• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۱۶۴ پاسخ غیر تکراری از ۱۶۸ پاسخ تکراری در مدت زمان ۰,۶۲ ثانیه یافت شد.

41. Computer cryptology:beyond decoder rings

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: BOYD,WALDO T

Library: Central Library of Amirkabir University of Technology (Tehran)

Subject: CRYPTOGRAPHY-DATA PROCESSING , CIPHERS-DATA PROCESSING

Classification :
Z
103
.
B65

42. Computer networks

پدیدآورنده : Andrew S. Tanenbaum, David J. Wetherall

موضوع : Computer networks

۲ نسخه از این کتاب در ۲ کتابخانه موجود است.

43. Computer security and cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Alan G. Konheim

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Ciphers,Computer security,Cryptography,Cryptography-- History,Data encryption (Computer science)

Classification :
Z103
.
A2
K638
2007

44. Cracking codes & cryptograms for dummies

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: by Denise Sutherland, by [sic] Mark E. Koltko-Rivera ; foreword by Chris Hodapp

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Ciphers,Cryptography

Classification :

45. Cracking codes & cryptograms for dummies

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / by Denise Sutherland

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Cryptography.,Ciphers.

Classification :

46. Cracking codes with Python :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: by Al Sweigart.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Data encryption (Computer science),Hacking.,Python (Computer program language),Computer security.,COMPUTERS-- Programming Languages-- Python.,COMPUTERS-- Security-- Cryptography.,Data encryption (Computer science),Hacking.,Python (Computer program language)

Classification :
QA76
.
9
.
A25
S9317
2018

47. Cryptanalysis; a study of ciphers and their solution

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Gaines

Library: Central Library and Documents Center of Tehran University (Tehran)

Subject: Cryptography,Ciphers

Classification :
Z104
.
G15

48. Cryptanalysis of an enciphered code problem-where an "additive' method of encipherment has been used

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Barker, Wayne G.

Library: Central Library of Sharif University of Technology (Tehran)

Subject: ، Ciphers,، Cryptography

Classification :
Z
104
.
B377

49. Cryptanalysis of number theoretic ciphers

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Wagstaff, Samuel S.

Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)

Subject: ، Computer security,، Cryptography,، Number theory

Classification :
QA
76
.
9
.
A25
W33

50. Cryptanalysis of number theoretic ciphers

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Samuel S. Wagstaff, Jr,Title

Library: Central Library of Imam Khomeini International University of Qazvin (Qazvin)

Subject: Computer security,Cryptography,Number theory

Classification :
QA
.
A25
,
W33
76
.
9
2003

51. Cryptanalysis of number theoretic ciphers

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Wagstaff, Samuel S., Jr., 5491-

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Computer security,، Cryptography,، Number theory

Classification :
QA
76
.
9
.
A25W245

52. Cryptanalysis of shift-register generated stream cipher systems

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Barker, Wayne G.

Library: Central Library of Sharif University of Technology (Tehran)

Subject: ، Cryptography,، Ciphers

Classification :
Z
103
.
B375

53. Cryptanalysis of the Hagelin cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Barker, Wayne G

Library: Central Library of Sharif University of Technology (Tehran)

Subject: ، Cryptography,، Ciphers

Classification :
Z
103
.
B37

54. Cryptananalysis of number theoretic ciphers

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Samuel S. Wagstaff

Library: Central Library of Shahrekord University (Chaharmahal va Bakhtiari)

Subject: Computer security,Cryptography

Classification :

55. CryptoSchool /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: by Joachim von zur Gathen

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Algebra,Computer science,Computers,Data structures (Computer science),Electrical engineering,Field theory (Physics),Number theory

Classification :
QA76
.
9
.
D35

56. Cryptographic hardware and embedded system, CHES 2003 :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Colin D. Walter, Cetin K. Koç, Christof Paar (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security -- Congresses.,Cryptography -- Congresses.,Embedded computer systems -- Congresses.

Classification :

57. Cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Douglas R. Stinson

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Coding theory.,Cryptography.

Classification :
QA268
.
S75
2006

58. Cryptography :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Douglas R. Stinson

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Coding theory,Cryptography

Classification :
QA268
.
S75
2006

59. Cryptography Made Simple /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: by Nigel P. Smart.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer science-- Mathematics.,Computer science.,Data structures.,System safety.,Computer science-- Mathematics.,Computer science.,System safety.

Classification :
QA76
.
9
.
D35

60. Cryptography and network security :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: William Stallings.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Coding theory.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Chiffrement (Informatique),Cryptographie à clé publique.,Cryptographie-- Réseaux d'ordinateurs.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Coding theory.,Computer networks-- Security measures.,Computer security.,Computersicherheit,Data encryption (Computer science),Internet,Internet.,Kryptologie,Rechnernetz

Classification :
TK5105
.
59
.
S713
2006
  • »
  • 9
  • 8
  • 7
  • 6
  • 5
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival