1. Advances in information and computer security
Author: / Isao Echizen, Noboru Kunihiro, Ryoichi Sasaki (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security, Congresses,Computer networks, Access control, Congresses,Computer networks, Security measures, Congresses
Classification :
QA76
.
9
.
A25I58
2010


3. BL,BL
Author: / Marshall G.S. Hodgson. ,20090530 0
Library: Library of Islamic Parliament (Tehran)
Subject:

4. Cryptography and network security :
Author: William Stallings.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Chiffrement (Informatique),Cryptographie à clé publique.,Cryptographie-- Réseaux d'ordinateurs.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Coding theory.,Computer networks-- Security measures.,Computer security.,Computersicherheit,Data encryption (Computer science),Internet,Internet.,Kryptologie,Rechnernetz
Classification :
TK5105
.
59
.
S713
2006


5. Cryptography and network security :
Author: William Stallings.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science)

6. Cryptology and network security :
Author: Jan Camenisch, Panos Papadimitratos (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer Communication Networks.,Computers and Society.,Cryptology.,Information Systems and Communication Service.,Software Engineering/Programming and Operating Systems.,Computer networking & communications.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- Online Services-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Ethical & social aspects of IT.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25


7. Cyber warfare :
Author: Jason Andress, Steve Winterfeld ; Russ Rogers, technical editor ; foreword by Stephen Northcutt.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Handbooks, manuals, etc.,Information warfare, Handbooks, manuals, etc.

8. Engineering secure two-party computation protocols
Author: Thomas Schneider
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols,Computer networks-- Security measures,Data encryption (Computer science)
Classification :
TK5105
.
55
.
S36
2012eb


9. Financial cryptography and data security :
Author: Radu Sion (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Electronic commerce -- Security measures -- Congresses.,Electronic funds transfers -- Security measures -- Congresses.

10. Information and communications security :
Author: Sihan Qing [and others] (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011


11. Innovative security solutions for information technology and communications :
Author: Jean-Louis Lanet, Cristian Toma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Information technology-- Security measures, Congresses.,Computer networks-- Security measures.,Computer security.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25


12. Protocols for authentication and key establishment
Author: by Colin Boyd, Anish Mathuria.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols.,Computer networks -- Security measures.,Data encryption (Computer science)
Classification :
TK5105
.
59
B936
2011


13. Rethinking public key infrastructures and digital certificates :
Author: / Stefan A. Brands
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer network protocols,Data encryption (Computer science),Public key infrastructure (Computer security)
Classification :
TK5105
.
59
.
B73
2000


14. Rethinking public key infrastructures and digital certificates
Author: / Stefan A. Brands
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures,Computer network protocols,Data encryption (Computer science),Public key infrastructure (Computer security)
Classification :
E-BOOK

15. Security, privacy and reliability in computer communications and networks
Author: / editors, Kewei Sha, Aaron Striegel, Min Song.
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computer networks,Computer networks,Data transmission systems,Data transmission systems,Data encryption (Computer science),Routing protocols (Computer network protocols),Computer networks,Computer networks,Data encryption (Computer science),Data transmission systems,Data transmission systems,Routing protocols (Computer network protocols),-- Security measures,-- Reliability,-- Security measures,-- Reliability,-- Reliability,-- Security measures,-- Reliability,-- Security measures
Classification :
005
.
8
S4466
2017
21


16. Trusted computing and information security :
Author: Huanguo Zhang, Bo Zhao, Fei Yan (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25

