• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۱۴۶ پاسخ غیر تکراری از ۱۴۸ پاسخ تکراری در مدت زمان ۰,۴۵ ثانیه یافت شد.

141. Trusted systems

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Liqun Chen, Moti Yung, Liehuang Zhu (eds.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses

Classification :
QA76
.
9
.
A25
I58
2011eb

142. Trusted systems

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Chris J. Mitchell, Allan Tomlinson (eds.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses

Classification :
QA76
.
9
.
A25
I58
2012eb

143. Trustworthy computing and services

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Yuyu Yuan, Xu Wu, Yueming Lu (eds.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses

Classification :
QA76
.
9
.
A25
I83
2012

144. Trustworthy execution on mobile devices

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Vasudevan, Amit,Amit Vasudevan, Jonathan M. McCune, James Newsome

Library: Library and Documentation Center of Kurdistan University (Kurdistan)

Subject: ، Computer security,، Mobile computing,Security measures ، Mobile communication systems,، Computer Science,، Systems and Data Security,، Computer Communication Networks,، Data Encryption,، Communications Engineering, Networks

Classification :
QA76
.
9
.
A25

145. Unix secure shell

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Carasik, Anne H

Library: Central Library of Sharif University of Technology (Tehran)

Subject: ، UNIX )Computer file(,، UNIX shells,، Computer networks-- Management,، Data encryption )Computer science(,، Computer networks-- Security measures

Classification :
QA
76
.
76
.
O63
.
C37
1999

146. رمزنگاری و امنیت شبکه( مبانی و راهکارها)

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / تالیف ویلیام استالینگز,اس‍ت‍ال‍ی‍ن‍گ‍ز,Stallings

Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)

Subject: شبكه هاي كامپيوتري - تدابير ايمني Computer networks - Security measures,رمزگذاري داده ها Data encryption (Computer science),نظريه رمز گذاري Coding theory,كامپيوترها - ايمني اطلاعات Computer security

Classification :
TK
۵۱۰۵
/
۵۹
/
الف
۵
ر
۸ ۱۳۹۷
  • »
  • 8
  • 7
  • 6
  • 5
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival