1. A multidisciplinary introduction to information security /
Author: [edited by] Stig F. Mjølsnes
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Multidisciplinary design optimization
Classification :
QA76
.
9
.
A25
M845
2012


2. A technical guide to IPSec virtual private networks /
Author: James S. Tiller.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Extranets (Computer networks)-- Security measures.,IPSec (Computer network protocol),COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,IPSec (Computer network protocol)
Classification :
TK5105
.
875
.
E87
T55
2001eb


3. Advances in Computing and Data Sciences :
Author: edited by Mayank Singh, P.K. Gupta, Vipin Tyagi, Jan Flusser, Tuncer Ören, Rekha Kashyap.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science, Congresses.,Computer science.
Classification :
QA75
.
5


4. Advances in Cryptology -- EUROCRYPT 2019 :
Author: Yuval Ishai, Vincent Rijmen (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25


5. Advances in information and computer security :
Author: Tetsu Iwata, Masakatsu Nishigaki (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses,Computer security-- Congresses,Electronic information resources-- Access control-- Congresses
Classification :
QA76
.
9
.
A25
I58
2011


6. Applied Cryptography and Network Security
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses,Computer networks -- Security measures -- Congresses,رمزگذاری دادهها -- کنگرهها,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
E-Book
,

7. Applied Cryptography and Network Security
Author: \ Jianying Zhou, MotiYung (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
E-Book
,

8. Applied Cryptography and Network Security
Author: \ Mark Manulis, Ahmad-Reza Sadeghi, Steve Schneider (eds.).
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
E-Book
,

9. Applied Cryptography and Network Security
Author: \ [Edited by] Michael Jacobson...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
E-Book
,

10. Applied Cryptography and Network Security.
Author: \ [edited by] Tal Malkin...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,Cloud computing -- Congresses.,رمزگذاری دادهها -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,محاسبات ابری -- کنگره ها
Classification :
QA
76
.
9
.
A66
2015
E-Book
,


11. Applied Cryptography and Network Security
Author: \ Feng Bao, Pierangela Samarati, Jianying Zhou (eds.).
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگره ها
Classification :
E-Book
,

12. Applied cryptography and network security :
Author: Javier Lopez, Gene Tsudik (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.,Réseaux d'ordinateurs -- Sécurité -- Mesures.

13. Applied cryptography and network security
Author: Michael Jacobson ... [et al.]. (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing, Congresses,Computer networks-- Security measures, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
A26
2013


14. Applied cryptography and network security :
Author: Robert H. Deng, Valérie Gauthier-Umaña, Martín Ochoa, Moti Yung, (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Data encryption (Computer science)
Classification :
TK5102
.
94
.
A28
2019


15. Applied cryptography and network security
Author: Feng Bao, Pierangela Samarati, Jianying Zhou (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
A26
2012eb


16. Applied cryptography and network security
Author: / Jianying Zhou, Moti Yung (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Data encryption (Computer science), Congresses,Computer networks, Security measures, Congresses,Computer networks, Access control, Congresses
Classification :
QA76
.
9
.
A25A26
2010


17. Authentication systems for secure networks
Author: Oppliger, Rolf.
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer networks - Security measures , Computers - Access control , Authentication , Cryptography
Classification :
TK
5105
.
59
.
O77
1996


18. Authentication systems for secure networks
Author: Rolf Oppliger
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,، Computers -- Access control,، Authentication,، Cryptography
Classification :
TK
5105
.
59
.
O62


19. CCNA security study guide :
Author: Troy McMillan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cisco IOS.,Cisco IOS.,Computer networks-- Security measures-- Examinations, Study guides.,Routing (Computer network management)-- Examinations, Study guides.,Telecommunication-- Switching systems-- Examinations, Study guides.,Telecommunications engineers-- Certification.,Computer networks-- Security measures-- Examinations.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Networking.,COMPUTERS-- Security-- Online Safety & Privacy.,Telecommunication-- Switching systems-- Examinations.,Telecommunications engineers-- Certification.
Classification :
TK5105
.
59


20. CompTIA Security+ Deluxe study guide
Author: Emmett Dulaney
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides,Computer security-- Examinations, Study guides,Electronic data processing personnel-- Certification
Classification :
QA76
.
3
.
D82279
2009

