1061. User's guide to cryptography and standards
Author: Dent, Alexander W
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer security ► Cryptography ► Computers
Classification :
76
.
9
.
A25D465

1062. User's guide to cryptography and standards
Author: / Alexander W. Dent, Chris J. Mitchell
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Cryptography- Standards,Computers- Access control- Standards
Classification :
QA76
.
9
.
A25
,
D465
2005


1063. User's guide to cryptography and standards
Author: / Alexander W. Dent, Chris J. Mitchell
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security,Cryptography, Standards,Computers, Access control, Standards
Classification :
QA76
.
9
.
A25D465
2005


1064. Vehicular ad hoc network security and privacy /
Author: Xiaodong Lin, Rongxing Lu
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Vehicular ad hoc networks (Computer networks)
Classification :
TE228
.
37


1065. Visual Cryptography for Image Processing and Security
Author: / Feng Liu, Wei Qi Yan
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: METHODS&COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, THEORY
Classification :
E-BOOK

1066. Visual Cryptography for Image Processing and Security
Author: / Feng Liu, Wei Qi Yan
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: METHODS&COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, THEORY
Classification :
E-BOOK

1067. Visual Cryptography for Image Processing and Security: Theory, Methods, and Applications
Author: / Feng Liu, Wei Qi Yan
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: METHODS|ENGINEERING, MULTIDISCIPLINARY&COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, SOFTWARE ENGINEERING|COMPUTER SCIENCE, THEORY
Classification :
E-BOOK

1068. Visual cryptography and secret image sharing
Author: edited by Stelvio Cimato, Ching-Nung Yang.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer file sharing -- Security measures.,Data encryption (Computer science),Image processing -- Security measures.
Classification :
TA1637
.
E358
2012


1069. Web security, privacy and commerce /
Author: Simson Garfinkel with Gene Spafford
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Web sites-- Security measures,World Wide Web-- Security measures
Classification :
TK5105
.
59
.
G37
2002


1070. Windows Server 2008 PKI and certificate security /
Author: Brian Komar.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Microsoft Windows server.,Microsoft Windows server.,Microsoft Windows server.,Computer networks-- Security measures.,Public key infrastructure (Computer security),Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Public key infrastructure (Computer security),Public key infrastructure (Computer security)
Classification :
TK5105
.
59
.
K67
2008eb


1071. based encryption-Introduction to identity
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ; Public key cryptography. ; Public key infrastructure (Computer security) ;

1072. coding theory,cryptography and related areas:proceeding of an international conference on coding theory,cryptography and related areas,held in guanajuato,mexico,in april 1998
Author: Johannes Buchmann ]et al[
Library: Central library and Documentation Center (Zanjan)
Subject: ، codings theory- congresses,، Data encryption )computer Science(- Congresses,، Data tramsmission systems- security measures- congresses
Classification :
TK
5102
.
I5
C6
2000


1073. cryptography and network security
Author: / Behrouz A. Forouzan
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks- Security measures,Cryptography
Classification :
TK5105
,.
59
.
F672
2008


1074. cryptography and network security
Author: / Behrouz A. Forouzan
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks- Security measures,Cryptography
Classification :
TK5105
.
59
.
F672
2008


1075. intrinsic security-Towards hardware
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: output equipment. ; Computer security. ; Cryptography. ; -Computer input

1076. ارائه ی روش جدید برای جلوگیری از حملات مسموم سازی حافظه نهانD
Author: /محمد صادق ال زیاد
Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)
Subject:

1077. ارائهی یک راهکار تبادل امن کلید با استفاده از نگاشتهای چبیشف
Author: /مجید زارع
Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)
Subject:

1078. امنيت داده و ارتباطات صنعت برق بر اساس استاندارد IEC62351
Author:
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: برق -- سيستم ها -- تدابير ايمني ◄ Electric power systems -- Security measures ◄ رمزگذاري داده ها ◄ Data encryption (Computer science) ◄ رمزنگاري ◄ Cryptography
Classification :
333
الف
792


1079. بررسی امنیت شبکه و راهکارها
Author: / مولف عباس برتینا.,برتینا
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: شبکههای کامپیوتری,Computer networks,کامپیوترها,Computer security,تکنولوژی اطلاعات,Information technology,رمزنگاری,Cryptography, -- تدابیر ایمنی, -- Security measures, -- ایمنی اطلاعات, -- تدابیر ایمنی, -- Security measures
Classification :
TK
۵۱۰۵
/
۵۹
/
ب
۴
ب
۴ ۱۴۰۲


1080. پدافند سایبری سامانه و شبکه کنترل صنعتی : (معماری، پروتکل ها، آسیب پذیری ها، تهدیدات، مخاطرات و راهکارهای مصون سازی سایبری)
Author: / تالیف و تصنیف علی ناصری,پشت جلد به انگلیسی: Ali Naseri. Cyber defense of industrial control system and network,ناصری
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: رمزگذاری دادهها,Data encryption (Computer science),رمزنگاری,Cryptography,کامپیوترها,Computer security,کامپیوترها,Computers,فضای مجازی,Cyberspace, -- رمزگان, -- Code words, -- ایمنی اطلاعات, -- کنترل دستیابی, -- Access control, -- تدابیر ایمنی, -- Security measures,a01,a01,a02,a02,a03,a03,a04,a04,a05,a05
Classification :
QA
۷۶
/
۹
/
ر
۸
ن
۲ ۱۴۰۰

