41. Handbook of computer networks and cyber security
Author: Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Computer networks.,Computer security.
Classification :
TK5105
.
5


42. Handbook of information and communication security
Author: / Peter Stavroulakis, Mark Stamp, editors
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security,Data encryption (Computer science),Computer Science, IT
Classification :
QA76
.
9
.
A25H355
2010


43. Handbook of multimedia information security :
Author: editor, Amit Kumar Singh and Anand Mohan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Multimedia systems.,Computer security.,Multimedia systems.
Classification :
QA76
.
575


44. Improving Advanced Encryption Standard Performance with Residue Number System
Author: Odunayo, Tajudeen Kafayat
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science

45. Improving Advanced Encryption Standard Performance with Residue Number System
Author: Odunayo, Tajudeen Kafayat
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science

46. Improving Data Security with Honey Encryption and Residue Number System
Author: Afoluwaso Giwa, Tawakalitu
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science

47. Improving Data Security with Honey Encryption and Residue Number System
Author: Afoluwaso Giwa, Tawakalitu
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science

48. 20090601 ,Includes bibliographical references and index. 0
Author: 20090602 ,20090602 0
Library: Library of Islamic Parliament (Tehran)
Subject:

49. Information Security Technology for Applications
Author: edited by Peeter Laud
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory,Computer science,Data encryption (Computer science),Data protection,Data structures (Computer science),Information Systems,Coding and Information Theory,Computer Science,Data Encryption,Data Structures, Cryptology and Information Theory,Information Systems Applications (incl. Internet),Management of Computing and Information Systems,Systems and Data Security

50. Information technology network and internet :
Author: C.T. Bhunia.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Information technology.,Internet.,Computer networks.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Information technology.,Internet.
Classification :
T58
.
5
.
I54
2008eb


51. Intel® trusted execution technology for server platforms :
Author: William Futral, James Greene
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Client/server computing-- Security measures,Data encryption (Computer science),Database security.,Computer Science,Data Encryption,Database Management
Classification :
QA76
.
9
.
A25


52. International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018 /
Author: editors, Jude Hemanth, Xavier Fernando, Pavel Lafata, and Zubair Baig.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Information technology, Congresses.,Internet of things, Congresses.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Information technology.,Internet of things.
Classification :
T58
.
5


53. Introduction to Cryptography
Author: by Johannes A. Buchmann.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data structures (Computer science).,Mathematics.,Number theory.

54. Introduction to Identity-Based Encryption.
Author: Luther Martin
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Public key cryptography.,Public key infrastructure (Computer security)
Classification :
QA76
.
9
.
A25
L884
2008


55. Introduction to computer and network security :
Author: Richard R. Brooks, Clemson University, South Carolina, USA
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Data encryption (Computer science),Data protection
Classification :
QA76
.
9
.
A25
B7745
2014


56. Make a shield from wisdom :
Author: 20090507 0
Library: Library of Islamic Parliament (Tehran)
Subject:

57. Malicious attack propagation and source identification /
Author: Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, Wanlei Zhou.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Communications engineering-- telecommunications.,Computer networks-- Security measures.,Computer security.,Computer security.,COMPUTERS-- Security-- General.,Data encryption (Computer science),Network hardware.
Classification :
QA76
.
9
.
A25


58. Modelling cyber security :
Author: edited by Umberto Gori.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Cryptography, Congresses.,Data encryption (Computer science), Congresses.,Computer security.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Cryptography.,Data encryption (Computer science)
Classification :
QA76
.
9
.
D314
M64
2009


59. Netzwerk- und Datensicherheit :
Author: Martin Kappes.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures.,Computer security.,Data encryption (Computer science)
Classification :
TK5105
.
59
M378
2013


60. Next generation SSH2 implementation :
Author: Dale Liu, lead author and technical editor ; Max Caceres [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: UNIX Shells.,UNIX Shells.,UNIX Shells.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
L585
2009eb

