161. Principles of information security /
Author: Michael E. Whitman, Herbert J. Mattord
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security
Classification :
TK5105
.
59
.
W54
2012


162. Principles of information security /
Author: Michael E. Whitman, Ph. D., CISM, CISSP, Herbert J. Mattord, Ph. D., CISM, CISSP, Kennesaw State University.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer security.
Classification :
TK5105
.
59
.
W54
2018


163. Protocols for authentication and key establishment
Author: by Colin Boyd, Anish Mathuria.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols.,Computer networks -- Security measures.,Data encryption (Computer science)
Classification :
TK5105
.
59
B936
2011


164. Public key infrastructures, services and applications
Author: Fabio Martinelli, Bart Preneel (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Data encryption (Computer science), Congresses,Public key cryptography, Congresses,Public key infrastructure (Computer security), Congresses

165. RSA Security's official guide to cryptography
Author: / Steve Burnett and Stephen Paine
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Data encryption (Computer science),Cryptography
Classification :
E-BOOK

166. SSL & TLS essentials :
Author: / Stephen A. Thomas
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,World Wide Web , Security measures,Computer network protocols
Classification :
E-BOOK

167. Security and cryptography for networks
Author: / Roberto De Prisco, Moti Yung (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Congresses,Cryptography--Congresses
Classification :
TK
,
5105
.
59
,.
S385
,
2006
QA
,
75
,.
L4
,
vol
.,
4116


168. Security and cryptography for networks
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Congresses. ; Computer security ; Congresses. ; Cryptography ; Congresses. ;

169. Security and cryptography for networks : 6th international conference, SCN 2008, Amalfi, Italy, September 10-12, 2008 : proceedings
Author: Rafail Ostrovsky, Roberto De Prisco, Ivan Visconti )eds.(
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Congresses ، Computer networks - Security measures,Congresses ، Computer security,Congresses ، Cryptography
Classification :
TK
5105
.
59
.
S385


170. Security and privacy in communication networks :
Author: Raheem Beyah, Bing Chang, Yingjiu Li, Sencun Zhu (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25


171. Security and trust management :
Author: Sokratis K. Katsikas, Cristina Alcaraz (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer programming-- software development.,Computer security.,Computer security.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Computers-- Programming-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Information retrieval.,Information technology: general issues.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25
S76
2018


172. Security aspects in information technology :
Author: Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Information technology-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
I58
2011


173. Security+ guide to network security fundamentals /
Author: Mark Ciampa.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides.
Classification :
TK
5105
.
59
.
C52
2012


174. Security in communication networks : 4th International Conference, SCN 2004, Amalfi, Italy, September 8-10, 2004 : revised selected papers
Author: Carlo Blundo, Stelvio Cimato )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer networks -- Security measures,Congresses ، Computer security,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
3352


175. Security in communication networks :third international conference, SCN 2002, Amalfi, Italy, September 2002 : revised papers
Author: Stelvio Cimato, Clemente Galdi, Giuseppe Persiano )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer networks -- Security measures,Congresses ، Computer security,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
2576


176. Security in computing and communications :
Author: Sabu M. Thampi, Sanjay Madria, Guojun Wang, Danda B. Rawat, Jose M. Alcaraz Calero (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25


177. Security, privacy and trust in cloud systems /
Author: Surya Nepal, Mukaddim Pathan, editors
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures,Computer networks-- Security measures,Computer security
Classification :
QA76
.
585


178. Security, privacy and trust in the IoT environment /
Author: editor, Zaigham Mahmood.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Internet of things-- Security measures.,Computer security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Online Safety & Privacy.
Classification :
QA76
.
9
.
A25


179. Security solutions and applied cryptography in smart grid communications
Author: / Ferrag Ahmed
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Smart power grids--Security measures,Data encryption (Computer science),Computer networks--Security measures
Classification :
TK3105
.
S334
2017


180. The CEH prep guide :
Author: Ronald L. Krutz, Russell Dean Vines.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Testing-- Examinations, Study guides.,Hackers.,Computer networks-- Examinations.,Computer networks-- Security measures-- Examinations.,Hackers.
Classification :
QA76
.
9
.
A25
K79
2007eb

