61. Next generation SSH2 implementation :
Author: Dale Liu, lead author and technical editor ; Max Caceres [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: UNIX Shells.,UNIX Shells.,UNIX Shells.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
L585
2009eb


63. Policy-based autonomic data governance /
Author: Seraphin Calo, Elisa Bertino, Dinesh Verma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Autonomic computing.,Computer networks-- Security measures.,Computer security.,Autonomic computing.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25
P65
2019


64. Practical Mobile Forensics :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cell phone systems-- Security measures.,Mobile computing-- Security measures.,Computer networking & communications.,Computer security.,Computers-- Hardware-- Handheld Devices.,Computers-- Networking-- General.,Computers-- Security-- General.,Mobile phones: consumer/user guides.,Portable & handheld devices: consumer/user guides.
Classification :
QA76
.
9
.
A25
.
P733
2018


65. Practical cryptography in Python :
Author: Seth James Nielson, Christopher K. Monson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography.,Data encryption (Computer science),Python (Computer program language),Cryptography.,Data encryption (Computer science),Python (Computer program language)
Classification :
QA76
.
9
.
A25


66. Proceedings of The IFIP TC 11 23rd International Information Security Conference
Author: / edited by Sushil Jajodia, Pierangela Samarati, Stelvio Cimato.
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer networks -- Security measures -- Congresses, Computers -- Access control -- Congresses, Computer security -- Congresses,Computer networks -- Access control -- Congresses,Data protection -- Congresses
Classification :
QA
76
.
9
.
A25I461
2008


67. Proceedings of The Ifip Tc 11 23rd International Information Security Conference :
Author: edited by Sushil Jajodia, Pierangela Samarati, Stelvio Cimato, Sushil Jajodia, Pierangela Samarati, Stelvio Cimato.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Computers -- Law and legislation.,Data protection.

68. Public-Key Cryptography
Author: by Arto Salomaa.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Data encryption (Computer science)

69. Securing SQL Server :
Author: Peter A. Carter
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: SQL server,Database security,Computer Science,Database Management,Systems and Data Security
Classification :
QA76
.
9
.
D314


70. Securing information and communications systems :
Author: Steven M. Furnell [and others], editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Chiffrement (Informatique),Infrastructure à clé publique (Sécurité informatique),Réseaux d'ordinateurs-- Sécurité-- Mesures.,Sécurité informatique.,Systèmes informatiques-- Sécurité-- Mesures.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
S37563
2008eb


71. Security without obscurity :
Author: Jeff Stapleton.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network architectures.,Data encryption (Computer science),Telecommunication-- Security measures.,Computer network architectures.,COMPUTERS / Security / Networking.,Data encryption (Computer science),Telecommunication-- Security measures.
Classification :
TK5102
.
94
.
S73
2018


72. Smart Card Application Development Using Java
Author: by Uwe Hansmann, Martin S. Nicklous, Thomas Schäck, Achim Schneider, Frank Seliger.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Data encryption (Computer science),Data transmission systems.
Classification :
QA76
.
73
.
J38
B989
2002


73. Sudo mastery :
Author: by Michael W. Lucas.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Access control.,Computer networks -- Security measures.,Data encryption (Computer science)
Classification :
TK5105
.
59
B965
2013


74. Theory of Cryptography :
Author: Amos Beimel, Stefan Dziembowski (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses.,Business & Economics-- Information Management.,Computer security.,Computers-- Hardware-- Network Hardware.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Data encryption (Computer science),Data encryption.,Ethical & social aspects of IT.,Information architecture.,Law-- Science & Technology.,Legal aspects of IT.,Network hardware.
Classification :
QA76
.
9
.
A25


75. VIS '91 Verläßliche Informationssysteme :
Author: herausgegeben von Andreas Pfitzmann, Eckart Raubold.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Data encryption (Computer science),Information storage and retrieval systems.
Classification :
QA76
.
9
.
A25
H473
1991

