41. Cold war history
Author: edited by Frédéric Bozo ... [ et al.].
Library: Library of Islamic Parliament (Tehran)
Subject:

42. Communication Systems and Networks :
Author: Subir Biswas, Animesh Mukherjee, Mun Choon Chan, Sandip Chakraborty, Abhinav Kumar, Giridhar Mandyam, Rajeev Shorey (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing, Congresses.,Computer networks-- Security measures, Congresses.,Computer networks, Congresses.,Telecommunication systems, Congresses.,Cloud computing.,Computer networks-- Security measures.,Computer networks.,Telecommunication systems.
Classification :
TK5105
.
5


43. Communications and multimedia security. volume 3, IFIP Joint TC6/TC11 Working Conference on Communications and Multimedia Security, 22-23 Sept. 1997, Athens, Greece
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Computer security,Congresses ، Telecommunication-- Security measures,Congresses ، Multimedia systems-- Security measures,Congresses ، Computer networks-- Security measures,Congresses ، Telecommunication-- Access control,Congresses ، Multimedia systems-- Access control,Congresses ، Computer networks-- Access control
Classification :
QA
76
.
9
.
A25
.
I455
1997


44. Computer network security
Author: / Igor Kotenko, Victor Skormin (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures, Congresses,Computer networks, Access control, Congresses
Classification :
QA76
.
9
.
A25I58
2010


45. Cryptology and network security
Author: Juan A. Garay, Atsuko Miyaji, Akira Otsuka (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I5534
2009eb


46. Detection of intrusions and malware, and vulnerability assessmen
Author: / Christian Kreibich, Marko Jahnke (Eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures, Congresses,Computer networks, Access control, Congresses,Electronic books
Classification :
TK5105
.
59
.
D56
2010


47. Detection of intrusions and malware, and vulnerability assessment :
Author: Thorsten Holz, Herbert Bos (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Computers-- Access control-- Evaluation, Congresses,Computers-- Access control, Congresses,Malware (Computer software), Congresses
Classification :
QA76
.
9
.
A25


48. Detection of intrusions and malware, and vulnerability assessment
Author: / Christian Kreibich, Marko Jahnke (Eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures, Congresses,Computer networks, Access control, Congresses
Classification :
TK5105
.
59
.
D56
2010


49. Detection of intrusions and malware, and vulnerability assessment
Author: / Klaus Julisch, Christopher Kruegel (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computers--Access control--Congresses,Computers--Access control--Evaluation--Congresses,Computer networks--Security measures--Congresses,Computer security--Congresses,Intrusions,Malware,Vulnerability assessment,DIMVA
Classification :
QA
,
76
.
9
,.
A25
,
D563
,
2005


50. Detection of intrusions and malware, and vulnerability assessment
Author: Ulrich Flegel, Danilo Bruschi (eds.)
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computers, Access control, Congresses,Computers, Access control, Evaluation, Congresses,Computer networks, Security measures, Congresses,Computer security, Congresses,Malware (Computer software), Congresses,Eindringerkennung, Kongress, Como <2009>,Kryptoanalyse, Kongress, Como <2009>,Malware, Kongress, Como <2009>,Softwareschwachstelle, Kongress, Como <2009>,Zugriffskontrolle, Kongress, Como <2009>,Como (2009), swd,Kongress., swd,Eindringerkennung., swd,Kryptoanalyse., swd,Malware., swd,Softwareschwachstelle., swd,Zugriffskontrolle., swd
Classification :
QA
،
76
.
9
،.
A25
,
D563
،
2009


51. Detection of intrusions and malware, and vulnerability assessment : Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005 : proceedings
Author: Klaus Julisch, Christopher Kruegel )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computers -- Access control,Evaluation -- Congresses ، Computers -- Access control,Congresses ، Computer networks -- Security measures,Congresses ، Computer security
Classification :
QA
76
.
L28
Vol
.
3548


52. Future of trust in computing
Author: David Gawrock... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
F888
2008eb


53. Global security, safety, and sustainability
Author: Hamid Jahankhani, Ali G. Hessami, Feng Hsu (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses,Data protection, Congresses,Internet-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
I344
2009eb


54. How do rogue nations threaten human rights? -- North Korea represses freedom / Kay Seok -- Iran violates women's rights / Sam Brownback -- Sudanese government engages in genocide / Human Rights Watch -- United States violates human rights worldwide / Vernon Coleman -- Rogue nations undermine the United Nations' mission to promote human rights / Joseph Loconte -- U.S. invasions have not spread democracy in the Middle East / Phyllis Bennis -- How should the global community respond to rogue nations? -- Preemptive force is sometimes necessary to contain rogue nations / National Review -- Preemptive force threatens efforts to contain rogue states / Ivan Eland -- Missile defense system is necessary to protect against rogue nations / Dennis Ross -- Missile defense system is unnecessary / Gwynne Dyer -- Promoting globalization will reduce the threat posed by rogue states / Banning N. Garrett, Dennis M. Sherman -- Globalization
Author: Louise Gerdes, book editor.
Library: Library of Islamic Parliament (Tehran)
Subject:

55. ICT systems security and privacy protection :
Author: Gurpreet Dhillon, Fredrik Karlsson, Karin Hedström, André Zúquete (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Internet-- Security measures, Congresses.,Computer networks-- Security measures.,Computer security.,Internet-- Security measures.
Classification :
QA76
.
9
.
A25


56. Includes bibliographical references (p. 49-51). 0,B
Author: Zeren Tanındı. ,/ Katie Normington.
Library: Library of Islamic Parliament (Tehran)
Subject:

57. Includes bibliographical references (p. 375) and index. 0
Author: Brian M. Fagan.
Library: Library of Islamic Parliament (Tehran)
Subject:

58. Includes bibliographical references (p. 225-231) and index. 0
Author: Andrew Green.
Library: Library of Islamic Parliament (Tehran)
Subject:

59. Information Systems Security :
Author: Sushil Jajodia, Chandan Mazumdar (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
I25
2011


60. Information security and digital forensics :
Author: Dasun Weerasinghe (Ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation, Congresses.,Computer networks-- Access control, Congresses.,Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Internet-- Security measures, Congresses.,Computer crimes-- Investigation.,Computer networks-- Access control.,Computer networks-- Security measures.,Computer security.,Informatique.,Internet-- Security measures.
Classification :
QA76
.
9
.
A25
I584
2010

