41. Communication, networks and computing :
Author: Shekhar Verma, Ranjeet Singh Tomar, Brijesh Kumar Chaurasia, Vrijendra Singh, Jemal Abawajy (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence, Congresses.,Computer networks, Congresses.,Computer Systems Organization and Communication Networks.,Computing Methodologies.,Artificial intelligence.,Computer networking & communications.,Computer networks.,Computers-- Computer Science.,Computers-- Hardware-- General.,Program concepts-- learning to program.
Classification :
TK5105
.
5


42. CompTIA A+ :
Author: Charles J. Brooks, David L. Prowse.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer technicians-- Certification, Study guides.,Electronic data processing personnel-- Certification.,Microcomputers-- Maintenance and repair-- Examinations, Study guides.,Computer technicians-- Certification-- Study guides.,Computer technicians-- Certification.,Electronic data processing personnel-- Certification.,Electronic data processing personnel-- Certification.,Microcomputers-- Maintenance and repair-- Examinations-- Study guides.,Microcomputers-- Maintenance and repair-- Examinations.
Classification :
QA76
.
3
.
B7762
2008


43. CompTIA CySA+ practice tests :
Author: Mike Chapple, David Seidl.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations.,Computer security-- Examinations.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Online Safety & Privacy.
Classification :
QA76
.
3


44. CompTIA PenTest+dollar5Practice Test :
Author: Crystal Panek, Robb Tracy.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Examinations, questions, etc.,Penetration testing (Computer security), Examinations, questions, etc.,Telecommunications engineers-- Certification, Examinations, questions, etc.,Computer networks-- Security measures.,COMPUTERS / Networking / Security.,COMPUTERS / Security / General.,COMPUTERS / Security / Online Safety & Privacy.,Penetration testing (Computer security),Telecommunications engineers-- Certification.
Classification :
TK5105
.
59


45. Computational logistics :
Author: Raffaele Cerulli, Andrea Raiconi, Stefan Voß (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business logistics-- Data processing, Congresses.,Information technology, Congresses.,Algorithm Analysis and Problem Complexity.,Computer Systems Organization and Communication Networks.,Numeric Computing.,Algorithms & data structures.,Business logistics-- Data processing.,Computer networking & communications.,Computers-- Hardware-- General.,Computers-- Programming-- Algorithms.,Information technology.,Mathematical theory of computation.
Classification :
HD38
.
5


46. Computational science and technology :
Author: Rayner Alfred, Yuto Lim, Ag Asri Ag Ibrahim, Patricia Anthony, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks, Congresses.,Computer science, Congresses.,Information technology, Congresses.,Artificial Intelligence (incl. Robotics).,Big Data.,Communications Engineering, Networks.,Computer networks.,Computer science.,COMPUTERS / Computer Literacy.,COMPUTERS / Computer Science.,COMPUTERS / Data Processing.,COMPUTERS / Hardware / General.,COMPUTERS / Information Technology.,COMPUTERS / Machine Theory.,COMPUTERS / Reference.,Information technology.
Classification :
TK5105
.
5


47. Computer and cyber security :
Author: edited by Dr. Brij B. Gupta, National Institute of Technology Kurukshetra, Haryana, India ; Dr. Dharma P. Agrawal, University of Cincinnati, USA ; Dr. Haoxiang Wang, GoPerception Laboratory & Cornell University, USA.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,BUSINESS & ECONOMICS-- Production & Operations Management.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Operating Systems-- General.
Classification :
QA76
.
9
.
A25
C626
2019eb


48. Computer and information sciences :
Author: Tadeusz Czachórski, Erol Gelenbe, Krzysztof Grochla, Ricardo Lent (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science, Congresses.,Information technology, Congresses.,Artificial Intelligence.,Computer Communication Networks.,Information Systems and Communication Service.,Software Engineering.,System Performance and Evaluation.,Artificial intelligence.,Computer networking & communications.,Computer science.,Computers-- Hardware-- Handheld Devices.,Computers-- Hardware-- Network Hardware.,Computers-- Intelligence (AI) & Semantics.,Computers-- Online Services-- General.,Computers-- Software Development & Engineering-- General.,Information technology.,Network hardware.,Software Engineering.,Systems analysis & design.
Classification :
QA75
.
5


