1. Advances in cryptology -- EUROCRYPT 2018 :
Author: Jesper Buus Nielsen, Vincent Rijmen (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Artificial intelligence.,Coding theory & cryptology.,Computer networks-- Security measures.,Computer security.,Computers-- Database Management-- Data Mining.,Computers-- Information Theory.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data mining.,Ethical & social aspects of IT.,Software Engineering.
Classification :
QA76
.
9
.
A25


2. Contemporary computing :
Author: Sanjay Ranka [and others] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science, Congresses.,Soft computing, Congresses.,Computer science.,Computer science.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Informatique.,Soft computing.,Soft computing.
Classification :
QA75
.
5
.
I584
2009


3. Cryptology and network security :
Author: Srdjan Capkun, Sherman S.M. Chow (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Coding theory & cryptology.,Computer networks-- Security measures.,Computers-- Database Management-- Data Mining.,Computers-- Information Technology.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data mining.,Ethical & social aspects of IT.,Information retrieval.,Software Engineering.
Classification :
QA76
.
9
.
A25


4. Proceedings of The IFIP TC 11 23rd International Information Security Conference
Author: / edited by Sushil Jajodia, Pierangela Samarati, Stelvio Cimato.
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer networks -- Security measures -- Congresses, Computers -- Access control -- Congresses, Computer security -- Congresses,Computer networks -- Access control -- Congresses,Data protection -- Congresses
Classification :
QA
76
.
9
.
A25I461
2008


5. Transactions on large-scale data- and knowledge-centered systems XXXVII /
Author: edited by Abdelkader Hameurlain, Roland Wagner.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data mining, Congresses.,Database management, Congresses.,Artificial intelligence.,Artificial intelligence.,Computer networks.,Computer science.,Computer security.,Computer security.,Computers-- Database Management-- Data Mining.,Computers-- Hardware-- Network Hardware.,Computers-- Intelligence (AI) & Semantics.,Computers-- Operating Systems-- General.,Computers-- Security-- General.,Computers-- Software Development & Engineering-- General.,Data mining.,Data mining.,Network hardware.,Operating systems (Computers),Operating systems.,Software engineering.,Software Engineering.
Classification :
QA76
.
9
.
A25


6. Transactions on large-scale data- and knowledge-centered systems XXXVIII :
Author: Abdelkader Hameurlain, Roland Wagner, Sven Hartmann, Hui Ma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data mining, Congresses.,Database management, Congresses.,Computer networks-- Security measures.,Computer security.,Data mining.,Database management.
Classification :
QA76
.
9
.
A25

