341. Security for cloud storage systems /
Author: Kan Yang, Xiaohua Jia.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures.,Computer networks-- Security measures.
Classification :
TK5105
.
59


342. Security for cloud storage systems
Author: / Kan Yang
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Cloud computing -- Security measures,Computer networks -- Security measures,COMPUTERS -- Internet / Security
Classification :
TK

343. Security in computing and communications :
Author: Sabu M. Thampi, Sanjay Madria, Guojun Wang, Danda B. Rawat, Jose M. Alcaraz Calero (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25


344. Security, privacy, and anonymity in computation, communication, and storage :
Author: Guojun Wang, Jinjun Chen, Laurence T. Yang (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Computer security.,Data protection.
Classification :
QA76
.
9
.
A25


345. Security, privacy and trust in cloud systems /
Author: Surya Nepal, Mukaddim Pathan, editors
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures,Computer networks-- Security measures,Computer security
Classification :
QA76
.
585


346. Security technology, disaster recovery and business continuit
Author: / Tai-hoon Kim ... [et al.], (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Computer networks--Security measures--Congresses,Computer networks--Access control--Congresses,Data protection--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
S374
,
2010


347. Security technology, disaster recovery and business continuity
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ; Computer networks ; Security measures ; Congresses. ; Computer networks ; Access control ; Congresses. ; Data protection ; Congresses. ;

348. Solving Cyber Risk :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,BUSINESS & ECONOMICS-- Insurance-- Risk Assessment & Management.,Computer security.,Data protection.
Classification :
QA76
.
9
.
A25
C577
2018


349. Stabilization, safety, and security of distributed systems :
Author: Xavier Défago, Franck Petit, Vincent Villainches
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Electronic data processing-- Distributed processing-- Safety measures, Congresses,Self-stabilization (Computer science), Congresses
Classification :
QA76
.
9
.
S54
S67
2011


350. Statistical techniques for network security :
Author: Yun Wang.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
TK5105
.
59
.
W36
2009eb


351. The Executive guide to information security: threats, challenges, and solutions
Author: Mark Egan with Tim Mather
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection
Classification :
HF
،
5548
.
32
،.
E325
،
2005


352. The Practice of Network Security Monitoring :
Author: by Richard Bejtlich.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Electronic countermeasures.
Classification :
TK
5105
.
59
.
B436
2013


353. The business case for network security
Author: / Catherine Paquet, Warren Saxe
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management
Classification :
TK5105
.
59
.
P37
2005


354. The business case for network security
Author: / Catherine Paquet, Warren Saxe
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management
Classification :
TK5105
.
59
.
P37
2005


355. The international handbook of computer security
Author: / Jae K. Shim, Anique A. Qureshi, Joel G. Siegel
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security Handbooks, manuals, etc,Data protection Handbooks, manuals, etc,Computer networks- Security measures Handbooks, manuals, etc
Classification :
QA76
.
9
.
A25
,
S468
2000


356. The international handbook of computer security
Author: Shim, Jae K.
Library: Central Library and Documentation Center (Semnan)
Subject: Handbooks, manuals, etc ، Computer security,Handbooks, manuals, etc ، Data protection,Handbooks, manuals, etc ، Computer networks - Security measures
Classification :
QA
76
.
9
.
A25
S468
2000


357. The international handbook of computer security
Author: Jae K. Shim, Anique A. Qureshi, Joel G. Siegel
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Handbooks, manuals, etc ، Computer security,Handbooks, manuals, etc ، Data protection,Handbooks, manuals, etc ، Computer networks -- Security measures
Classification :
QA
76
.
9
.
A25S46


358. The official (ISC)² CISSP CBK reference /
Author: John Warsinkse ; with Mark Graff, Kevin Henry, Christopher Hoover, Ben Malisow, Sean Murphy, C. Paul Oakes, George Pajari, Jeff T. Parker, David Seidl, Mike Vasquez.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Administrative agencies-- Information resources management-- Security measures-- United States-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations, Study guides.,Computers-- Access control-- Examinations, Study guides.,Telecommunications engineers-- Certification-- United States.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer networks-- Security measures-- Examinations.,Telecommunications engineers-- Certification.,United States., 7
Classification :
TK5105
.
59


359. Topics in Cryptology – CT-RSA 2016
Author: \ Kazue Sako (Ed.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Data protection -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها ,حفاظت اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
QA
76
.
9
.
T6
2016
E-Book
,


360. Toward a safer and more secure cyberspace /
Author: Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Cyberterrorism-- Prevention.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Cyberterrorism-- Prevention.
Classification :
QA76
.
9
.
A25
T695
2007eb

