201. Security, privacy and reliability in computer communications and networks
Author: / editors, Kewei Sha, Aaron Striegel, Min Song.
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computer networks,Computer networks,Data transmission systems,Data transmission systems,Data encryption (Computer science),Routing protocols (Computer network protocols),Computer networks,Computer networks,Data encryption (Computer science),Data transmission systems,Data transmission systems,Routing protocols (Computer network protocols),-- Security measures,-- Reliability,-- Security measures,-- Reliability,-- Reliability,-- Security measures,-- Reliability,-- Security measures
Classification :
005
.
8
S4466
2017
21


202. Security solutions and applied cryptography in smart grid communications
Author: / Ferrag Ahmed
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Smart power grids--Security measures,Data encryption (Computer science),Computer networks--Security measures
Classification :
TK3105
.
S334
2017


203. Sudo mastery :
Author: by Michael W. Lucas.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Access control.,Computer networks -- Security measures.,Data encryption (Computer science)
Classification :
TK5105
.
59
B965
2013


204. Theory of security and applications
Author: Sebastian Mödersheim, Catuscia Palamidessi (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
J65
2012eb


205. Topics in Cryptology – CT-RSA 2016
Author: \ Kazue Sako (Ed.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Data protection -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها ,حفاظت اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
QA
76
.
9
.
T6
2016
E-Book
,


206. Transactions on Large-Scale Data- and Knowledge- Centered Systems XXIII
Author: \ Abdelkader Hameurlain, ... [et al.] (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,Data encryption (Computer science),Computer networks,کامپیوترها,رمزگذاری دادهها,شبکههای کامپیوتری, -- Congresses, -- Congresses, -- Congresses, -- کنگرهها, -- کنگرهها, -- کنگرهها, -- Security measures, -- ایمنی اطلاعات, -- اقدامات تامینی,a03,a05,a07,a03,a05,a07
Classification :
QA
76
.
9
.
D3T7
2016
E-Book
,


207. Transactions on data hiding and multimedia security VI /
Author: Yun Q. Shi [and others] (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Data protection,Multimedia systems-- Security measures,Algorithm Analysis and Problem Complexity,Computer Science,Computers and Society,Data Encryption,Pattern Recognition,Systems and Data Security
Classification :
QA76
.
9
.
A25
T73
2011


208. Trust and trustworthy computing
Author: Stefan Katzenbeisser ... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
T78
2012eb


209. Trust management VII :
Author: Carmen Fernández-Gago [and others] (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
C376
2013


210. Trusted Systems
Author: \ Moti Yung, Liehuang Zhu, Yanjiang Yang (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,Computer networks,Data encryption (Computer science),کامپیوترها,شبکههای کامپیوتری,رمزگذاری دادهها, -- Congresses, -- Congresses, -- Congresses, -- کنگرهها, -- کنگرهها, -- کنگرهها, -- Security measures, -- ایمنی اطلاعات, -- اقدامات تامینی,a03,a05,a07,a03,a05,a07
Classification :
QA
76
.
9
.
A25
I58
2015
E-Book
,


211. Trusted computing and information security :
Author: Huanguo Zhang, Bo Zhao, Fei Yan (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25


212. Trusted systems :
Author: edited by Liqun Chen, Moti Yung
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011


213. Trusted systems
Author: Liqun Chen, Moti Yung, Liehuang Zhu (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011eb


214. Trusted systems
Author: Chris J. Mitchell, Allan Tomlinson (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2012eb


215. Trustworthy computing and services
Author: Yuyu Yuan, Xu Wu, Yueming Lu (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I83
2012


216. Trustworthy execution on mobile devices
Author: Vasudevan, Amit,Amit Vasudevan, Jonathan M. McCune, James Newsome
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Computer security,، Mobile computing,Security measures ، Mobile communication systems,، Computer Science,، Systems and Data Security,، Computer Communication Networks,، Data Encryption,، Communications Engineering, Networks
Classification :
QA76
.
9
.
A25


217. Unix secure shell
Author: Carasik, Anne H
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، UNIX )Computer file(,، UNIX shells,، Computer networks-- Management,، Data encryption )Computer science(,، Computer networks-- Security measures
Classification :
QA
76
.
76
.
O63
.
C37
1999


218. Zero trust networks
Author: Razi Rais ... [et al.].,Rais, Razi
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security.,Computer networks,Data encryption (Computer science),Trust.,Computer networks,Computer security.,Data encryption (Computer science),Security measures.,Security measures.

219. رمزشناسی در ایران و جهان
Author: / تالیف جواد مهاجری، محمود سلماسی زاده، مهشید دلاور؛ همکاران: زهرا احمدیان ...[و دیگران],مهاجری
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: رمزگذاري داده ها Data encryption (Computer science),كامپيوترها - كنترل دستيابي - رمزگان Computers - Access control - Code words,شبكه هاي كامپيوتري - تدابير ايمني - آينده نگري Computer networks - Security measures - Forecasting,رمزنگاري Cryptography,الگوريتم ها Algorithms
Classification :
QA
۷۶
/
۹
/
ر
۸
م
۹ ۱۳۹۵


220. رمزشناسی در ایران و جهان: چالش های پژوهشی، آموزش و ساختارهای اجرایی
Author: / تالیف جواد مهاجری، محمود سلماسی زاده، مهشید دلاور همکاران زهرا احمدیان ...[و دیگران]
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: رمزگذاری دادهها,Data encryption (Computer science),کامپیوترها -- کنترل دستیابی -- رمزگان,Computers -- Access control -- Code words,شبکههای کامپیوتری -- تدابیر ایمنی -- آیندهنگری,Computer networks -- Security measures -- Forecasting,رمزنگاری,Cryptography,الگوریتمها,Algorithms
Classification :
QA
۷۶
/
۹
/
ر
۸
م
۹ ۱۳۹۵

