321. Frontier computing :
Author: editors, Jason C. Hung, Neil Y. Yen, Kuan-Ching Li.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science, Congresses.,Databases, Congresses.,Information technology, Congresses.,Computer science.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Databases.,Information technology.
Classification :
QA75
.
5


322. Frontier computing :
Author: Jason C. Hung, Neil Y. Yen, Kuan-Ching Li, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science, Congresses.,Databases, Congresses.,Information technology, Congresses.,Computer science.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Databases.,Information technology.
Classification :
QA75
.
5


323. Governance of picture archiving and communications systems
Author: / Carrison K.S. Tong, Eric T.T. Wong
Library: Central Library of Kashan University of Medical Sciences (Esfahan)
Subject: Radiographic Image Interpretation, Computer-Assisted- methods,Radiographic Image Interpretation, Computer-Assisted- instrumentation,Image Processing, Computer-Assisted- methods,Computer Security- standards

324. Governance of picture archiving and communications systems :
Author: Carrison K.S. Tong, Eric T.T. Wong.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Picture archiving and communication systems in medicine-- Quality control.,Picture archiving and communication systems in medicine-- Security measures.,Computer Security-- standards.,Image Processing, Computer-Assisted-- methods.,Radiographic Image Interpretation, Computer-Assisted-- instrumentation.,Radiographic Image Interpretation, Computer-Assisted-- methods.,MEDICAL-- Allied Health Services-- Radiological & Ultrasound Technology.
Classification :
R857
.
P52
T66
2009eb


325. Grid Resource Management :
Author: edited by Jarek Nabrzyski, Jennifer M. Schopf, Jan Węglarz.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Information Systems.,Operations research.
Classification :
QA76
.
9
.
C58
E358
2004


326. Guide to Computer Network Security
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject:

327. Guide to ambient intelligence in the IoT environment :
Author: Zaigham Mahmood, editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Ambient intelligence.,Internet of things.,Ambient intelligence.,Internet of things.
Classification :
QA76
.
9
.
A48
G85
2019


328. HM116
پدیدآورنده : edited by Leila Monaghan & Jane E. Goodman.
موضوع :
۲ نسخه از این کتاب در ۱ کتابخانه موجود است.
329. Handbook of computer networks and cyber security
Author: Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Computer networks.,Computer security.
Classification :
TK5105
.
5


330. Handbook of information and communication security
Author: / Peter Stavroulakis, Mark Stamp, editors
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security,Data encryption (Computer science),Computer Science, IT
Classification :
QA76
.
9
.
A25H355
2010


331. Handbook of research on information and cyber security in the fourth industrial revolution /
Author: Ziska Fields, University of KwaZulu-Natal, South Africa.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Confidential communications-- Protection.,Electronic information resources-- Access control.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Electronic information resources-- Access control.
Classification :
TK5105
.
59
.
P744
2018e


332. Handbook of research on security considerations in cloud computing /
Author: Kashif Munir, Mubarak S. Al-Mutairi, and Lawan A. Mohammed, editors
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures, Handbooks, manuals, etc
Classification :
QA76
.
585
.
H3646
2015


333. Handbook of research on socio-technical design and social networking systems /
Author: Brian Whitworth, Aldo de Moor, [editors].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Information technology-- Social aspects.,Internet-- Social aspects.,Online social networks.,COMPUTERS-- Information Technology.,Information technology-- Social aspects.,Internet-- Social aspects.,Online social networks.
Classification :
HM742
.
H37
2009eb


334. Holistic approach to quantum cryptography in cyber security
Author: edited Shashi Bhushan... [et al.].
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Data encryption (Computer science),Computer networks,Quantum cryptography.,Security measures.,Risk Analysis Assessment.

335. Honeypot
Author: / R.C. Joshi, Anjali Sardana
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security.,Computer hackers.,Firewalls (Computer security),Computer networks--Security measures,Wireless communication systems--Security measures
Classification :
QA76
.
9
.
A25
,
J66
2011


336. How do rogue nations threaten human rights? -- North Korea represses freedom / Kay Seok -- Iran violates women's rights / Sam Brownback -- Sudanese government engages in genocide / Human Rights Watch -- United States violates human rights worldwide / Vernon Coleman -- Rogue nations undermine the United Nations' mission to promote human rights / Joseph Loconte -- U.S. invasions have not spread democracy in the Middle East / Phyllis Bennis -- How should the global community respond to rogue nations? -- Preemptive force is sometimes necessary to contain rogue nations / National Review -- Preemptive force threatens efforts to contain rogue states / Ivan Eland -- Missile defense system is necessary to protect against rogue nations / Dennis Ross -- Missile defense system is unnecessary / Gwynne Dyer -- Promoting globalization will reduce the threat posed by rogue states / Banning N. Garrett, Dennis M. Sherman -- Globalization
Author: Louise Gerdes, book editor.
Library: Library of Islamic Parliament (Tehran)
Subject:

337. Human Choice and Computers :
Author: edited by Klaus Brunnstein, Jacques Berleur.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Ethics.,Humanities.

338. Human Choice and Computers :
Author: edited by Klaus Brunnstein, Jacques Berleur.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Ethics.,Humanities.
Classification :
QA76
.
9
.
H85
E358
2002


339. Human centered computing :
Author: Yong Tang, Qiaohong Zu, José G. Rodríguez García (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Human-computer interaction, Congresses.,Ubiquitous computing, Congresses.,User-centered system design, Congresses.,Human-computer interaction.,Ubiquitous computing.,User-centered system design.
Classification :
QA76
.
5915


340. Human computatio
Author: Edith Law and Luis von Ahn
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Bionics,Human-computer interaction,Machine learning,Artificial intelligence,Social media, Economic aspects
Classification :
Q
،
320
،.
L284
،
2011

