• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۱۴۶ پاسخ غیر تکراری از ۱۴۸ پاسخ تکراری در مدت زمان ۰,۲۲ ثانیه یافت شد.

61. Cryptography and network security: principles and practice

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Stallings, William.

Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)

Subject: Security measures ، Computer networks,، Data encryption )Computer science(,، Coding theory,، Computer security

Classification :
TK
5105
.
59
.
S713
2008

62. Cryptography and network security: principles and practice

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Stallings, William

Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)

Subject: Security measures ، Computer networks,، Data encryption )Computer science(,، Coding theory,، Computer security

Classification :
TK
5105
.
59
.
S713
2005

63. Cryptography and network security : principles and practice

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Stallings, William, 5491-

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Computer networks -- Security measures,، Data encryption )Computer science(,، Coding theory,، Computer security

Classification :
TK
5105
.
59
.
S82C7
2011

64. Cryptography and network security: principles and practice

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Stallings, William

Library: (Semnan)

Subject: Security measures ، Computer networks,، Data encryption )Computer science(,، Coding theory,، Computer security

Classification :
TK
5105
.
59
.
S7C7

65. Cryptography and network security: principles and practice [electronic resource]

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / William Stallings

Library: Imam Reza International University library and information center (Khorasan Razavi)

Subject: Computer networks--Security measures,Data encryption (Computer science),Coding theory,Computer security

Classification :
EB
,
TK5105
.
59
.
S713
1999

66. Cryptology and network security :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Jan Camenisch, Panos Papadimitratos (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer Communication Networks.,Computers and Society.,Cryptology.,Information Systems and Communication Service.,Software Engineering/Programming and Operating Systems.,Computer networking & communications.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- Online Services-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Ethical & social aspects of IT.,Network hardware.,Software Engineering.

Classification :
QA76
.
9
.
A25

67. Cryptology and network security :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Srdjan Capkun, Sherman S.M. Chow (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Coding theory & cryptology.,Computer networks-- Security measures.,Computers-- Database Management-- Data Mining.,Computers-- Information Technology.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data mining.,Ethical & social aspects of IT.,Information retrieval.,Software Engineering.

Classification :
QA76
.
9
.
A25

68. Data privacy management and autonomous spontaneous security :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Roberto Di Pietro [and others] (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.

Classification :

69. Data privacy management and autonomous spontaneus [sic] security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Joaquin Garcia-Alfaro ... [et al.] (eds.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses

Classification :
QA76
.
9
.
A97
D76
2011eb

70. Engineering secure software and systems

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Gilles Barthe, Benjamin Livshits, Riccardo Scandariato (eds.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Software engineering, Congresses

Classification :
QA76
.
9
.
A25
E54
2011eb

71. Engineering secure two-party computation protocols

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Thomas Schneider

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer network protocols,Computer networks-- Security measures,Data encryption (Computer science)

Classification :
TK5105
.
55
.
S36
2012eb

72. Financial cryptography: First International Conference, FC'97, Anguilla, British West Indies, Feb. 24-28, 1997: proceedings

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: FC'79 )7991: Anguilla(

Library: Central Library of Sharif University of Technology (Tehran)

Subject: ، Electronic funds transfers-- Security measures-- Congresses,، Internet )Computer network(-- Security measures-- Congresses,، Computer networks-- Security measures-- Congresses,، Data encryption )Computer science(-- Congresses

Classification :
HG
1710
.
F35
1997

73. Financial cryptography (Online)

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Rafael Hirschfeld (ed.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Electronic funds transfers-- Security measures, Congresses.,Internet-- Security measures, Congresses.

Classification :

74. Financial cryptography and data security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer networks ; Security measures ; Congresses. ; Data encryption (Computer science) ; Congresses. ; Electronic commerce ; Security measures ; Congresses. ; Electronic funds transfers ; Security measures ; Congresses. ; Internet ; Security measures ;

Classification :

75. Financial cryptography: 4th international conference, FC 2000, Anguilla, British West Indies, February 20-24, 2000: proceedings

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library of Sharif University of Technology (Tehran)

Subject: Congresses ، Electronic funds transfers-- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Electronic commerce-- Security measures,Congresses ، Internet-- Security measures,Congresses ، Computer networks-- Security measures

Classification :
HG
1710
.
F35
2000

76. Financial cryptography: 8th international conference, FC 2004, Key West, FL, USA, February 9-12, 2004 : revised papers

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library of Sharif University of Technology (Tehran)

Subject: Congresses ، Electronic funds transfers-- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Electronic commerce-- Security measures,Congresses ، Internet-- Security measures,Congresses ، Computer networks-- Security measures

Classification :
HG
1710
.
F35
2004

77. Hacking point of sale

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Slava Gomzin

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business enterprises-- Computer networks-- Security measures,Data encryption (Computer science),Electronic funds transfers-- Security measures,Point-of-sale systems

Classification :
HD30
.
38
.
G66
2014

78. Implementing SSH

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Himanshu Dwivedi

Library: Library of Urmia University of Technology (West Azarbaijan)

Subject: UNIX Shells,Computer networks- Security measures,Data encryption (Computer science)

Classification :
QA
,
76
.
76
,.
O63
,
D895
,
2004

79. Implementing SSH

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Himanshu Dwivedi

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: UNIX Shells,Computer networks- Security measures,Data encryption (Computer science)

Classification :
QA76
.
76
.
O63
,
D895
2004

80. Implementing SSL/TLS using cryptography and PKI /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Joshua Davies.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Data encryption (Computer science)

Classification :
TK5105
.
59
.
D39
2011
  • »
  • 8
  • 7
  • 6
  • 5
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival