161. Frontiers of higher order fuzzy sets /
Author: Alireza Sadeghian, Hooman Tahayori, editors
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence.,Data structures (Computer science),Engineering.,Fuzzy sets.,Artificial Intelligence (incl. Robotics),Computational Intelligence.,Data Structures, Cryptology and Information Theory.
Classification :
QA248
.
5


162. Fundamentals of Information Systems
Author: edited by Torsten Polle, Torsten Ripke, Klaus-Dieter Schewe.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Data structures (Computer science).,Information storage and retrieval systems.,Management information systems.

163. Fuzzy Database Modeling
Author: by Adnan Yazici, Roy George.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence.,Computer science.,Database management.,Management information systems.

164. Holistic Analysis and Management of Distributed Social Systems /
Author: Peter Simon Sapaty.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Social aspects.,High technology.,Artificial intelligence.,Computer networks-- Social aspects.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,High technology.,Media studies.,Society & social sciences.
Classification :
TK5105
.
5


165. How do rogue nations threaten human rights? -- North Korea represses freedom / Kay Seok -- Iran violates women's rights / Sam Brownback -- Sudanese government engages in genocide / Human Rights Watch -- United States violates human rights worldwide / Vernon Coleman -- Rogue nations undermine the United Nations' mission to promote human rights / Joseph Loconte -- U.S. invasions have not spread democracy in the Middle East / Phyllis Bennis -- How should the global community respond to rogue nations? -- Preemptive force is sometimes necessary to contain rogue nations / National Review -- Preemptive force threatens efforts to contain rogue states / Ivan Eland -- Missile defense system is necessary to protect against rogue nations / Dennis Ross -- Missile defense system is unnecessary / Gwynne Dyer -- Promoting globalization will reduce the threat posed by rogue states / Banning N. Garrett, Dennis M. Sherman -- Globalization
Author: Louise Gerdes, book editor.
Library: Library of Islamic Parliament (Tehran)
Subject:

166. IOS penetration testing :
Author: Kunal Relan
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Application software.,Computer security.,Apple and iOS.,Computer Science.,Data Encryption.,Software Engineering.,Systems and Data Security.
Classification :
QA76
.
9
.
A25


167. 20090601 ,Includes bibliographical references and index. 0
Author: 20090602 ,20090602 0
Library: Library of Islamic Parliament (Tehran)
Subject:

168. Includes bibliographical references (p. 49-51). 0,B
Author: Zeren Tanındı. ,/ Katie Normington.
Library: Library of Islamic Parliament (Tehran)
Subject:

169. Includes bibliographical references (p. 375) and index. 0
Author: Brian M. Fagan.
Library: Library of Islamic Parliament (Tehran)
Subject:

170. Includes bibliographical references (p. 225-231) and index. 0
Author: Andrew Green.
Library: Library of Islamic Parliament (Tehran)
Subject:

171. Index Data Structures in Object-Oriented Databases
Author: by Thomas A. Mueck, Martin L. Polaschek.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Data structures (Computer science),Information storage and retrieval systems.

172. Industrial Information and Design Issues
Author: edited by Jacques-Emile Dubois, Nahum Gershon.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cheminformatics.,Chemistry.,Communication in chemistry.
Classification :
T58
.
5
E358
1996


173. Information Security Management & Small Systems Security :
Author: edited by Jan H.P. Eloff, Les Labuschagne, Rossouw Solms, Jan Verschuren.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Data structures (Computer science),Information storage and retrieval systems.
Classification :
QA76
.
9
.
M3
E358
1999


174. Information Security Technology for Applications
Author: edited by Peeter Laud
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory,Computer science,Data encryption (Computer science),Data protection,Data structures (Computer science),Information Systems,Coding and Information Theory,Computer Science,Data Encryption,Data Structures, Cryptology and Information Theory,Information Systems Applications (incl. Internet),Management of Computing and Information Systems,Systems and Data Security

175. Information Systems Engineering :
Author: by Arne Sølvberg, David Chenho Kung.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Management information systems.,Software engineering.
Classification :
T58
.
5
B937
1993


176. Information Technology -- New Generations :
Author: Shahram Latifi, editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science, Congresses.,Electrical engineering.,Information technology, Congresses.,Algorithms & data structures.,Computer science.,Computer security.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Electrical engineering.,Information retrieval.,Information technology.
Classification :
QA75
.
5


177. Information and Database Quality
Author: edited by Mario G. Piattini, Coral Calero, Marcela Genero.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Data structures (Computer science),Software engineering.

178. Information and communications security :
Author: David Naccache [and 7 more] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Telecommunication systems-- Security measures, Congresses.,Algorithms & data structures.,Computer networking & communications.,Computer security.,Computers-- Hardware-- General.,Computers-- Information Theory.,Computers-- Online Services-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Information technology: general issues.,Software Engineering.,Telecommunication systems-- Security measures.
Classification :
QA76
.
9
.
A25


179. Innovative approaches in agent-based modelling and business intelligence /
Author: Setsuya Kurahashi, Hiroshi Takahashi, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business intelligence.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Business intelligence.
Classification :
HD38
.
7

