201. Security of information and communication networks
Author: / Stamatios V. Kartalopoulos
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Computer networks -- Security measures,Data encryption (Computer science)
Classification :
TK
5105
.
59
.
K37
2009


202. Security of information and communication networks
Author: / Stamatios V Kartalopoulos
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer networks -- Security measures,Data encryption (Computer science),Reseaux d'ordinateurs -- Securite -- Mesures.,Reseaux d'information -- Securite? -- Mesures.
Classification :
TK
5105
.
59
.
K3
2009


203. Security, privacy and reliability in computer communications and networks
Author: / editors, Kewei Sha, Aaron Striegel, Min Song.
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computer networks,Computer networks,Data transmission systems,Data transmission systems,Data encryption (Computer science),Routing protocols (Computer network protocols),Computer networks,Computer networks,Data encryption (Computer science),Data transmission systems,Data transmission systems,Routing protocols (Computer network protocols),-- Security measures,-- Reliability,-- Security measures,-- Reliability,-- Reliability,-- Security measures,-- Reliability,-- Security measures
Classification :
005
.
8
S4466
2017
21


204. Security solutions and applied cryptography in smart grid communications
Author: / Ferrag Ahmed
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Smart power grids--Security measures,Data encryption (Computer science),Computer networks--Security measures
Classification :
TK3105
.
S334
2017


205. Sudo mastery :
Author: by Michael W. Lucas.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Access control.,Computer networks -- Security measures.,Data encryption (Computer science)
Classification :
TK5105
.
59
B965
2013


206. Theory of security and applications
Author: Sebastian Mödersheim, Catuscia Palamidessi (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
J65
2012eb


207. Topics in Cryptology – CT-RSA 2016
Author: \ Kazue Sako (Ed.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Data protection -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها ,حفاظت اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
QA
76
.
9
.
T6
2016
E-Book
,


208. Transactions on Large-Scale Data- and Knowledge- Centered Systems XXIII
Author: \ Abdelkader Hameurlain, ... [et al.] (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,Data encryption (Computer science),Computer networks,کامپیوترها,رمزگذاری دادهها,شبکههای کامپیوتری, -- Congresses, -- Congresses, -- Congresses, -- کنگرهها, -- کنگرهها, -- کنگرهها, -- Security measures, -- ایمنی اطلاعات, -- اقدامات تامینی,a03,a05,a07,a03,a05,a07
Classification :
QA
76
.
9
.
D3T7
2016
E-Book
,


209. Transactions on data hiding and multimedia security VI /
Author: Yun Q. Shi [and others] (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Data protection,Multimedia systems-- Security measures,Algorithm Analysis and Problem Complexity,Computer Science,Computers and Society,Data Encryption,Pattern Recognition,Systems and Data Security
Classification :
QA76
.
9
.
A25
T73
2011


210. Trust and trustworthy computing
Author: Stefan Katzenbeisser ... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
T78
2012eb


211. Trust management VII :
Author: Carmen Fernández-Gago [and others] (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
C376
2013


212. Trusted Systems
Author: \ Moti Yung, Liehuang Zhu, Yanjiang Yang (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,Computer networks,Data encryption (Computer science),کامپیوترها,شبکههای کامپیوتری,رمزگذاری دادهها, -- Congresses, -- Congresses, -- Congresses, -- کنگرهها, -- کنگرهها, -- کنگرهها, -- Security measures, -- ایمنی اطلاعات, -- اقدامات تامینی,a03,a05,a07,a03,a05,a07
Classification :
QA
76
.
9
.
A25
I58
2015
E-Book
,


213. Trusted computing and information security :
Author: Huanguo Zhang, Bo Zhao, Fei Yan (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25


214. Trusted systems :
Author: edited by Liqun Chen, Moti Yung
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011


215. Trusted systems
Author: Liqun Chen, Moti Yung, Liehuang Zhu (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011eb


216. Trusted systems
Author: Chris J. Mitchell, Allan Tomlinson (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2012eb


217. Trustworthy computing and services
Author: Yuyu Yuan, Xu Wu, Yueming Lu (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I83
2012


218. Trustworthy execution on mobile devices
Author: Vasudevan, Amit,Amit Vasudevan, Jonathan M. McCune, James Newsome
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Computer security,، Mobile computing,Security measures ، Mobile communication systems,، Computer Science,، Systems and Data Security,، Computer Communication Networks,، Data Encryption,، Communications Engineering, Networks
Classification :
QA76
.
9
.
A25


219. Unix secure shell
Author: Carasik, Anne H
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، UNIX )Computer file(,، UNIX shells,، Computer networks-- Management,، Data encryption )Computer science(,، Computer networks-- Security measures
Classification :
QA
76
.
76
.
O63
.
C37
1999


220. Zero trust networks
Author: Razi Rais ... [et al.].,Rais, Razi
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security.,Computer networks,Data encryption (Computer science),Trust.,Computer networks,Computer security.,Data encryption (Computer science),Security measures.,Security measures.
