41. Cryptography and network security: principles and practice
Author: Stallings, William
Library: (Semnan)
Subject: Security measures ، Computer networks,، Data encryption )Computer science(,، Coding theory,، Computer security
Classification :
TK
5105
.
59
.
S7C7


42. Cryptography and network security: principles and practice [electronic resource]
Author: / William Stallings
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Computer networks--Security measures,Data encryption (Computer science),Coding theory,Computer security
Classification :
EB
,
TK5105
.
59
.
S713
1999

43. Cryptology and network security :
Author: Srdjan Capkun, Sherman S.M. Chow (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Coding theory & cryptology.,Computer networks-- Security measures.,Computers-- Database Management-- Data Mining.,Computers-- Information Technology.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data mining.,Ethical & social aspects of IT.,Information retrieval.,Software Engineering.
Classification :
QA76
.
9
.
A25


44. Information and communications security :
Author: Sihan Qing [and others] (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011


45. Intelligent, secure, and dependable systems in distributed and cloud environments :
Author: Issa Traore, Isaac Woungang, Sherif Saad Ahmed, Yasir Malik (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures, Congresses.,Computer networks-- Security measures, Congresses.,Artificial intelligence.,Coding theory & cryptology.,Computer networks-- Security measures.,Computer security.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Information retrieval.,Network hardware.
Classification :
TK5105
.
59


46. Practical cryptography for data internetworks
Author: Stallings, William.
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer networks - Security measures , Data encryption )Computer science( , Coding theory , Computer security
Classification :
TK
5105
.
59
.
S73
1996


47. Practical cyber intelligence :
Author: Wilson Bautista Jr.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Cyber intelligence (Computer security),Cyberterrorism-- Prevention.,Information technology-- Security measures.,Coding theory & cryptology.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer science.,COMPUTERS / Security / General,Cyber intelligence (Computer security),Cybernetics & systems theory.,Cyberterrorism-- Prevention.,Data encryption.,Information technology-- Security measures.
Classification :
HV6773


48. Risks and Security of Internet and Systems :
Author: edited by Nora Cuppens, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquin Garcia-Alfaro.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Internet-- Security measures, Congresses.,Artificial intelligence.,Artificial intelligence.,Coding theory & cryptology.,Computer science.,Computers-- Expert Systems.,Computers-- Information Technology.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Computers, Special purpose.,Computers.,Data encryption (Computer science),Expert systems-- knowledge-based systems.,Information retrieval.,Information technology: general issues.,Software engineering.,Software Engineering.
Classification :
QA76
.
758
I58
2017


49. رمزنگاری و امنیت شبکه
Author: / تالیف ویلیام استالینگز
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: شبکههای کامپیوتری,Computer networks,رمزگذاری دادهها,Data encryption (Computer science),نظریه رمزگذاری,Coding theory,کامپیوترها,Computer security,-- تدابیر ایمنی,-- Security measures,-- ایمنی اطلاعات
Classification :
۰۰۵
/
۸۲
الف
۴۷۷
ر
۱۳۹۷


50. رمزنگاری و امنیت شبکه
Author: / تالیف ویلیام استالینگز,استالینگز,Stallings
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: شبکههای کامپیوتری,Computer networks,رمزگذاری دادهها,Data encryption (Computer science),نظریه رمزگذاری,Coding theory,کامپیوترها,Computer security, -- تدابیر ایمنی, -- Security measures, -- ایمنی اطلاعات,a01,a02,a03,a04
Classification :
TK
۵۱۰۵
/
۵۹
/
الف
۵
ر
۸ ۱۳۹۷


51. رمزنگاری و امنیت شبکه( مبانی و راهکارها)
Author: / تالیف ویلیام استالینگز,استالینگز,Stallings
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: شبكه هاي كامپيوتري - تدابير ايمني Computer networks - Security measures,رمزگذاري داده ها Data encryption (Computer science),نظريه رمز گذاري Coding theory,كامپيوترها - ايمني اطلاعات Computer security
Classification :
TK
۵۱۰۵
/
۵۹
/
الف
۵
ر
۸ ۱۳۹۷

