241. Coding and cryptology: proceedings of ... 11- 15 June 2007
Author: Internationa workshop on Coding and cryptology (1st: 2007: Wuyi Mountains, China)
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Coding theory- Congresses ► Cryptography- Congresses ► Number theory- Congresses ► Computer security- Congresses
Classification :
003
.
I61c


242. Coding theory, cryptography, and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998
Author: Johannes Buchmann ... ]et al.[, editors
Library: Central Library and Documentation Center (Kerman)
Subject: Congresses ، Coding theory,Congresses ، Data encryption )Computer science(,Security measures - Congresses ، Data transmission systems
Classification :
TK
5102
.
94
.
I58
2000


243. Coding theory, cryptography and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998
Author: Johannes Buchmann...]et al.[, editors
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Coding theory,Congresses ، Data encryption )Computer science(,Security measures -- Congresses ، Data transmission systems
Classification :
TK
5102
.
94
.
I58
1998


244. Coding theory, cryptography, and related areas: proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998
Author: Johannes Buchmann ... ]et al.[, editors
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Congresses ، Coding theory,Congresses ، Data encryption )Computer science(,Security measures -- Congresses ، Data transmission systems
Classification :
TK
5102
.
94
.
I58
1998


245. Coding theory, cryptography and related areas: proceedings of and International Conference on Coding Theory, Cryptography and Related Areas, held in Guanajuato, Mexico, in April 1998
Author: International Conference on Coding Theory, Cryptography, and Related Areas )8991: Guanajuato, Mexico(
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Coding theory -- Congresses,، Data encryption )Computer science( -- Congresses,، Data transmission systems -- Security measures -- Congresses
Classification :
TK
5102
.
94
.
I58


246. Combinatorial Algorithms
Author: \ Zsuzsanna Lipták, William F. Smyth (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Combinatorial analysis -- Congresses.,Computer algorithms -- Congresses,آنالیز ترکیبی -- کنگرهها,الگوریتمهای کامپیوتری -- کنگرهها
Classification :
QA
164
.
I58
C6
2016
E-Book
,


247. Combinatorial algorithms :
Author: Charles J. Colbourn, Roberto Grossi, Nadia Pisanti (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Algorithms, Congresses.,Combinatorial analysis, Congresses.,Algorithms.,Combinatorial analysis.
Classification :
QA164
.
I58
2019


248. Communications and multimedia security :
Author: Bart De Decker, Jana Dittmann, Christian Kraetzer, Claus Vielhauer (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Multimedia systems-- Security measures, Congresses,Telecommunication systems-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
I35
2013


249. CompTIA Security+ Deluxe study guide
Author: Emmett Dulaney
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides,Computer security-- Examinations, Study guides,Electronic data processing personnel-- Certification
Classification :
QA76
.
3
.
D82279
2009


250. CompTIA security+ SY0-201 cert guide /
Author: David L. Prowse.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computing Technology Industry Association-- Examinations,Computing Technology Industry Association / Examinations / Study guides.,Computing Technology Industry Association.,Microsoft Windows (Computer file),Microsoft Windows (Computer file),Microsoft Windows (Computer file),Computer technicians-- Certification, Study guides.,Electronic data processing personnel-- Certification.,Microcomputers-- Maintenance and repair-- Examinations, Study guides.,Computer technicians-- Certification.,Electronic data processing personnel-- Certification.,Examinations.,Microcomputers-- Maintenance and repair-- Examinations.
Classification :
QA76
.
3
.
P786
2011


251. CompTIA security+ exam guide, (Exam SY0-501) /
Author: Dr. Wm. Arthur Conklin, Dr. Gregory White, Chuck Cothren, Roger L. Davis, Dwayne Williams.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Examinations, Study guides.,Computer technicians-- Certification, Study guides.,Electronic data processing personnel-- Certification, Study guides.,Computer networks-- Security measures-- Examinations.,Computer security-- Examinations.,Computer technicians-- Certification.,Electronic data processing personnel-- Certification.
Classification :
QA76
.
9
.
A25
.
C667565
2018


252. CompTIA security+ guide to network security fundamentals /
Author: Mark Ciampa.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides.,Data protection.,Computer networks-- Security measures-- Examinations.,Data protection.
Classification :
TK5105
.
59
.
C52
2018


253. Complexity theory and cryptology
Author: / Jeorg Rothe
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Cryptography.,Computational complexity.
Classification :
QA
,
76
.
9
,.
A25
,
R672
,
2005


254. Compressed sensing for privacy-preserving data processing /
Author: Matteo Testa, Diego Valsesia, Tiziano Bianchi, Enrico Magli.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Compressed sensing (Telecommunication),Calculus of Variations and Optimal Control; Optimization.,Data Structures, Cryptology and Information Theory.,Privacy.,Signal, Image and Speech Processing.,Algorithms & data structures.,Calculus of variations.,Compressed sensing (Telecommunication),Imaging systems & technology.,Privacy & data protection.,TECHNOLOGY & ENGINEERING / Mechanical.
Classification :
TK5102
.
9


255. Computation, Cryptography, and Network Security
Author: / Nicholas J. Daras, Michael Th. Rassias
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: METHODS&COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, THEORY
Classification :
E-BOOK

256. Computation, cryptography, and network security
Author: Nicholas J. Daras, Michael Th. Rassias
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Engineering mathematics,Mathematical models ، Computer networks -- Security measures,، Mathematics
Classification :
TA
330
.
C65


257. Computational science and its applications-- ICCSA 2013 :
Author: Beniamino Murgante ... [and seven others] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer networks -- Congresses.,Computer science -- Congresses.

258. 28, 2010, ... Computer Science Security and Cryptology)- PKC 2010: 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-Public Key Cryptography
Author: / Phong Q. Nguyen, David Pointcheval
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: ARCHITECTURE|COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, SOFTWARE ENGINEERING&COMPUTER SCIENCE, HARDWARE
Classification :
E-BOOK

259. 28, 2010, ... Computer Science Security and Cryptology)- PKC 2010: 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-Public Key Cryptography
Author: Phong Q. Nguyen, David Pointcheval
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: BUSINESS, MANAGEMENT AND ECONOMICS

260. Computer and cyber security :
Author: edited by Dr. Brij B. Gupta, National Institute of Technology Kurukshetra, Haryana, India ; Dr. Dharma P. Agrawal, University of Cincinnati, USA ; Dr. Haoxiang Wang, GoPerception Laboratory & Cornell University, USA.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,BUSINESS & ECONOMICS-- Production & Operations Management.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Operating Systems-- General.
Classification :
QA76
.
9
.
A25
C626
2019eb

