21. Information security: a practical approach
Author: Bhaskar, S. M.
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: ، Computer security,Security measures ، Computer networks,، Public key cryptography
Classification :
QA
76
.
9
.
A25
B473
2008


22. Internet and intranet security management
Author: / Lech Janczewski
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Internet- Security measures,Intranets (Computer networks)- Security measures,Computers- Access control,Cryptography
Classification :
TK5105
.
875
.
I57
,
J358
2000


23. #Internet and intranet security management
Author: #Lech Janczewski
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Internet- Security measures ،Intranets )Computer networks(- Security measures ،Computers- Access control ،Cryptography
Classification :
#
TK
،#.
I57
,
J358


24. Internet and intranet security management
Author: / Lech Janczewski
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Internet- Security measures,Intranets (Computer networks)- Security measures,Computers- Access control,Cryptography
Classification :
E-BOOK

25. Introduction to certificateless cryptography /
Author: Hu Xiong, Zhen Qin, Athanasios V. Vasilakos
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Data encryption (Computer science),Identification,Public key cryptography,Public key infrastructure (Computer security)
Classification :
QA76
.
9
.
A25
X75
2017


26. Introduction to cryptography
Author: Hans Delfs, Helmut Knebl
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computer security,Cryptography,Computer networks -- Security measures
Classification :
QA
،
76
.
9
،.
A25
،
2007


27. Introduction to cryptography
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Cryptography. ; Computer networks ; Security measures. ;

28. Introduction to cryptography
Author: Hans Delfs, Helmut Knebl.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Cryptography.
Classification :
QA76
.
9
.
A25
D447
2007eb


29. Introduction to cryptography
Author: / Hans Delfs, Helmut Knebl
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Cryptography.,Computer networks--Security measures
Classification :
QA
,
76
.
9
,.
A25
,
D447
,
2007


30. Introduction to cryptography
Author: / Hans Delfs, Helmut Knebl
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security,Cryptography,Computer networks -- Security measures
Classification :
QA
76
.
9
.
A25
D5
2007


31. Introduction to cryptography and network security
Author: Forouzan, Behrouz A.
Library: Central library and information center (Khorasan Razavi)
Subject: Security measures ، Computer networks,، Cryptography
Classification :
TK
5105
.
59
.
F672
2008


32. Introduction to cryptography and network security
Author: Behrouz A. Forouzan
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Computer networks, Security measures,Cryptography
Classification :
TK
,
5105
.
59
,.
F672
,
2008


33. Introduction to cryptography and network security
Author: Forouzan, Behrouz A
Library: Central Library and Documentation Center (Kerman)
Subject: ، Computer networks - Security measures,، Cryptography
Classification :
TK
5105
.
59
.
F67
2008


34. Introduction to cryptography and network security
Author: / Behrouz A. Forouzan
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks, Security measures,Cryptography
Classification :
TK5105
.
59
.
F672
2008


35. Introduction to cryptography: principles and applications
Author: Delfs, Hans
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer security,، Cryptography,، Computer networks-- Security measures
Classification :
QA
76
.
9
.
A25
.
D447
2007


36. PKI :
Author: Andrew Nash [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Public key cryptography.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,Computers-- Access control.,Computers-- Access control.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Public key cryptography.,Public key cryptography.,Public-Key-Infrastruktur
Classification :
QA76
.
9
.
A25
P59
2001eb


37. Public key infrastructures, services and applications
Author: Fabio Martinelli, Bart Preneel (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Data encryption (Computer science), Congresses,Public key cryptography, Congresses,Public key infrastructure (Computer security), Congresses

38. RSA Security's official guide to cryptography
Author: / Steve Burnett and Stephen Paine
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Data encryption (Computer science),Cryptography
Classification :
E-BOOK

39. Security and cryptography for networks
Author: / Roberto De Prisco, Moti Yung (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Congresses,Cryptography--Congresses
Classification :
TK
,
5105
.
59
,.
S385
,
2006
QA
,
75
,.
L4
,
vol
.,
4116

