21. CCS'10 : proceedings of the 17th ACM Conference on Computer and Communications Security, October 4-8, 2010, Chicago, Illinois, USA
Author: ]general chair, Ehab Al-Shaer; program chairs, Angelos D. Keromytis, Vitaly Shmatikov[; sponsored by, ACM SIGSAC; supported by, National Science Foundation...]et al.[
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Data encryption )Computer science(
Classification :
QA
76
.
9
.
A25A26
2010


22. Certification and security in inter-organizational E-services :
Author: edited by Enrico Nardelli, Maurizio Talamo.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures, Congresses.,Computer security, Congresses.,Business-- Data processing-- Security measures.,Computer Science.,Computer security.,Electrical & Computer Engineering.,Engineering & Applied Sciences.,Informatique.,Telecommunications.
Classification :
QA76
.
9
.
A25
I462
2005


23. Computer security :
Author: Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25


24. Computer security - ESORICS 2012
Author: Sara Foresti, Moti Yung, Fabio Martinelli (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
E98
2012eb


25. Critical information infrastructure security :
Author: Sandro Bologna, Bernhard Hämmerli, Dimitris Gritzalis, Stephen Wolthusen (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
C75
2011


26. Critical infrastructure protection
Author: / Javier Lopez, Roberto Setola, Stephen D. Wolthusen (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks--Security measures,Information networks--Security measures,Data encryption (Computer science),Data structures (Computer science),Information technology--Security measures
Classification :
TK5105
.
59
.
C725
2012


27. Critical infrastructure protection
Author: Javier Lopez, Roberto Setola, Stephen D. Wolthusen (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Data encryption (Computer science),Data structures (Computer science),Information networks-- Security measures,Information technology-- Security measures
Classification :
TK5105
.
59
.
C725
2012eb


28. Critical infrastructure protection V :
Author: Jonathan Butts, Sujeet Shenoi (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Cyberinfrastructure-- Security measures, Congresses.
Classification :
TK5105
.
59
.
I35
2011


29. Cryptographic and information security :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Multimedia communications ; Security measures. ; Data encryption (Computer science) ; Data protection. ;

30. Cryptographic and information security :
Author: edited by S. Ramakrishnan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data encryption (Computer science),Data protection.,Multimedia communications-- Security measures.,Computer security.,COMPUTERS / Security / General.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25
C843
2019eb


31. Cryptographic hardware and embedded systems--CHES 2011 :
Author: Bart Preneel, Tsuyoshi Takagi, (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses,Embedded computer systems-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
C44
2011


32. Cryptography and secure communication
Author: Blahut, Richard E.
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: ، Data encryption )Computer science(,، Cryptography,Security measures ، Telecommunication
Classification :
QA
76
.
9
.
A25
.
B569


33. Cryptology and network security :
Author: Jan Camenisch, Panos Papadimitratos (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer Communication Networks.,Computers and Society.,Cryptology.,Information Systems and Communication Service.,Software Engineering/Programming and Operating Systems.,Computer networking & communications.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- Online Services-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Ethical & social aspects of IT.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25


34. Data privacy and security :
Author: by David Salomon.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25
B933
2011


35. Data privacy management and autonomous spontaneus [sic] security
Author: Joaquin Garcia-Alfaro ... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A97
D76
2011eb


36. Data privacy management, cryptocurrencies and blockchain technology :
Author: Joaquin Garcia-Alfaro, Jordi Herrera-Joancomartí, Giovanni Livraga, Ruben Rios (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computers and Society.,Information Systems and Communication Service.,Software Engineering/Programming and Operating Systems.,Systems and Data Security.,Computer networking & communications.,Computer security.,Computer security.,Computers-- Online Services-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data protection.,Ethical & social aspects of IT.,Software Engineering.
Classification :
QA76
.
9
.
A25


37. Decrypted Secrets :
Author: by Friedrich L. Bauer.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory.,Computer science.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
B947
2000


38. EUROCRYPT'85 :
Author: by Franz Pichler.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject:

39. Emerging security algorithms and techniques /
Author: editors, Khaleel Ahmad, M.N. Doja, Nur Izura Udzir, Manu Pratap Singh.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Cryptography.,Data encryption (Computer science),Computer security.,COMPUTERS-- Computer Graphics-- Game Programming & Design.,COMPUTERS-- General.,COMPUTERS-- Security-- Cryptography.,COMPUTERS-- Security-- General.,Cryptography.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
E466
2019eb


40. Encrypted email :
Author: Hilarie Orman
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Electronic mail messages-- Security measures.,Electronic mail systems-- Security measures.
Classification :
TK5105
.
73

