201. Proceedings of International Ethical Hacking Conference 2018 :
Author: Mohuya Chakraborty, Satyajit Chakrabarti, Valentina Emilia Balas, J.K. Mandal, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Penetration testing (Computer security), Congresses.,Communications Engineering, Networks.,Data Structures, Cryptology and Information Theory.,Systems and Data Security.,Algorithms & data structures.,Communications engineering / telecommunications.,Computer security.,COMPUTERS / Security / General.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25


202. Proceedings of the International Conference on ISMAC in Computational Vision and Bio-Engineering 2018 (ISMAC-CVB) /
Author: Durai Pandian, Xavier Fernando, Zubari Baig, Fuqian Shi, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Bioengineering, Congresses.,Computer vision, Congresses.,Bioengineering.,Computer vision.
Classification :
TA1634


203. Proceedings of the Sixth European Conference on Computer Supported Cooperative Work :
Author: ed. by Susanne Bødker ...
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Supported Cooperative Work,Microcomputers,Teams in the workplace -- Computer networks -- Congresses

204. Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012). Volume 5
Author: Yuhang Yang, Maode Ma, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Congresses.,TECHNOLOGY & ENGINEERING -- Telecommunications.,Telecommunication systems -- Congresses.

205. Proceedings of the sixth International Conference on Green and Human Information Technology :
Author: Seong Oun Hwang, Syh Yuan Tan, Franklin Bien, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Information technology, Congresses.,Sustainable engineering, Congresses.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Information technology.,Sustainable engineering.
Classification :
T58
.
5


206. Provable security :
Author: Joonsang Baek, Willy Susilo, Jongkil Kim (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer Systems Organization and Communication Networks.,Computing Milieux.,Cryptology.,Data Structures and Information Theory.,Software Engineering/Programming and Operating Systems.,Algorithms & data structures.,Computer networking & communications.,Computer security.,Computers-- Hardware-- General.,Computers-- Information Theory.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Data protection.,Information technology: general issues.,Software Engineering.
Classification :
QA76
.
9
.
A25


207. Quality, reliability, security and robustness in heterogeneous systems :
Author: Trung Q. Duong, Nguyen-Son Vo, Van Ca Phan (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Quality control, Congresses.,Computer networks-- Reliability, Congresses.,Computer networks-- Security measures, Congresses.,Heterogeneous computing, Congresses.,Computer networks-- Quality control.,Computer networks-- Reliability.,Computer networks-- Security measures.,Heterogeneous computing.
Classification :
TK5105
.
5


208. Quality, reliability, security and robustness in heterogeneous systems :
Author: Lei Wang, Tie Qiu, Wenbing Zhao (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Quality control, Congresses.,Computer networks-- Reliability, Congresses.,Computer networks-- Security measures, Congresses.,Heterogeneous computing, Congresses.,Algorithms & data structures.,Artificial intelligence.,Business applications.,Computer networking & communications.,Computer networks-- Quality control.,Computer networks-- Reliability.,Computer networks-- Security measures.,Computers-- Electronic Commerce.,Computers-- Hardware-- Network Hardware.,Computers-- Information Theory.,Computers-- Intelligence (AI) & Semantics.,Computers-- Online Services-- General.,Heterogeneous computing.,Network hardware.
Classification :
TK5105
.
5


209. Recent developments and the new direction in soft-computing foundations and applications :
Author: edited by Lotfi A. Zadeh, Ronald R. Yager, Shahnaz N. Shahbazova, Marek Z. Reformat, Vladik Kreinovich.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Soft computing, Congresses.,Artificial intelligence.,Automatic control engineering.,Computers-- Intelligence (AI) & Semantics.,Engineering: general.,Game theory.,Mathematics-- Game Theory.,Soft computing.,Technology & Engineering-- Automation.,Technology & Engineering-- General.
Classification :
Q342


210. Recent findings in intelligent computing techniques :
Author: Pankaj Kumar Sa, Sambit Bakshi, Ioannis K. Hatzilygeroudis, Manmath Narayan Sahoo, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence, Congresses.,Computer networks, Congresses.,Artificial intelligence.,Computer networks.
Classification :
TK5105
.
5


211. Recent trends in computer applications :
Author: editors, Jihad Mohamad Alja'am, Abdulmotaleb El Saddik and Abdul Hamid Sadk.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Application software, Congresses.,Computer science, Congresses.,Information technology, Congresses.,Application software.,Artificial intelligence.,Computer science.,Computer security.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Data mining.,Information retrieval.,Information technology.,Information technology: general issues.,Teaching skills & techniques.
Classification :
QA75
.
5


212. Research in attacks, intrusions, and defenses :
Author: edited by Michael Bailey, Thorsten Holz, Manolis Stamatogiannakis, Sotiris Ioannidis.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Intrusion detection systems (Computer security), Congresses.,Computer Communication Networks.,Computers and Society.,Information Systems Applications (incl. Internet).,Legal Aspects of Computing.,Operating Systems.,Systems and Data Security.,Computer security.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Computers-- Operating Systems-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Ethical & social aspects of IT.,Information retrieval.,Intrusion detection systems (Computer security),Law-- Science & Technology.,Legal aspects of IT.,Network hardware.,Operating systems.
Classification :
QA76
.
76
.
A65


213. Risks and Security of Internet and Systems :
Author: edited by Nora Cuppens, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquin Garcia-Alfaro.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Internet-- Security measures, Congresses.,Artificial intelligence.,Artificial intelligence.,Coding theory & cryptology.,Computer science.,Computers-- Expert Systems.,Computers-- Information Technology.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Computers, Special purpose.,Computers.,Data encryption (Computer science),Expert systems-- knowledge-based systems.,Information retrieval.,Information technology: general issues.,Software engineering.,Software Engineering.
Classification :
QA76
.
758
I58
2017


214. Risks and security of internet and systems :
Author: Akka Zemmari, Mohamed Mosbah, Nora Cuppens-Boulahia, Frédéric Cuppens (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Internet-- Security measures, Congresses.,Computer networks-- Security measures.,Computer security.,Internet-- Security measures.
Classification :
TK5105
.
59


215. Rough sets :
Author: Tamás Mihálydeák, Fan Min, Guoyin Wang, Mohua Banerjee, Ivo Düntsch, Zbigniew Suraj, Davide Ciucci (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Rough sets, Congresses.,Rough sets.
Classification :
QA248


216. Scalable information systems
Author: Peter Mueller, Jian-Nong Cao, Cho-Li Wang (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Scalability, Congresses,Peer-to-peer architecture (Computer networks), Congresses
Classification :
TK5105
.
59
.
I584
2009eb


218. Security and privacy in communication networks :
Author: Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25


219. Security and privacy in communication networks
Author: Angelos D. Keromytis, Roberto Di Pietro (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Telecommunication systems-- Security measures, Congresses
Classification :
TK5102
.
85
.
S43
2012


220. Security and privacy in communication networks :
Author: Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Telecommunication systems-- Security measures, Congresses.,Coding theory & cryptology.,Computer networks-- Security measures.,Computer security.,Computers-- Hardware-- Network Hardware.,Computers-- Security-- General.,Network hardware.,Telecommunication systems-- Security measures.
Classification :
TK5102
.
85
.
S43
2017eb

