1. ......................
Author: Pfleeger, Charles P.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,، Data protection,، Privacy, Right of
Classification :
QA
76
.
9
.
A25
P45
1997


2. .....................
Author: Terry Bernstein...]et al.[
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Computer networks - Security measures ، Business enterprises,Security measures ، Internet )Computer network(,Security measures ، World Wide Web )Information retrieval system(,Security measures ، Electronic funds transfers,، Data encryption )Computer science(
Classification :
HD
30
.
38
.
I57
1996


3. A guide to kernel exploitation : attacking the core
Author: Perla, Enrico
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Security measures ، Operating systems )Computers(,، Computer security
Classification :
QA
76
.
76
.
O63
P5168
2011


4. A Guide to kernel exploitation: <attacking the core>
Author: / Enrico Perla, Massimiliano Oldani; technical editor, Graham Speake
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Operating systems (Computers),Computer security,-- Security measures
Classification :
005
.
8
P451G
2011


5. A Question of Chemistry
Author: John Garratt,Tina Overton ,Terry Threlfall
Library: Central Library and Document Center of Shahid Madani University of Azarbayjan (East Azarbaijan)
Subject: Computer security,Computer architecture
Classification :
QD
,
39
,.
G27Q8
,
1999


6. A bug hunter's diary :
Author: Tobias Klein
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Debugging in computer science,Malware (Computer software)
Classification :
QA76
.
9
.
D43
K5813
2011


7. A business guide to information security :
Author: Alan Calder
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures,Computer security,Data protection,Information resources management-- Security measures,Information technology-- Security measures
Classification :
QA76
.
9
.
A25
C34188
2005


8. A business guide to information security. how to protect your company's IT assets, reduce risks and understand the law
Author: Calder, Alan
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Information technology- Security measures,، Data protection,، Business- Data processing- Security measures
Classification :
QA
76
.
9
.
A25
C34188
2005


9. A classical introduction to cryptograph
Author: / by Serge Vaudenay
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Cryptography.
Classification :
QA
,
76
.
9
,.
A25
,.
V39
,
2005


10. A classical introduction to cryptography
Author: by Serge Vaudenay.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Cryptography.

11. A classical introduction to cryptography
Author: / by Serge Vaudenay
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security,Cryptography
Classification :
QA76
.
9
.
A25V39
2006


12. A classical introduction to cryptography :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ;

13. A classical introduction to cryptography
Author: / by Serge Vaudenay
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Cryptography
Classification :
QA76
.
9
.
A25
,.
V39
2005


14. A classical introduction to cryptography
Author: / by Serge Vaudenay
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Cryptography
Classification :
QA76
.
9
.
A25
,.
V39
2005


15. A classical introduction to cryptography
Author: / by Serge Vaudenay
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Cryptography
Classification :
QA76
.
9
.
A25
,.
V39
2005


16. A classical introduction to cryptography: applications for communications security
Author: Vaudenay, Serge
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Computer security,، Cryptography
Classification :
QA
76
.
9
.
A25
.
V39


17. A classical introduction to cryptography exercise book
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Cryptography. ; Cryptography ; Problems, exercises, etc. ;

18. A classical introduction to cryptography exercise book
Author: by Thomas Baigneres...]et al.[
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Cryptography,Problems, exercises, etc ، Cryptography
Classification :
QA
76
.
9
.
A25C56


19. A classical introduction to cryptography exercise book
Author: / by Thomas Baign?eres ... [et al.]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Cryptography.,Cryptography--Problems, exercises, etc
Classification :
QA
,
76
.
9
,.
A25
,
C544
,
2006


20. A classical introduction to cryptography exercise book
Author: by Thomas Baigneres ... ]et al.[
Library: Library of College of Science University of Tehran (Tehran)
Subject: ، Computer security,، Cryptography,Problems, exercises, etc ، Cryptography
Classification :
QA
76
.
9
.
A25
C544
2006

