401. Security mechanisms for computer networks
Author: / Sead Muftic and P. Christoffersson ... (et al.)
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Computer security,Computer networks - Security measures
Classification :
QA
76
.
9
.
A25M84
1989


402. Security of e-systems and computer networks
Author: Mohammad S. Obaidat, Noureddine A. Boudriga
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures
Classification :
TK
5105
.
59
.
O23S4


403. Security, privacy and reliability in computer communications and networks
Author: / Sha Aaron
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer networks--Security measures,Computer networks--Reliability,Data transmission systems--Security measures
Classification :
TK5105
.
59
.
S4433
2017


404. Security, privacy and reliability in computer communications and networks
Author: / editors, Kewei Sha, Aaron Striegel, Min Song.
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computer networks,Computer networks,Data transmission systems,Data transmission systems,Data encryption (Computer science),Routing protocols (Computer network protocols),Computer networks,Computer networks,Data encryption (Computer science),Data transmission systems,Data transmission systems,Routing protocols (Computer network protocols),-- Security measures,-- Reliability,-- Security measures,-- Reliability,-- Reliability,-- Security measures,-- Reliability,-- Security measures
Classification :
005
.
8
S4466
2017
21


405. Security procedures for computer systems
Author: / Charles F. Hemphill,John M. Hemphill.
Library: National Library and Archives of Islamic Republic of Iran (Tehran)
Subject: مراکز دادهپردازی, -- تدابیر ایمنی
Classification :
HF
۵۵۴۸
/
۳۷
/
ھ
۸
س
۸ ۱۳۵۲


406. Simple computer security : disinfect your PC
Author: CA, with Eric Geier and Jim Geier
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Data protection
Classification :
QA
76
.
9
.
A25G44


407. Simple computer security :disinfect your PC
Author: Eric Geier, Jim Geier
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Data protection
Classification :
QA
76
.
9
.
A25
G45
2007


408. State of the art in applied cryptography : course on computer security and industrial cryptography, Leuven, Belgium, June 3-6, 1997 : revised lectures
Author: Bart Preneel, Vincent Rijmen )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Addresses, essays, lectures ، Computer security,Addresses, essays, lectures ، Cryptography
Classification :
QA
76
.
L28
Vol
.
1528


409. Statistical methods in computer security
Author:
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: ، Computer security--Statistical methods
Classification :
QA
76
.
9
.
A25
S73
2005


410. The CISSP prep guide :mastering the ten domains of computer security
Author: Krutz, Ronald L.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Certification ، Electronic data processing personnel,Study guides ، Computer networks - Examinations
Classification :
QA
76
.
3
.
K78
2001


411. The Ninth World Conference on Computer Security, Audit and Control
Author: / Queen Elizabeth II Conference Centre, Westminster, London, UK 4-6 November 1992,World Congress on Computer Security
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computer security -- Congresses
Classification :
QA
76
.
9
.
A25W6
1992


412. Security and Protection of Private Information in the Computer Age
Author: \ By Marcus John Senior
Library: Library of Islamic Parliament (Tehran)
Subject:

413. The art of war for computer security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ;

414. The art of war for computer security /
Author: Tom Madsen.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Sunzi,active 6th century B.C., Sunzi bing fa.,Sunzi bing fa (Sunzi),Computer security.,Computer security.
Classification :
QA76
.
9
.
A25


415. The international handbook of computer security
Author: / Jae K. Shim, Anique A. Qureshi, Joel G. Siegel
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security Handbooks, manuals, etc,Data protection Handbooks, manuals, etc,Computer networks- Security measures Handbooks, manuals, etc
Classification :
QA76
.
9
.
A25
,
S468
2000


416. The international handbook of computer security
Author: Shim, Jae K.
Library: Central Library and Documentation Center (Semnan)
Subject: Handbooks, manuals, etc ، Computer security,Handbooks, manuals, etc ، Data protection,Handbooks, manuals, etc ، Computer networks - Security measures
Classification :
QA
76
.
9
.
A25
S468
2000


417. The international handbook of computer security
Author: Jae K. Shim, Anique A. Qureshi, Joel G. Siegel
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Handbooks, manuals, etc ، Computer security,Handbooks, manuals, etc ، Data protection,Handbooks, manuals, etc ، Computer networks -- Security measures
Classification :
QA
76
.
9
.
A25S46


418. Trojans, worms, and spyware. a computer security professional's guide to malicious code
پدیدآورنده : Michael Erbschloe
موضوع : Computer security,Computer viruses,Spyware (computer software)
۲ نسخه از این کتاب در ۲ کتابخانه موجود است.
419. Tutorial computer and network security
Author: Abrams, Marshall D.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Access control ، Computers,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
A27
1987


420. Tutorial computer and network security
Author: Abrams, Marshall D.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Computer security,، Computer networks- Security measures
Classification :
QA
76
.
9
.
A25
A27

