1. Advances in computers.
Author: edited by Morris Rubinoff.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Computers.,Electronic data processing.,Computer science.,COMPUTERS-- Bioinformatics.,Computers.,Electronic data processing.
Classification :
QA76
.
A3eb
1972


2. Advances in dependability engineering of complex systems: proceedings of the twelfth International Conference on Dependability and Complex Systems DepCoS-RELCOMEX, July 2-6, 2017, Brunów, Poland
Author: / Edited by Wojciech Zamojski... [et al.].
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computers -- Reliability -- Congresses.,Computers -- Reliability.

3. Cryptology and network security :
Author: Jan Camenisch, Panos Papadimitratos (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer Communication Networks.,Computers and Society.,Cryptology.,Information Systems and Communication Service.,Software Engineering/Programming and Operating Systems.,Computer networking & communications.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- Online Services-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Ethical & social aspects of IT.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25


4. Data privacy management, cryptocurrencies and blockchain technology :
Author: Joaquin Garcia-Alfaro, Jordi Herrera-Joancomartí, Giovanni Livraga, Ruben Rios (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computers and Society.,Information Systems and Communication Service.,Software Engineering/Programming and Operating Systems.,Systems and Data Security.,Computer networking & communications.,Computer security.,Computer security.,Computers-- Online Services-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data protection.,Ethical & social aspects of IT.,Software Engineering.
Classification :
QA76
.
9
.
A25


5. Practical Mobile Forensics :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cell phone systems-- Security measures.,Mobile computing-- Security measures.,Computer networking & communications.,Computer security.,Computers-- Hardware-- Handheld Devices.,Computers-- Networking-- General.,Computers-- Security-- General.,Mobile phones: consumer/user guides.,Portable & handheld devices: consumer/user guides.
Classification :
QA76
.
9
.
A25
.
P733
2018


6. Provable security :
Author: Joonsang Baek, Willy Susilo, Jongkil Kim (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer Systems Organization and Communication Networks.,Computing Milieux.,Cryptology.,Data Structures and Information Theory.,Software Engineering/Programming and Operating Systems.,Algorithms & data structures.,Computer networking & communications.,Computer security.,Computers-- Hardware-- General.,Computers-- Information Theory.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Data protection.,Information technology: general issues.,Software Engineering.
Classification :
QA76
.
9
.
A25


7. Quality of protection :
Author: edited by Dieter Gollmann, Fabio Massacci, Artsiom Yautsiukhin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Quality control, Congresses.,Computer networks-- Standards, Congresses.,Computer security-- Quality control, Congresses.,Computer security-- Standards, Congresses.,Computer networks-- Quality control.,Computer networks-- Quality control.,Computer networks-- Standards.,Computer networks-- Standards.,Computer security-- Quality control.,Computer security-- Standards.,Computer security-- Standards.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Informatique.
Classification :
QA76
.
9
.
A25
Q35
2006eb


8. Security and Dependability for Ambient Intelligence
Author: edited by Spyros Kokolakis, Antonio Maña Gómez, George Spanoudakis.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network architectures.,Computer networks.,Computer science.,Data protection.,Information storage and retrieval systems.,Operating systems (Computers),Software engineering.

9. Security and Persistence :
Author: edited by John Rosenberg, J. Leslie Keedy.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Software engineering.
