41. Analog Circuit Design
Author: edited by Rudy J. Plassche, Willy M. C. Sansen, Johan H. Huijsing.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer engineering.,Engineering.

42. Application security in the ISO 27001 environment
Author: Vinod, Vasudevan
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,Reliability ، Computer software,Computer networks Security measures Standards ، Business enterprises,Management Standards ، Computer security
Classification :
QA
76
.
64
.
V56
2008


43. Applications and Science in Soft Computing
Author: edited by Ahamad Lotfi, Jonathan M. Garibaldi.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Decision making.,Operations research.

44. Applied Cyber Security and the Smart Grid
Author: \ Eric D. Knapp, Raj Samani, Joel Langill, technical editor.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Smart power grids -- Security measures,Computer networks -- Security measures,شبکههای هوشمند توزیع برق -- تدابیر ایمنی,شبکههای کامپیوتری -- تدابیر ایمنی
Classification :
TK3105
.
K63P6
2013


45. Applied Probability-Computer Science:
Author: edited by Ralph L. Disney, Teunis J. Ott.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Electronic data processing -- Congresses.,Science (General),Science.

46. Artificial Intelligence and Security :
Author: edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence, Congresses.,Cloud computing-- Security measures, Congresses.,Artificial intelligence.
Classification :
QA76
.
9
.
A25
I23
2019


47. Assessment of non-point source pollution in the vadose zone /
Author: Dennis L. Corwin, Keith Loague, Timothy R. Ellsworth, editors
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Groundwater-- Pollution-- Computer simulation,Nonpoint source pollution-- Computer simulation,Zone of aeration-- Computer simulation

49. Boolean models and methods in mathematics, computer science, and engineering /
Author: edited by Yves Crama, Peter L. Hammer
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Algebra, Boolean,Probabilities
Classification :
QA10
.
3
.
B658
2010


50. Broadband communications, networks, and systems :
Author: Victor Sucasas, Georgios Mantas, Saud Althunibat (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Broadband communication systems, Congresses.,Broadband communication systems.
Classification :
TK5103
.
4


51. Building a monitoring infrastructure with Nagios
Author: David Josephsen
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Computer systems- Evaluation,Computer systems- Reliability,Computer networks- Monitoring
Classification :
QA
,
76
.
9
,.
E94J69
,
2007


52. Building a monitoring infrastructure with Nagios
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer systems ; Evaluation ; Computer systems ; Reliability ; Computer networks ; Monitoring ;

53. Building a monitoring infrastructure with Nagios
Author: / David Josephsen
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Nagios.,Computer networks--Monitoring--Computer programs,Computer networks--Management--Automation,Computer systems--Evaluation,Computer systems--Reliability
Classification :
QA
,
76
.
9
,.
E94
,
J69
,
2007


54. Building a monitoring infrastructure with Nagios
Author: David Josephsen
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Monitoring,Computer systems-- Evaluation,Computer systems-- Reliability
Classification :
QA76
.
9
.
E94
J69
2007


55. Business data communications
Author: Manish Agrawal
Library: Library and Information Center of Ayatollah Imani of Salman Farsi University (Fars)
Subject: Business enterprises, Computer networks,Computer networks,Data transmission systems,Information technology, Management
Classification :
HF
5548
,.
2
.
A35B8
2011


56. Business data networks and security /
Author: Raymond R. Panko, University of Hawai'i at Mānoa, Julia L. Panko, Weber State University.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer networks-- Management.,Computer networks-- Security measures.,Computer security.,Business enterprises-- Computer networks-- Security measures.,Computer networks-- Management.,Computer networks-- Security measures.,Computer security.,Computersicherheit,Datensicherung,Rechnernetz
Classification :
HD30
.
37
.
P36
2019


57. CAD/CAM Robotics and Factories of the Future '90 :
Author: edited by Suren N. Dwivedi, Alok K. Verma, John E. Sneckenberger.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Engineering economy.,Engineering.

58. Catalogue of Distributed File/Operating Systems
Author: by Uwe M. Borghoff.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer communication networks.,Computer science.,Computer system performance.
Classification :
QA76
.
76
.
O63
B989
1992


59. Chip-on-Reliability, Availability and Serviceability of Networks
Author: / rika Cota, Alexandre Morais Amory, Marcelo Soares Lubaszewski
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: ELECTRONIC|ENGINEERING, MULTIDISCIPLINARY&COMPUTER SCIENCE, INFORMATION TECHNOLOGY|ENGINEERING, ELECTRICAL
Classification :
E-BOOK
