• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۷۴ پاسخ غیر تکراری از ۷۷ پاسخ تکراری در مدت زمان ۰,۵۰ ثانیه یافت شد.

41. Handbook of computer networks and cyber security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta, editors.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Computer networks.,Computer security.

Classification :
TK5105
.
5

42. Handbook of information and communication security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Peter Stavroulakis, Mark Stamp, editors

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer security,Data encryption (Computer science),Computer Science, IT

Classification :
QA76
.
9
.
A25H355
2010

43. Handbook of multimedia information security :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: editor, Amit Kumar Singh and Anand Mohan.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Multimedia systems.,Computer security.,Multimedia systems.

Classification :
QA76
.
575

44. Improving Advanced Encryption Standard Performance with Residue Number System

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Odunayo, Tajudeen Kafayat

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer science

Classification :

45. Improving Advanced Encryption Standard Performance with Residue Number System

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Odunayo, Tajudeen Kafayat

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer science

Classification :

46. Improving Data Security with Honey Encryption and Residue Number System

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Afoluwaso Giwa, Tawakalitu

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer science

Classification :

47. Improving Data Security with Honey Encryption and Residue Number System

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Afoluwaso Giwa, Tawakalitu

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer science

Classification :

48. 20090601 ,Includes bibliographical references and index. 0

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: 20090602 ,20090602 0

Library: Library of Islamic Parliament (Tehran)

Subject:

Classification :

49. Information Security Technology for Applications

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by Peeter Laud

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Coding theory,Computer science,Data encryption (Computer science),Data protection,Data structures (Computer science),Information Systems,Coding and Information Theory,Computer Science,Data Encryption,Data Structures, Cryptology and Information Theory,Information Systems Applications (incl. Internet),Management of Computing and Information Systems,Systems and Data Security

Classification :

50. Information technology network and internet :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: C.T. Bhunia.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks.,Information technology.,Internet.,Computer networks.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Information technology.,Internet.

Classification :
T58
.
5
.
I54
2008eb

51. Intel® trusted execution technology for server platforms :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: William Futral, James Greene

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Client/server computing-- Security measures,Data encryption (Computer science),Database security.,Computer Science,Data Encryption,Database Management

Classification :
QA76
.
9
.
A25

52. International Conference on Intelligent Data Communication Technologies and Internet of Things (ICICI) 2018 /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: editors, Jude Hemanth, Xavier Fernando, Pavel Lafata, and Zubair Baig.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Information technology, Congresses.,Internet of things, Congresses.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Information technology.,Internet of things.

Classification :
T58
.
5

53. Introduction to Cryptography

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: by Johannes A. Buchmann.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Data structures (Computer science).,Mathematics.,Number theory.

Classification :

54. Introduction to Identity-Based Encryption.

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Luther Martin

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Data encryption (Computer science),Public key cryptography.,Public key infrastructure (Computer security)

Classification :
QA76
.
9
.
A25
L884
2008

55. Introduction to computer and network security :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Richard R. Brooks, Clemson University, South Carolina, USA

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Computer security,Data encryption (Computer science),Data protection

Classification :
QA76
.
9
.
A25
B7745
2014

56. Make a shield from wisdom :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: 20090507 0

Library: Library of Islamic Parliament (Tehran)

Subject:

Classification :

57. Malicious attack propagation and source identification /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, Wanlei Zhou.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Communications engineering-- telecommunications.,Computer networks-- Security measures.,Computer security.,Computer security.,COMPUTERS-- Security-- General.,Data encryption (Computer science),Network hardware.

Classification :
QA76
.
9
.
A25

58. Modelling cyber security :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by Umberto Gori.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses.,Cryptography, Congresses.,Data encryption (Computer science), Congresses.,Computer security.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Cryptography.,Data encryption (Computer science)

Classification :
QA76
.
9
.
D314
M64
2009

59. Netzwerk- und Datensicherheit :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Martin Kappes.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks -- Security measures.,Computer security.,Data encryption (Computer science)

Classification :
TK5105
.
59
M378
2013

60. Next generation SSH2 implementation :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Dale Liu, lead author and technical editor ; Max Caceres [and others].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: UNIX Shells.,UNIX Shells.,UNIX Shells.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data encryption (Computer science)

Classification :
QA76
.
9
.
A25
L585
2009eb
  • »
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival