• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۴ پاسخ غیر تکراری از ۴ پاسخ تکراری در مدت زمان ۰,۸۹ ثانیه یافت شد.

1. Data privacy management and autonomous spontaneous securit

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Joaquin Garcia-Alfaro ... [et al.] (eds.

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer security, Congresses,Computers, Access control, Congresses,Internet, Security measures, Congresses,Electronic books

Classification :
QA76
.
9
.
A25
,
D66
2011

2. Data privacy management and autonomous spontaneous security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Joaquin Garcia-Alfaro ... [et al.] (eds.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses,Computers-- Access control, Congresses,Internet-- Security measures, Congresses

Classification :
QA76
.
9
.
A25
D66
2011

3. Proceedings of The IFIP TC 11 23rd International Information Security Conference

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / edited by Sushil Jajodia, Pierangela Samarati, Stelvio Cimato.

Library: Library of College of Science University of Tehran (Tehran)

Subject: Computer networks -- Security measures -- Congresses, Computers -- Access control -- Congresses, Computer security -- Congresses,Computer networks -- Access control -- Congresses,Data protection -- Congresses

Classification :
QA
76
.
9
.
A25I461
2008

4. Risks and Security of Internet and Systems :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Nora Cuppens, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquin Garcia-Alfaro.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses.,Internet-- Security measures, Congresses.,Artificial intelligence.,Artificial intelligence.,Coding theory & cryptology.,Computer science.,Computers-- Expert Systems.,Computers-- Information Technology.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Computers, Special purpose.,Computers.,Data encryption (Computer science),Expert systems-- knowledge-based systems.,Information retrieval.,Information technology: general issues.,Software engineering.,Software Engineering.

Classification :
QA76
.
758
I58
2017
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival