
A25
K863
2011


23. Secure data management in decentralized systems
Author: edited by Ting Yu, Sushil Jajodia
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Security measures ، Computer networks,، Database security,، Computer security
Classification :
TK
5105
.
59
.
S432
2007


24. Secure data management in decentralized systems /
Author: edited by Ting Yu, Sushil Jajodia
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Database security
Classification :
TK5105
.
59
.
S432
2007


25. Secure data management in decentralized systems
Author: edited by Ting Yu, Sushil Jajodia
Library: (Semnan)
Subject: Security measures ، Computer networks,، Database security,، Computer security
Classification :
TK
5105
.
59
.
S432
2007


26. Security and privacy in advanced networking technologies
Author: / edited by Borka Jerman - Blazic, Wolfgang Schneider and Tomaz Klobucar
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computer networks -- Security measures -- Congresses,Database security -- Congresses
Classification :
TK
5105
.
59
.
S439


27. Transactions on large-scale data- and knowledge-centered systems XXXVII /
Author: edited by Abdelkader Hameurlain, Roland Wagner.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data mining, Congresses.,Database management, Congresses.,Artificial intelligence.,Artificial intelligence.,Computer networks.,Computer science.,Computer security.,Computer security.,Computers-- Database Management-- Data Mining.,Computers-- Hardware-- Network Hardware.,Computers-- Intelligence (AI) & Semantics.,Computers-- Operating Systems-- General.,Computers-- Security-- General.,Computers-- Software Development & Engineering-- General.,Data mining.,Data mining.,Network hardware.,Operating systems (Computers),Operating systems.,Software engineering.,Software Engineering.
Classification :
QA76
.
9
.
A25


28. Transactions on large-scale data- and knowledge-centered systems XXXVIII :
Author: Abdelkader Hameurlain, Roland Wagner, Sven Hartmann, Hui Ma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data mining, Congresses.,Database management, Congresses.,Computer networks-- Security measures.,Computer security.,Data mining.,Database management.
Classification :
QA76
.
9
.
A25

