1001. The CISO'S next frontier :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ;

1002. The Digital Big Bang :
Author: Phil Quade.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computers.,Computer security.,COMPUTERS-- Security-- Cryptography.,Computers.
Classification :
QA76
.
9
.
A25


1003. <The> History of information security
Author: edited by Karl De Leeuw and Jan Bergstra
Library: State Department Library (Tehran)
Subject: Cryptography -- History,computer security -- History,Copyright -- History
Classification :
{
1648
},
0b2ba05aa408ecc5da16f8b3f9a725b4

1004. The LLL algorith
Author: / Phong Q. Nguyen, Brigitte Vallee, editors
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Cryptography--Mathematics,Lattice theory.,Integer programming.,Euclidean algorithm.
Classification :
QA
,
9
.
58
,.
L55
,
2010


1005. <The> Mathematics of Secrets
Author: \ Joshua Holden
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Cryptography -- Mathematics,Ciphers,Computer security,رمزنگاری -- ریاضیات,رمز,امنیت کامپیوتر
Classification :
E-Book
,

1006. The Review of radio science, 1992 -2002: advances in 3G mobile communications, cryptography and computer security, EMC for integrated circuits, remote sensing, radio astronomy, and more
Author: / edited by W. Ross Stone; assocaite editor -in-chief Phil Wilkinson
Library: National Library and Archives of Islamic Republic of Iran (Tehran)
Subject: Radio waves,Electromagnetic waves,lonospheric radio wave propagation,Radio astronomy,Wireless communication systems
Classification :
QC
۶۷۶
/
۶
/
ر
۹ ۱۳۸۱


1007. The block cipher companion /
Author: Lars R. Knudsen, Matthew J.B. Robshaw.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
K58
2011


1008. The definitive guide to the Microsoft enterprise library
Author: Newton, Keenan.
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: ، Microsoft .NET,، Enterprise application integration )Computer systems(
Classification :
TK
5101
.
8885
.
A26
N49


1009. The history of information security
Author: / edited by Karl De Leeuw, Jan Bergstra
Library: Library of College of Science University of Tehran (Tehran)
Subject: Cryptography -- History,Computer security -- History,Copyright -- History
Classification :
Z
103
.
H55
2007


1010. The internet of risky things :
Author: Sean Smith.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Embedded Internet devices.,Internet of things-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Hardware.,COMPUTERS-- Internet.,COMPUTERS-- Security-- Online Safety & Privacy.,Embedded Internet devices.,TECHNOLOGY & ENGINEERING-- Industrial Technology.,TECHNOLOGY & ENGINEERING-- Mobile & Wireless Communications.,TECHNOLOGY & ENGINEERING-- Remote Sensing & Geographic Information Systems.,TECHNOLOGY & ENGINEERING-- Robotics.,TECHNOLOGY & ENGINEERING-- Sensors.
Classification :
TK5105
.
8857
.
S65
2017


1011. The modelling and analysis of security protocols :
Author: P.Y.A. Ryan and S.A. Schneider, with M.H. Goldsmith, G. Lowe and A.W. Roscoe
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols,Computer networks-- Security measures,Computer security-- Mathematical models,Computer software-- Verification,Computers-- Access control,Cryptography
Classification :
TK5105
.
59
.
R93
2001


1012. The secret life of numbers :
Author: / George G. Szpiro
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Mathematics , History,Wiskunde. , gtt
Classification :
E-BOOK

1013. The zero trust framework
Author: Ravindra Das.,Das, Ravindra,
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer networks,Computer security.,Trust.,Internet users,Security measures.,Identification.,Internet users.

1014. Theory of Cryptography :
Author: Amos Beimel, Stefan Dziembowski (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses.,Business & Economics-- Information Management.,Computer security.,Computers-- Hardware-- Network Hardware.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Data encryption (Computer science),Data encryption.,Ethical & social aspects of IT.,Information architecture.,Law-- Science & Technology.,Legal aspects of IT.,Network hardware.
Classification :
QA76
.
9
.
A25


1015. Theory of Cryptography.
Author: \ Eyal Kushilevitz , Tal Malkin (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer security -- Congresses.,رمزگذاری دادهها -- کنگرهها ,کامپیوترها -- ایمنی اطلاعات -- کنگرهها
Classification :
TK
5102
.
94
.
T46
2016
E-Book
,


1016. Theory of Cryptography
Author: \ Eyal Kushilevitz , Tal Malkin (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science),رمزگذاری دادهها -- کنگرهها ,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,رمزگذاری دادهها
Classification :
QA
76
.
9
.
T46
2016
E-Book
,


1017. Theory of cryptography
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ; Cryptography ; Congresses. ; Kryptologie. ; swd. ;

1018. Theory of cryptography
Author: Yuval Ishai (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
T44
2011


1019. Theory of cryptography
Author: / Daniele Micciancio (ed.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Cryptography--Congresses,Kryptologie.--swd,Kongress.--swd,Zeurich (2010)--swd
Classification :
QA
,
76
.
9
,.
A25
,
T473
,
2010


1020. Theory of cryptography
Author: / Joe Kilian (ed.).
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security,Cryptography, -- Congresses, -- Congresses,a04,a06
Classification :
QA76
.
9
.
A25
T473
2005

