1681. Trust, privacy, and security in digital business: second international conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005: proceedings
Author: / Sokratis Katsikas, Javier Lopez, Gunther Pernul (eds.)
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computer security,Public key infrastructure (Computer security),Data transmission systems - Security measures,Electronic commerce - Security measures,Business enterprises - Computer networks Security measures,-- Congresses,-- Congresses,-- Congresses,-- Congresses,-- Congresses
Classification :
005
.
8
I61T
2005


1682. Trusted Systems
Author: \ Moti Yung, Liehuang Zhu, Yanjiang Yang (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,Computer networks,Data encryption (Computer science),کامپیوترها,شبکههای کامپیوتری,رمزگذاری دادهها, -- Congresses, -- Congresses, -- Congresses, -- کنگرهها, -- کنگرهها, -- کنگرهها, -- Security measures, -- ایمنی اطلاعات, -- اقدامات تامینی,a03,a05,a07,a03,a05,a07
Classification :
QA
76
.
9
.
A25
I58
2015
E-Book
,


1683. Trusted computing and information security :
Author: Huanguo Zhang, Bo Zhao, Fei Yan (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25


1684. Trusted computing--challenges and application
Author: / Peter Lipp, Ahmad-Reza Sadeghi, Klaus-Michael Koch (Eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Data encryption (Computer science)--Congresses,Public key infrastructure (Computer security)--Congresses

1685. Trusted computing, challenges and applications: First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008: Proceedings
Author: Peter Lipp, Ahmad-Reza Sadeghi, Klaus-Michael Koch )eds.(
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Congresses ، Computer security,Congresses ، Data encryption )Computer science(,Congresses ، Public key infrastructure )Computer security(
Classification :
QA
76
.
9
.
A25
I556
2008


1686. Trusted informatio
Author: / edited by Michel Dupuy, Pierre Paradinas
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Data protection--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
I45
,
2001eb


1687. Trusted information (Online)
Author: edited by Michel Dupuy, Pierre Paradinas.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data protection, Congresses.

1688. Trusted systems :
Author: edited by Liqun Chen, Moti Yung
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011


1689. Trusted systems
Author: Liqun Chen, Moti Yung, Liehuang Zhu (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011eb


1690. Trusted systems
Author: Chris J. Mitchell, Allan Tomlinson (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2012eb


1691. Trustworthy Global Computing
Author: \ Pierre Ganty, Michele Loreti (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,Computer networks,کامپیوترها,شبکههای کامپیوتری, -- Congresses, -- Congresses, -- کنگرهها, -- کنگرهها, -- Security measures, -- ایمنی اطلاعات, -- اقدامات تامینی,a03,a05,a03,a05
Classification :
QA
76
.
9
.
A25
T34
2016
E-Book
,


1692. Trustworthy Internet
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Congresses. ; Internet ; Security measures ; Congresses. ; Wireless communication systems ; Security measures ; Congresses. ; Data protection ; Congresses. ; Privacy, Right of ; Congresses. ; Digital communications

1693. Trustworthy Internet
Author: \ Nicola Blefari-Melazzi, Giuseppe Bianchi, Luca Salgarelli, editors.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks-- Security measures, Congresses.,Internet-- Security measures, Congresses.,Wireless communication systems-- Security measures, Congresses.,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,اینترنت -- تدابیر ایمنی -- کنگره ها,ارتباطات بیسیم -- تدابیر ایمنی -- کنگره ها
Classification :
TK
5105
.
59
.
T7
2010
E-Book
,


1694. Trustworthy Internet
Author: / Nicola Blefari-Melazzi, Giuseppe Bianchi, Luca Salgarelli, editors
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Congresses,Internet--Security measures--Congresses,Wireless communication systems--Security measures--Congresses,Data protection--Congresses,Privacy, Right of--Congresses,Digital communications--Congresses
Classification :
TK
,
5105
.
59
,.
T79
,
2010


1695. Trustworthy computing and services
Author: Yuyu Yuan, Xu Wu, Yueming Lu (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I83
2012


1696. Trustworthy internet /
Author: Nicola Blefari-Melazzi, Giuseppe Bianchi, Luca Salgarelli, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Internet-- Security measures, Congresses.,Computer science.
Classification :
TK5105
.
875
.
I57
T78
2011


1697. Ubiquitous communications and network computing :
Author: Navin Kumar, R. Venkatesha Prasad (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks, Congresses.,Computer science, Congresses.,Internet of things, Congresses.,Computer networks.,Computer science.,Internet of things.
Classification :
TK5105
.
5


1698. Ubiquitous intelligence and computing :
Author: Ching-Hsien Hsu [and others] (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Ubiquitous computing, Congresses
Classification :
QA76
.
5915
.
U33
2011


1699. Ubiquitous networking :
Author: Noureddine Boudriga, Mohamed-Slim Alouini, Slim Rekhis, Essaid Sabir, Sofie Pollin (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks, Congresses.,Ubiquitous computing, Congresses.,Computer networks.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Information retrieval.,Network hardware.,Ubiquitous computing.
Classification :
QA76
.
5915


1700. Ubiquitous security :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ;
