141. Computer network security : Third International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2005, St. Petersburg, Russia, September 25-27, 2005 : proceedings
Author: Vladimir Gorodetsky, Igor Kotenko, Victor Skormin )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computer networks -- Security measures
Classification :
QA
76
.
L28
Vol
.
3685


142. Computer network security : second International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2003, St. Petersburg, Russia, September 21-23, 2003 : proceedings
Author: Vladimir Gorodetsky, Leonard Popyack, Victor Skormin )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computer networks -- Security measures
Classification :
QA
76
.
L28
Vol
.
2776


143. Computer security :
Author: Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25


144. Computer security - ESORICS 2012
Author: Sara Foresti, Moti Yung, Fabio Martinelli (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
E98
2012eb


145. Conflict transformation and peacebuilding :
Author: edited by Bruce W. Dayt
Library: Library of Islamic Parliament (Tehran)
Subject:

146. Contemporary computing :
Author: Sanjay Ranka [and others] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science, Congresses.,Soft computing, Congresses.,Computer science.,Computer science.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Informatique.,Soft computing.,Soft computing.
Classification :
QA75
.
5
.
I584
2009


147. Critical Infrastructure Protection XIII :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Congresses. ;

148. Critical approaches to international security /
Author: K. M.
Library: Library of Islamic Parliament (Tehran)
Subject:

149. Critical information infrastructure security :
Author: Sandro Bologna, Bernhard Hämmerli, Dimitris Gritzalis, Stephen Wolthusen (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
C75
2011


150. Critical information infrastructures security :
Author: Eric Luiijf, Inga Žutautaitė, Bernhard M. Hämmerli (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
C75
2018eb


151. Critical information infrastructures security :
Author: Christos Xenakis, Stephen Wolthusen (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
C75
2010


152. Critical infrastructure protectio
Author: / E. Goetz and S. Shenoi, editors
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Congresses,Computer security--Congresses,Information networks--Security measures--Congresses
Classification :
TK
,
5105
.
59
,.
C75
,
2008eb


153. Critical infrastructure protection
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Congresses. ; Computer security ; Congresses. ; Information networks ; Security measures ; Congresses. ;

154. Critical infrastructure protection
Author: E. Goetz and S. Shenoi, editors
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Congresses ، Computer networks - Security measures,Congresses ، Computer security,Congresses ، Information networks - Security measures
Classification :
TK
5105
.
59
.
C748
2008


155. Critical infrastructure protection
Author: E. Goetz and S. Shenoi, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Information networks-- Security measures, Congresses.

156. Critical infrastructure protection I
Author: / Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, DC, USA, March 15 - 17, 2010. Tyler Moore
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures, Congresses,Computer security, Congresses,Information networks, Security measures, Congresses,Cyberinfrastructure, Security measures, Congresses,Electronic books., local

157. Critical infrastructure protection II
Author: edited by Mauricio Papa, Sujeet Shenoi
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Information networks-- Security measures, Congresses
Classification :
TK5105
.
59
.
C75
2008eb


158. Critical infrastructure protection III
Author: Charles Palmer, Sujeet Shenoi (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Information networks-- Security measures, Congresses
Classification :
TK5105
.
59
.
C75
2009eb


159. Critical infrastructure protection V :
Author: Jonathan Butts, Sujeet Shenoi (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Cyberinfrastructure-- Security measures, Congresses.
Classification :
TK5105
.
59
.
I35
2011


160. Critical infrastructure protection XII :
Author: Jason Staggs, Sujeet Shenoi (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer networks-- Security measures.
Classification :
QA76
.
9
.
A25

