141. Introduction to cryptography and network security
Author: / Behrouz A. Forouzan
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks, Security measures,Cryptography
Classification :
TK5105
.
59
.
F672
2008


142. Introduction to cryptography and network security
Author: Forouzan, Behrouz A
Library: Central Library and Documentation Center (Kerman)
Subject: ، Computer networks - Security measures,، Cryptography
Classification :
TK
5105
.
59
.
F67
2008


143. Introduction to cryptography: principles and applications
Author: Delfs, Hans
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer security,، Cryptography,، Computer networks-- Security measures
Classification :
QA
76
.
9
.
A25
.
D447
2007


144. Introduction to cryptography : principles and applications
Author: Delfs, Hans
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer security ► Cryptography ► Computer networks - Security measures
Classification :
D351i

145. Introduction to network security
Author: Neal Krawetz.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols -- Textbooks.,Computer networks -- Security measures -- Textbooks.,COMPUTERS -- Internet -- Security.
Classification :
TK5105
.
59
N435
9999


146. Intrusion detection and correlation :
Author: by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Electronic countermeasures.,Intrusion detection systems (Computer security),Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Electronic countermeasures.,Electronic countermeasures.,Informatique.,Intrusion detection systems (Computer security)
Classification :
TK5105
.
59
.
K78
2005eb


147. Management of information security /
Author: Michael E. Whitman, Herbert J. Mattord.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Management.,Computer security-- Management.,Computer security.,Information technology-- Security measures.,Computer security-- Management.,Computer security.,Computersicherheit,Information technology-- Security measures.,Kryptologie,Risikomanagement
Classification :
TK5105
.
59
.
W45
2019


148. Managing Cisco network security /
Author: Eric Knipp [and others] ; Edgar Danielyan, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cisco Systems, Inc.,Cisco Systems, Inc.,Computer networks-- Management.,Computer networks-- Security measures.,Computer networks-- Management.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
TK5105
.
59
.
M36
2002eb


149. Modelling and verification of secure exams /
Author: Rosario Giustolisi.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25


150. Modern Cryptography
Author: \ Chuck Easttom
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science),Information networks -- Security measures -- Mathematics.,رمزگذاری دادهها,شبکههای اطلاعرسانی -- تدابیر ایمنی -- ریاضیات
Classification :
E-Book
,

151. Modern cryptography :
Author: Chuck Easttom
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Mathematics,Computer security-- Mathematics,Data encryption (Computer science),Information networks-- Security measures-- Mathematics
Classification :
TK5102
.
94


152. Network and system security /
Author: edited by John R. Vacca
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security
Classification :
TK5105
.
59
.
N48
2014


153. Network security essentials :
Author: William Stallings.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer security.
Classification :
TK5105
.
59
.
S725
2011


154. Next generation SSH2 implementation :
Author: Dale Liu, lead author and technical editor ; Max Caceres [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: UNIX Shells.,UNIX Shells.,UNIX Shells.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
L585
2009eb


155. PKI :
Author: Andrew Nash [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Public key cryptography.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,Computers-- Access control.,Computers-- Access control.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Public key cryptography.,Public key cryptography.,Public-Key-Infrastruktur
Classification :
QA76
.
9
.
A25
P59
2001eb


156. Practical cryptography for data internetworks
Author: Stallings, William.
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer networks - Security measures , Data encryption )Computer science( , Coding theory , Computer security
Classification :
TK
5105
.
59
.
S73
1996


157. Practical embedded security :
Author: by Timothy Stapko.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Embedded computer systems.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Hardware-- Handheld Devices.,COMPUTERS-- Hardware-- Personal Computers-- General.,COMPUTERS-- Microprocessors.,Embedded computer systems.
Classification :
TK7895
.
E42
S735
2008eb


158. Practical intranet security :
Author: by Paul Ashley, Mark Vandenwauver.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures.,Intranets (Computer networks) -- Security measures.

159. Practical intranet security :
Author: by Paul Ashley, Mark Vandenwauver.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures.,Intranets (Computer networks) -- Security measures.
Classification :
TK5105
.
59
B973
1999


160. Preventing ransomware :
Author: Abhijit Mohanta, Mounir Hahad, Kumaraguru Velmurugan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer crimes.,Computer networks-- Security measures.,Computer security.,Malware (Computer software),Coding theory & cryptology.,Computer crimes-- Prevention.,Computer crimes.,Computer networks-- Security measures.,Computer security.,Computer security.,Computer viruses, Trojans & worms.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Viruses & Malware.,Data encryption.,Malware (Computer software)
Classification :
QA76
.
9
.
A25
M64
2018

