• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۲ پاسخ غیر تکراری از ۲ پاسخ تکراری در مدت زمان ۰,۹۵ ثانیه یافت شد.

1. Graphical Models for Security.

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: \ Sjouke Mauw , Barbara Kordy, Sushil Jajodia (Eds.)

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Computer security -- Graphic methods -- Congresses.,Computer networks -- Security measures -- Congresses.,امنیت کامپیوتر -- گرافیک -- روش‌ها -- کنگره ها ,شبکه‌های کامپیوتری -- تدابیر ایمنی -- کنگره‌ها

Classification :
QA
90
.
G7
2016
E-Book
,

2. Graphical models for security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: George Cybenko, David Pym, Barbara Fila (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses.,Computer security-- Graphic methods, Congresses.,Computer networks-- Security measures.

Classification :
QA76
.
9
.
A25
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival