81. Cryptography and network security: principles and practice
Author: Stallings, William
Library: (Semnan)
Subject: Security measures ، Computer networks,، Data encryption )Computer science(,، Coding theory,، Computer security
Classification :
TK
5105
.
59
.
S7C7


82. Cryptography and network security: principles and practice [electronic resource]
Author: / William Stallings
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Computer networks--Security measures,Data encryption (Computer science),Coding theory,Computer security
Classification :
EB
,
TK5105
.
59
.
S713
1999

83. Cryptology and network security
Author: Juan A. Garay, Atsuko Miyaji, Akira Otsuka (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I5534
2009eb


84. Cryptology and network security :
Author: Jan Camenisch, Panos Papadimitratos (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer Communication Networks.,Computers and Society.,Cryptology.,Information Systems and Communication Service.,Software Engineering/Programming and Operating Systems.,Computer networking & communications.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- Online Services-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Ethical & social aspects of IT.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25


85. Cryptology and network security :
Author: Srdjan Capkun, Sherman S.M. Chow (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Coding theory & cryptology.,Computer networks-- Security measures.,Computers-- Database Management-- Data Mining.,Computers-- Information Technology.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data mining.,Ethical & social aspects of IT.,Information retrieval.,Software Engineering.
Classification :
QA76
.
9
.
A25


86. Cyber security cryptography and machine learning :
Author: Shlomi Dolev, Danny Hendler, Sachin Lodha, Moti Yung (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses.,Internet-- Security measures, Congresses.,Machine learning, Congresses.,Data encryption (Computer science),Internet-- Security measures.,Machine learning.
Classification :
QA76
.
9
.
A25


87. Cyber warfare :
Author: Jason Andress, Steve Winterfeld ; Russ Rogers, technical editor ; foreword by Stephen Northcutt.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Handbooks, manuals, etc.,Information warfare, Handbooks, manuals, etc.

88. Data privacy management and autonomous spontaneous security :
Author: Roberto Di Pietro [and others] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.

89. Data privacy management and autonomous spontaneus [sic] security
Author: Joaquin Garcia-Alfaro ... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A97
D76
2011eb


90. Digital cash commerce on the Net
Author: / Peter Wayner
Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)
Subject: Electronic funds transfers - Security measures,Internet (Computer network),Computer networks - Security measures,Data encryption (computer science),Electronic funds transfers - Computer programs,Smart cards
Classification :
HG1710
.
W39
1995


91. Digital cash : commerce on the Net
Author: Wayner, Peter
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Electronic funds transfers - Security measures , Internet )Computer network( , Computer networks - Security measures , Data encryption )Computer science( , Electronic funds transfers - Computer programs , Smart cards
Classification :
HG
1710
.
W39
1996


92. Encrypted email :
Author: Hilarie Orman
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Electronic mail messages-- Security measures.,Electronic mail systems-- Security measures.
Classification :
TK5105
.
73


93. Engineering secure software and systems
Author: Gilles Barthe, Benjamin Livshits, Riccardo Scandariato (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Software engineering, Congresses
Classification :
QA76
.
9
.
A25
E54
2011eb


94. Engineering secure two-party computation protocols
Author: Thomas Schneider
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols,Computer networks-- Security measures,Data encryption (Computer science)
Classification :
TK5105
.
55
.
S36
2012eb


95. ExamWise for CIW security professiona
Author: / Chad M. Bayer
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Electronic data processing personnel--Certification--Study guides,Data encryption (Computer science)--Examinations--Study guides,Computer networks--Security measures
Classification :
QA
,
76
.
3
,.
B39
,
2003eb


96. ExamWise for CIW security professiona
Author: / Chad M. Bayer
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Electronic data processing personnel--Certification--Study guides,Data encryption (Computer science)--Examinations--Study guides,Computer networks--Security measures
Classification :
QA
,
76
.
3
,.
B39
,
2003eb


97. ExamWise for CIW security professional
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Electronic data processing personnel ; Certification ; Study guides. ; Data encryption (Computer science) ; Examinations ; Study guides. ; Computer networks ; Security measures. ;

98. ExamWise for CIW security professional
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Electronic data processing personnel ; Certification ; Study guides. ; Data encryption (Computer science) ; Examinations ; Study guides. ; Computer networks ; Security measures. ;

99. Financial cryptography: First International Conference, FC'97, Anguilla, British West Indies, Feb. 24-28, 1997: proceedings
Author: FC'79 )7991: Anguilla(
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Electronic funds transfers-- Security measures-- Congresses,، Internet )Computer network(-- Security measures-- Congresses,، Computer networks-- Security measures-- Congresses,، Data encryption )Computer science(-- Congresses
Classification :
HG
1710
.
F35
1997


100. Financial cryptography : First International Conference, FC'97, Anguilla, British West Indies, February 24-28, 1997 : proceedings
Author: Rafael Hirschfeld )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Security measures -- Congresses ، Electronic funds transfers,Security measures -- Congresses ، Internet,Congresses ، Computer networks -- Security measures,Congresses ، Data encryption )Computer science(
Classification :
QA
76
.
L28
Vol
.
1318

