481. Secure data networking
Author: Purser, Michael
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer networks-- Security measures,، Computer security,، Computer networks-- Management
Classification :
TK
5105
.
5
.
P87
1993


482. Secure group communications over data networks
Author: / Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Computer security,Computer network protocols,Electronic books. , local
Classification :
E-BOOK

483. Securing information and communications systems
Author: Steven M. Furnell ... [et al.]&, editors
Library: Central Library and Document Center of Shahid Madani University of Azarbayjan (East Azarbaijan)
Subject: Computer security,Computer networks- Security measures,Data encryption (Computer science)
Classification :
QA
,
76
.
9
,.
A25S375
,
2008


484. Securing information and communications systems :
Author: Steven M. Furnell [and others], editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Chiffrement (Informatique),Infrastructure à clé publique (Sécurité informatique),Réseaux d'ordinateurs-- Sécurité-- Mesures.,Sécurité informatique.,Systèmes informatiques-- Sécurité-- Mesures.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
S37563
2008eb


485. Securing information and communications systems
Author:
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer security,Computer networks--Security measures,Data encryption (Computer science)
Classification :
QA
76
.
9
.
A25
S375
2008


486. Security and Trust Management
Author: \ Sara Foresti (Ed.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,رمزگذاری دادهها -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
QA
76
.
9
.
S4
2015
E-Book
,


487. Security and authentication :perspectives, management and challenges
Author: Ong Thian Song, Tee Connie, and Mohd Shohel Sayeed
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,Security measures ، Computer networks,Data processing ، Identification
Classification :
QA
76
.
9
.
A25
S37
2018


488. Security and policy driven computing /
Author: Lei Liu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Automatic control.,Computer networks-- Management.,Computer networks-- Security measures.,Computer security.,Self-adaptive software.
Classification :
QA76
.
9
.
A25
L587
2011


489. Security and quality of service in ad hoc wireless networks
Author: Amitabh Mishra
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Security measures ، Ad hoc networks )Computer networks(,Quality control ، Ad hoc networks )Computer networks(,Management ، Ad hoc networks )Computer networks(
Classification :
TK
5105
.
77
.
M57S4


490. Security and trust management :
Author: Sara Foresti (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Algorithm Analysis and Problem Complexity.,Data Encryption.,Management of Computing and Information Systems.
Classification :
QA76
.
9
.
A25


491. Security and trust management :
Author: Rafael Accorsi, Silvio Ranise (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses
Classification :
QA76
.
9
.
A25
S76
2013


492. Security and trust management :
Author: Sokratis K. Katsikas, Cristina Alcaraz (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer programming-- software development.,Computer security.,Computer security.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Computers-- Programming-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Information retrieval.,Information technology: general issues.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25
S76
2018


493. Security and trust management
Author: Catherine Meadows, Carmen Fernandez-Gago (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
S86
2011eb


494. Security aspects in information technology :
Author: Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Information technology-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
I58
2011


495. Security automation with Ansible 2 :
Author: Madhu Akula, Akash Mahajan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Information technology-- Automation.,Information technology-- Management.,Computer networks-- Security measures.,Information technology-- Management.
Classification :
T58
.
5


496. Security careers :
Author: Stephen W. Walker, James E. Foushée.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Security measures.,Computer networks-- Security measures.,Fraud-- Prevention.,Security consultants.
Classification :
HD61
.
5
.
W35
2014


497. Security convergence :
Author: Dave Tyson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Security systems.,BUSINESS & ECONOMICS-- Corporate Governance.,BUSINESS & ECONOMICS-- Leadership.,BUSINESS & ECONOMICS-- Organizational Development.,BUSINESS & ECONOMICS-- Workplace Culture.,Business enterprises-- Computer networks-- Security measures.,Security systems.
Classification :
HD61
.
5
.
T97
2007eb


498. Security for multihop wireless networks /
Author: Shafiullah Khan and Jaime Lloret Mauri
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Ad hoc networks (Computer networks)-- Security measures,Wireless communication systems-- Security measures,Wireless Internet-- Security measures,Wireless sensor networks-- Security measures
Classification :
TK5103
.
2


499. Security for service oriented architectures
Author: / Walter Williams.
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Service-oriented architecture (Computer science),Computer networks -- Security measures,Computer security,COMPUTERS / Software Development & Engineering / General,COMPUTERS / Security / General,COMPUTERS / Internet / General,Computer security.,Service-oriented architecture.,Computer networks.,Internet.
Classification :
TK5105
.
5828


500. Security for telecommunications network management
Author: Rozenblit, Moshe,1944-
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Telecommunication- Security measures►Computer networks- Security measures
Classification :
5102
.
85
.
R69
