121. Implementing SSL/TLS using cryptography and PKI /
Author: Joshua Davies.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Data encryption (Computer science)
Classification :
TK5105
.
59
.
D39
2011


122. Information and communications security :
Author: Sihan Qing [and others] (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011


123. Information assurance architecture /
Author: Keith D. WIllett.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Communication systems-- Management.,Computer networks-- Security measures.,Computer security.,Data protection.,Information resources management.,Information technology-- Management.,Business enterprises-- Communication systems-- Management.,Computer networks-- Security measures.,Computer security.,Data protection.,Information resources management.,Information technology-- Management.
Classification :
QA76
.
9
.
A25
W5487
2008


124. Information security: a practical approach
Author: Bhaskar, S. M.
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: ، Computer security,Security measures ، Computer networks,، Public key cryptography
Classification :
QA
76
.
9
.
A25
B473
2008


125. Information security and privacy :
Author: Julian Jang-Jaccard, Fuchun Guo (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computers-- Access control, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
A279
2019eb


126. Information to Cryptography : Principles and Applications
Author: Delfs, Hans
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer Security◄Cryptography◄Computer networks-Security measures
Classification :
D
351
i

127. Innovative security solutions for information technology and communications :
Author: Jean-Louis Lanet, Cristian Toma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Information technology-- Security measures, Congresses.,Computer networks-- Security measures.,Computer security.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25


128. Internet and intranet security management
Author: / Lech Janczewski
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Internet- Security measures,Intranets (Computer networks)- Security measures,Computers- Access control,Cryptography
Classification :
TK5105
.
875
.
I57
,
J358
2000


129. Internet and intranet security management
Author: / Lech Janczewski
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Internet- Security measures,Intranets (Computer networks)- Security measures,Computers- Access control,Cryptography
Classification :
E-BOOK

130. Internet security :
Author: Tim Speed, Juanita Ellis.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Internet-- Security measures.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Internet-- Security measures.
Classification :
TK5105
.
59
.
S64
2003eb


131. Introduction to certificateless cryptography /
Author: Hu Xiong, Zhen Qin, Athanasios V. Vasilakos
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Data encryption (Computer science),Identification,Public key cryptography,Public key infrastructure (Computer security)
Classification :
QA76
.
9
.
A25
X75
2017


132. Introduction to computer and network security :
Author: Richard R. Brooks, Clemson University, South Carolina, USA
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Data encryption (Computer science),Data protection
Classification :
QA76
.
9
.
A25
B7745
2014


133. Introduction to cryptography
Author: / Hans Delfs, Helmut Knebl,Delfs
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computer security,Crytography,Computer networks -- Secrity measures
Classification :
QA
76
.
9
.
A25D447


134. Introduction to cryptography
پدیدآورنده : Hans Delfs, Helmut Knebl
موضوع : Computer security,Cryptography,Computer networks -- Security measures
۲ نسخه از این کتاب در ۱ کتابخانه موجود است.
135. Introduction to cryptography
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Cryptography. ; Computer networks ; Security measures. ;

136. Introduction to cryptography
Author: Hans Delfs, Helmut Knebl.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Cryptography.
Classification :
QA76
.
9
.
A25
D447
2007eb


137. Introduction to cryptography
Author: / Hans Delfs, Helmut Knebl
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security,Cryptography,Computer networks -- Security measures
Classification :
QA
76
.
9
.
A25
D5
2007


138. Introduction to cryptography
Author: / Hans Delfs, Helmut Knebl
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Cryptography.,Computer networks--Security measures
Classification :
QA
,
76
.
9
,.
A25
,
D447
,
2007


139. Introduction to cryptography and network security
Author: Forouzan, Behrouz A.
Library: Central library and information center (Khorasan Razavi)
Subject: Security measures ، Computer networks,، Cryptography
Classification :
TK
5105
.
59
.
F672
2008


140. Introduction to cryptography and network security
Author: Behrouz A. Forouzan
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Computer networks, Security measures,Cryptography
Classification :
TK
,
5105
.
59
,.
F672
,
2008

