• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۵۱ پاسخ غیر تکراری از ۵۳ پاسخ تکراری در مدت زمان ۰,۴۱ ثانیه یافت شد.

41. Cryptography and network security: principles and practice

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Stallings, William

Library: (Semnan)

Subject: Security measures ، Computer networks,، Data encryption )Computer science(,، Coding theory,، Computer security

Classification :
TK
5105
.
59
.
S7C7

42. Cryptography and network security: principles and practice [electronic resource]

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / William Stallings

Library: Imam Reza International University library and information center (Khorasan Razavi)

Subject: Computer networks--Security measures,Data encryption (Computer science),Coding theory,Computer security

Classification :
EB
,
TK5105
.
59
.
S713
1999

43. Cryptology and network security :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Srdjan Capkun, Sherman S.M. Chow (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Coding theory & cryptology.,Computer networks-- Security measures.,Computers-- Database Management-- Data Mining.,Computers-- Information Technology.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data mining.,Ethical & social aspects of IT.,Information retrieval.,Software Engineering.

Classification :
QA76
.
9
.
A25

44. Information and communications security :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Sihan Qing [and others] (editions.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses

Classification :
QA76
.
9
.
A25
I58
2011

45. Intelligent, secure, and dependable systems in distributed and cloud environments :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Issa Traore, Isaac Woungang, Sherif Saad Ahmed, Yasir Malik (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Cloud computing-- Security measures, Congresses.,Computer networks-- Security measures, Congresses.,Artificial intelligence.,Coding theory & cryptology.,Computer networks-- Security measures.,Computer security.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Information retrieval.,Network hardware.

Classification :
TK5105
.
59

46. Practical cryptography for data internetworks

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Stallings, William.

Library: Central Library of Amirkabir University of Technology (Tehran)

Subject: Computer networks - Security measures , Data encryption )Computer science( , Coding theory , Computer security

Classification :
TK
5105
.
59
.
S73
1996

47. Practical cyber intelligence :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Wilson Bautista Jr.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Cyber intelligence (Computer security),Cyberterrorism-- Prevention.,Information technology-- Security measures.,Coding theory & cryptology.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer science.,COMPUTERS / Security / General,Cyber intelligence (Computer security),Cybernetics & systems theory.,Cyberterrorism-- Prevention.,Data encryption.,Information technology-- Security measures.

Classification :
HV6773

48. Risks and Security of Internet and Systems :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by Nora Cuppens, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquin Garcia-Alfaro.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses.,Internet-- Security measures, Congresses.,Artificial intelligence.,Artificial intelligence.,Coding theory & cryptology.,Computer science.,Computers-- Expert Systems.,Computers-- Information Technology.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Computers, Special purpose.,Computers.,Data encryption (Computer science),Expert systems-- knowledge-based systems.,Information retrieval.,Information technology: general issues.,Software engineering.,Software Engineering.

Classification :
QA76
.
758
I58
2017

49. رمزنگاری و امنیت شبکه

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / تالیف ویلیام استالینگز

Library: Central Library and Archive Center of shahid Beheshti University (Tehran)

Subject: شبکه‌های کامپیوتری,Computer networks,رمزگذاری داده‌ها,Data encryption (Computer science),نظریه رمز‌گذاری,Coding theory,کامپیوترها,Computer security,-- تدابیر ایمنی,-- Security measures,-- ایمنی اطلاعات

Classification :
۰۰۵
/
۸۲
الف
۴۷۷
ر
۱۳۹۷‌

50. رمزنگاری و امنیت شبکه

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / تالیف ویلیام استالینگز,اس‍ت‍ال‍ی‍ن‍گ‍ز,Stallings

Library: Central Library and Documents Center of Tehran University (Tehran)

Subject: شبکه‌های کامپیوتری,Computer networks,رمزگذاری داده‌ها,Data encryption (Computer science),نظریه رمز‌گذاری,Coding theory,کامپیوترها,Computer security, -- تدابیر ایمنی, -- Security measures, -- ایمنی اطلاعات,a01,a02,a03,a04

Classification :
TK
۵۱۰۵
/
۵۹
/
الف
۵
ر
۸ ۱۳۹۷

51. رمزنگاری و امنیت شبکه( مبانی و راهکارها)

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / تالیف ویلیام استالینگز,اس‍ت‍ال‍ی‍ن‍گ‍ز,Stallings

Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)

Subject: شبكه هاي كامپيوتري - تدابير ايمني Computer networks - Security measures,رمزگذاري داده ها Data encryption (Computer science),نظريه رمز گذاري Coding theory,كامپيوترها - ايمني اطلاعات Computer security

Classification :
TK
۵۱۰۵
/
۵۹
/
الف
۵
ر
۸ ۱۳۹۷
  • »
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival