21. Algorithms and data structures :
Author: Douglas Baldwin and Greg W. Scragg.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer algorithms.,Data structures (Computer science),Algorithmes.,Structures de données (Informatique),Algorithmus,Algorithmus.,Computer algorithms.,Data structures (Computer science),Datenstruktur,Datenstruktur.
Classification :
QA76
.
9
.
A43
B35
2004


22. Applications of Finite Fields
Author: by Ian F. Blake, XuHong Gao, Ronald C. Mullin, Scott A. Vanstone, Tomik Yaghoobian ; edited by Alfred J. Menezes.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory.,Computational complexity.,Computer engineering.,Engineering.

23. Applied Algebra, Algebraic Algorithms and Error-Correcting Codes :
Author: edited by Gérard Cohen, Marc Giusti, Teo Mora.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory.,Computer science.,Data encryption (Computer science)

24. Applied Algebra, Algebraic Algorithms and Error-Correcting Codes :
Author: Jaime G Carbonell
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject:

25. Applied cryptography
Author: / Bruce Schneier
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Telecommunication--Security measures,Cryptography.,Cryptology
Classification :
QA
,
76
.
9
,.
A25
,
S35
,
1996


26. Applied cryptography
Author: / Bruce Schneier
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer security,Telecommunication--Security measure,Cryptography
Classification :
QA
76
.
9
.
A25
S35
1996


27. Applied cryptography
Author: / Bruce Schneier
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Telecommunication- Security measures,Cryptography
Classification :
QA76
.
9
.
A25
,
S35
1994


28. Applied cryptography : protocols, algorithms, and source code in C
پدیدآورنده : Schneier, Bruce
موضوع : ، Computer security,، Telecommunication-- Security measures,، Cryptography
۲ نسخه از این کتاب در ۱ کتابخانه موجود است.
29. Applied cryptography : protocols, algorithms, and source code in C
Author: Schneier, Bruce
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer security, Telecommunication - Security measures, Cryptography
Classification :
QA
76
.
9
.
A25
S35
1996


30. Applied cryptography: protocols, algorithms, and source code in C
Author: Schneier, Bruce
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Computer security,Security measures ، Telecommunication,، Cryptography
Classification :
QA
76
.
9
.
A25
S35
1996


31. Applied cryptography: protocols, algorithms, and source code in C [electronic resource]
Author: / Bruce Schneier
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Computer security,Telecommunication--Security measures,Cryptography
Classification :
EB
,
QA76
.
9
.
A25
,
S35
1996

32. Applied cryptography :protocols, algorithms, and source code in C ruce Schneier
Author: Schneier, Bruce
Library: Central Library and Documentation Center (Semnan)
Subject: ، Computer security,، Telecommunicatio--Security measures,، Cryptography
Classification :
QA
76
.
9
.
A25S35
1996


33. Artificial intelligence, evolutionary computing and metaheuristics :
Author: Xin-She Yang (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence.,Computer algorithms.,Evolutionary computation.
Classification :
Q335
.
X567
9999


34. Automata, languages and programming :
Author: J. Leach Albert, B. Monien, M. Rodríguez Artalejo (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Machine theory -- Congresses.,Machine theory.
Classification :
QA267
.
J543
1991


35. Automata, languages, and programming :
Author: edited by J.W. de Bakker and J. van Leeuwen.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer programming -- Congresses.,Formal languages -- Congresses.,Machine theory -- Congresses.

36. Boolean functions in cryptology and information security
Author: / edited by Bart Preneel and Oleg A. Logachev
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Algebra, Boolean, Congresses,Cryptography, Congresses,Computer security, Congresses
Classification :
E-BOOK

37. Boolean models and methods in mathematics, computer science, and engineering /
Author: edited by Yves Crama, Peter L. Hammer
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Algebra, Boolean,Probabilities
Classification :
QA10
.
3
.
B658
2010


38. Chaos-based cryptography :
Author: Ljupco Kocarev and Shiguo Lian (Eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Cryptography,Artificial Intelligence (incl. Robotics),Computational Intelligence,Data Encryption,Data Structures, Cryptology and Information Theory
Classification :
QA76
.
9
.
A25
C427
2011eb


39. Chaos-based cryptography :theory, algorithms and applications
Author: ]edited by[ Ljupco Kocarev, Shiguo Lian
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: ، Computer security,، Cryptography
Classification :
QA
76
.
9
.
A25
C427


40. Chaos-based cryptography: theory, algorithms and applications
Author: ]edited by[ Ljupco Kocarev and Shiguo Lian
Library: Central Library and Documentation Center (Kerman)
Subject: ، Computer security,، Cryptography
Classification :
QA
76
.
9
.
A25
C4
2011

