121. Practical intranet security :
Author: by Paul Ashley, Mark Vandenwauver.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures.,Intranets (Computer networks) -- Security measures.

122. Practical intranet security :
Author: by Paul Ashley, Mark Vandenwauver.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures.,Intranets (Computer networks) -- Security measures.
Classification :
TK5105
.
59
B973
1999


123. QoS over heterogeneous networks /
Author: Mario Marchese.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Quality control.,Heterogeneous computing.,Computer networks-- Quality control.,COMPUTERS-- Data Transmission Systems-- General.,COMPUTERS-- Networking-- Vendor Specific.,Heterogeneous computing.
Classification :
TK5105
.
5956
.
M37
2007eb


124. Quality of service in heterogeneous networks :
Author: Novella Bartolini ... [et al.] (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Computer system performance.

125. Quantitative assessments of distributed systems :
Author: edited by Dario Bruneo and Salvatore Distefano
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer systems-- Evaluation-- Mathematics,Electronic data processing-- Distributed processing-- Mathematical models.,Quantitative research.,System analysis-- Mathematics.
Classification :
QA76
.
9
.
E94


126. Queueing Networks
Author: edited by Richard J. Boucherie, Nico M. Dijk.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network architectures.,Computer networks.,Distribution (Probability theory),Mathematics.,Operations research.

127. Real-time security extensions for EPCglobal networkscase study for the pharmaceutical industry
Author: / Matthieu-P. Schapranow
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer networks -- Security measures,Computer network architectures,Business logistics -- Data processing
Classification :
TK5105
.
59
.
S33
2014


128. Recent developments in decision support systems
Author: edited by Clyde W. Holsapple, University of Kentucky, Business and Economic Bldg., Room 317, Lexington, KY 40506-0034, USA, Andrew B. Whinston, Department of Management Science and Information Systems, CBA 5.202, Graduate School of Business, University of Texas at Austin, Austin, TX 78712-1175, USA.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Decision support systems -- Congresses.,Decision support systems.,Management -- Data processing -- Congresses.

129. Role engineering for enterprise security managemen
Author: / Edward J. Coyne, John M. Davis
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Information resources management.,Computer networks--Access control,Computer network architectures.,Management information systems.
Classification :
T
,
58
.
64
,.
C69
,
2008eb


130. Role engineering for enterprise security management /
Author: Edward J. Coyne, John M. Davis
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network architectures,Computer networks-- Access control,Information resources management,Management information systems
Classification :
T58
.
64
.
C69
2008


131. Role engineering for enterprise security management
Author: Coyne, Edward J.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Information resources management,Access control ، Computer networks,، Computer network architectures,، Management information systems
Classification :
T
58
.
64
.
C69
2008


132. Role engineering for enterprise security management
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Information resources management. ; Computer networks ; Access control. ; Computer network architectures. ; Management information systems. ;

133. SDN and NFV
Author: Brij B Gupta, Amrita Dahiya, Elhadj Benkhelifa.,Gupta, Brij,
Library: Library of College of Science University of Tehran (Tehran)
Subject: Software-defined networking (Computer network technology),Computer network architectures.,Virtual computer systems.,Cloud computing.

134. SOA and WS-BPE
Author: / Yuli Vasiliev
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Business enterprises--Computer networks--Management,Information technology--Management,Computer network architectures.,Web services.
Classification :
HD
,
30
.
37
,.
V37
,
2007eb


135. SOA approach to integration
Author: Matjaz B. Juric ... [et al.]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Management,Computer network architectures,Information technology-- Management,Web services,XML (Document markup language)
Classification :
HD30
.
37
.
S53
2007


136. Secrets of SOA
Author: / foreword by Eric Knorr and Steve Fox
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Business enterprises -- Computer networks -- Management,Information technology -- Management,Computer network architectures
Classification :
HD
30
.
37
.
S38
2006


137. Security, Privacy, and Anonymity in Computation, Communication, and Storage :
Author: edited by Guojun Wang, Jun Feng, Md Zakirul Alam Bhuiyan, Rongxing Lu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence.,Computer network architectures.,Computer science.,Data protection.,Information systems.,Artificial intelligence.,Computer network architectures.,Computer science.,Data protection.
Classification :
QA76
.
9
.
A25


138. Security, privacy, and anonymity in computation, communication, and storage :
Author: Guojun Wang, Jinjun Chen, Laurence T. Yang (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Computer security.,Data protection.
Classification :
QA76
.
9
.
A25


139. Security, privacy and trust in the IoT environment /
Author: editor, Zaigham Mahmood.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Internet of things-- Security measures.,Computer security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Online Safety & Privacy.
Classification :
QA76
.
9
.
A25


140. Server-side GPS and assisted-GPS in Java /
Author: Neil Harper.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Global Positioning System-- Computer networks.,Java (Computer program language),Java (Computer program language),TECHNOLOGY & ENGINEERING-- Remote Sensing & Geographic Information Systems.
Classification :
G109
.
5
.
H376
2010eb

