221. Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance
Author: \ [Edited by] Joaquin Garcia-Alfaro...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
QA
76
.
9
.
D32
2015
E-Book
,


222. Data hiding fundamentals and applications
Author: Sencar, Husrev T.
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Multimedia systems-- Security measures,، Data encryption )Computer science(
Classification :
QA
76
.
575
.
S46
2004


223. Data hiding fundamentals and applications :
Author: Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: COMPUTERS -- Security -- Cryptography.,Data encryption (Computer science),Multimedia systems -- Security measures.
Classification :
QA76
.
H877
2004


224. Data hiding fundamentals and applications :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Multimedia systems ; Security measures ; Data encryption (Computer science) ;

225. Data hiding fundamentals and applications
Author: / Husrev T. Sencar, Mahalingam Ramkumar, Ali N. Akansu
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Multimedia systems--Security measures,Data encryption (Computer science)
Classification :
QA
,
76
.
575
,.
S46
,
2004


226. Data privacy and security :
Author: by David Salomon.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25
B933
2011


227. Data privacy management and autonomous spontaneous security :
Author: Roberto Di Pietro [and others] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.

228. Data privacy management and autonomous spontaneus [sic] security
Author: Joaquin Garcia-Alfaro ... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A97
D76
2011eb


229. Data privacy management, cryptocurrencies and blockchain technology :
Author: Joaquin Garcia-Alfaro, Jordi Herrera-Joancomartí, Giovanni Livraga, Ruben Rios (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computers and Society.,Information Systems and Communication Service.,Software Engineering/Programming and Operating Systems.,Systems and Data Security.,Computer networking & communications.,Computer security.,Computer security.,Computers-- Online Services-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data protection.,Ethical & social aspects of IT.,Software Engineering.
Classification :
QA76
.
9
.
A25


230. Decrypted Secrets :
Author: by Friedrich L. Bauer.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory.,Computer science.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
B947
2000


231. Desktop witness :
Author: Michael A. Caloyannides.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data encryption (Computer science),Computer security.,Computersicherheit.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
C346
2002


232. Desktop witness :
Author: Michael A. Caloyannides.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data encryption (Computer science),Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
C346
2002eb


233. Digital cash commerce on the Net
Author: / Peter Wayner
Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)
Subject: Electronic funds transfers - Security measures,Internet (Computer network),Computer networks - Security measures,Data encryption (computer science),Electronic funds transfers - Computer programs,Smart cards
Classification :
HG1710
.
W39
1995


234. Digital cash : commerce on the Net
Author: Wayner, Peter
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Electronic funds transfers - Security measures , Internet )Computer network( , Computer networks - Security measures , Data encryption )Computer science( , Electronic funds transfers - Computer programs , Smart cards
Classification :
HG
1710
.
W39
1996


235. Digital forensics and watermarking
Author: Yun Qing Shi, Hyoung-Joong Kim, Fernando Perez-Gonzalez (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I93
2011eb


236. Digital forensics basics :
Author: Nihad A. Hassan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation.,Computer security.,Digital forensic science.,Computer crimes-- Investigation.,Computer security.,Digital forensic science.
Classification :
HV8079
.
C65
.
H377
2019


237. Digital signature: network security practices
Author: Gupta, Kailash N.
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: ، Computer security,، Digital signature,، Data encryption )Computer science(,، Business communications--Security measures
Classification :
QA
76
.
9
.
A25
G96
2005


238. Digital watermarking : First International Workshop, IWDW 2002, Seoul, Korea, November 2002 : revised papers
Author: Fabien Petitcolas, Hyoung Joong Kim )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data encryption )Computer science(,Congresses ، Digital watermarking
Classification :
QA
76
.
L28
Vol
.
2613


239. Digital watermarking and steganography :fundamentals and techniques
Author: Shih, Frank Y.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Digital watermarking,، Data encryption )Computer science(,، Computer security,Security measures ، Multimedia systems,، Intellectual property
Classification :
QA
76
.
9
.
A25
S467
2017


240. Dynamic secrets in communication security
Author: Xiao, Sheng,Sheng Xiao, Weibo Gong, Don Towsley
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Computer security,، Data encryption )Computer science(,، Cryptography
Classification :
QA76
.
9
.
A25

