61. Security Protocols
Author: edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Computer software.,Data encryption (Computer science),Data protection.,Information Systems.

62. Self-Adaptive Software:
Author: edited by Robert Laddaga, Howie Shrobe, Paul Robertson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks,Computer science,Software engineering

63. Software Composition
Author: edited by Thomas Gschwind, Flavio Paoli, Volker Gruhn, Matthias Book
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks,Computer science,Logic design,Software engineering,Computer Communication Networks,Computer Science,Logics and Meanings of Programs,Mathematical Logic and Formal Languages,Programming Languages, Compilers, Interpreters,Programming Techniques,Software Engineering

64. Software Engineering for Resilient Systems :
Author: edited by Anatoliy Gorbenko, Alexander Romanovsky, Vyacheslav Kharchenko.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Software engineering.

65. Software Service and Application Engineering
Author: edited by Maritta Heisel
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks,Computer science,Logic design,Software engineering,Computation by Abstract Devices,Computer Communication Networks,Computer Science,Information Systems Applications (incl. Internet),Logics and Meanings of Programs,Software Engineering

66. Software System Design Methods :
Author: edited by Jozef K. Skwirzynski.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Software engineering.
Classification :
QA76
.
76
.
D47
E358
1986


67. Softwaretechnik für verteilte Systeme
Author: von Jürgen Nehmer.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Software engineering.

68. Telepresence
Author: edited by P. J. Sheppard, G. R. Walker.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Multimedia systems.,Software engineering.

69. The Temporal Logic of Reactive and Concurrent Systems :
Author: by Zohar Manna, Amir Pnueli.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Software engineering.
Classification :
QA76
.
6
B996
1992


70. Theory and Practice of Model Transformations :
Author: edited by Jordi Cabot, Eelco Visser.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Software engineering.
Classification :
QA76
.
76
.
D47
E358
2011


71. Theory and Practice of Model Transformations
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Model-driven software architecture -- Congresses,Computer science,Computer Communication Networks,علوم کامپیوتر,شبکههای ارتباطی کامپیوتری
Classification :
E-Book
,

72. Theory and Practice of Model Transformations
Author: edited by Zhenjiang Hu, Juan Lara
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks,Computer science,Logic design,Software engineering,Computer Communication Networks,Computer Science,Logics and Meanings of Programs,Mathematical Logic and Formal Languages,Programming Languages, Compilers, Interpreters,Programming Languages, Compilers, Interpreters,Software Engineering

73. Understanding Agent Systems
Author: by Mark d'Inverno, Michael Luck.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Software engineering.

74. Verification, Model Checking, and Abstract Interpretation :
Author: edited by Roberto Giacobazzi, Josh Berdine, Isabella Mastroeni.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Software engineering.
Classification :
QA76
.
76
.
V47
E358
2013


75. Vernetzte und komplexe Informatik-Systeme :
Author: herausgegeben von Bernd E. Wolfinger.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Software engineering.
Classification :
QA76
.
5
H473
1988


76. Web-Age Information Management :
Author: edited by Yunjun Gao, Kyuseok Shim, Zhiming Ding, Peiquan Jin, Zujie Ren, Yingyuan Xiao, An Liu, Shaojie Qiao.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Computer software.

77. Web Information Systems Engineering WISE 2014 Workshops : 15th International Workshops IWCSN 2014, Org2 2014, PCS 2014, and QUAT 2014, Thessaloniki, Greece, October 12-14, 2014, Revised Selected Papers
Author: edited by Boualem Benatallah, Azer Bestavros, Barbara Catania, Armin Haller, Yannis Manolopoulos, Athena Vakali, Yanchun Zhang.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Artificial intelligence,، Computer Communication Networks,، Computer science,، Software engineering
Classification :
TK
5105
.
888
.
W37
2015


78. Wired/Wireless Internet Communication
Author: edited by Yevgeni Koucheryavy, Lefteris Mamatas, Ibrahim Matta, Vassilis Tsaoussidis
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks,Computer science,Data protection,Information systems,Software engineering,Computer Communication Networks,Computer Science,Information Systems and Communication Service,Information Systems Applications (incl. Internet),Software Engineering,Systems and Data Security