49. Computer security, privacy, and politics :
Author: Ramesh Subramanian, editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Government policy.,Computer security.,Computer networks-- Security measures.,Computer security-- Government policy.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
C6557
2008eb


50. Computer vision and graphics :
Author: Leszek J. Chmielewski, Ryszard Kozera, Arkadiusz Orłowski, Konrad Wojciechowski, Alfred M. Bruckstein, Nicolai Petkov (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer graphics, Congresses.,Computer vision, Congresses.,Artificial Intelligence.,Computer Systems Organization and Communication Networks.,Image Processing and Computer Vision.,Computer graphics.,Computer networking & communications.,Computer vision.,Computers-- Computer Graphics.,Computers-- Computer Science.,Computers-- Hardware-- General.,Image processing.,Program concepts-- learning to program.
Classification :
TA1634


51. Configuring Check Point NGX VPN-1/FireWall-1 /
Author: Robert Stephens, Barry J. Stiefel, Stephen Watkins.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: FireWall-1.,Computer networks-- Security measures.,Firewalls (Computer security),Computer networks-- Security measures-- Computer programs.,Computer networks-- Security measures.,Computer security-- Computer programs.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Extranets (Computer networks),Firewalls (Computer security),Firewalls (Computer security)
Classification :
TK5105
.
59
.
S846
2005eb


52. Connecting Networks.dollar5Companion guide /
Author: Cisco Networking Academy.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Computer networks.,COMPUTERS / Computer Literacy.,COMPUTERS / Computer Science.,COMPUTERS / Data Processing.,COMPUTERS / Hardware / General.,COMPUTERS / Information Technology.,COMPUTERS / Machine Theory.,COMPUTERS / Reference.
Classification :
TK5105
.
5


53. Content networking :
Author: Markus Hofmann and Leland Beaumont.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Réseaux d'ordinateurs.,Computer networks.,COMPUTERS-- Data Transmission Systems-- General.,COMPUTERS-- Networking-- Vendor Specific.,Internet.,Netwerken.,Protocollen (informatica),Techniek.
Classification :
TK5105
.
5
.
H63
2005eb


54. Cooperative communications /
Author: Gerhard Kramer, Ivana Marić, and Roy D. Yates.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Computer networks.,COMPUTERS-- Data Transmission Systems-- General.,COMPUTERS-- Networking-- Vendor Specific.
Classification :
TK5105
.
5
.
K73
2007eb


55. Creative and innovative network management /
Author: edited by Oliver B. Popov.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Management, Congresses.,Computer networks-- Management.,COMPUTERS-- Data Transmission Systems-- General.,COMPUTERS-- Networking-- Vendor Specific.
Classification :
TK5105
.
5
.
N369
2000eb


56. Crowd-assisted networking and computing /
Author: editor, Al-Sakib Khan Pathan, Ph. D.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Crowdsourcing.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Crowdsourcing.
Classification :
QA76
.
9
.
H84
C745
2019


57. Cryptology and network security :
Author: Jan Camenisch, Panos Papadimitratos (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer Communication Networks.,Computers and Society.,Cryptology.,Information Systems and Communication Service.,Software Engineering/Programming and Operating Systems.,Computer networking & communications.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- Online Services-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Ethical & social aspects of IT.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25


58. Cyber-security and global information assurance :
Author: Kenneth J. Knapp [editor].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Cyberspace-- Security measures.,Data protection.,Information technology-- Security measures.,Computer networks-- Security measures.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25
C918
2009eb


59. Cyber threat intelligence /
Author: Ali Dehghantanha, Mauro Conti, Tooska Dargahi, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Internet-- Security measures.,Artificial intelligence.,Computer networking & communications.,Computer security.,Computer security.,COMPUTERS-- Security-- General.,Internet-- Security measures.,Network hardware.
Classification :
QA76
.
9
.
A25


60. Cybersecurity in Nigeria :
Author: Aamo Iorliam.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Nigeria.,Computer security-- Nigeria.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Online Safety & Privacy.,Nigeria., 7
Classification :
QA76
.
9
.
A25

