341. Image and video encryption
Author: / by Andreas Uhl, Andreas Pommer
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Image processing--Security measures,Data encryption (Computer science)
Classification :
TA
,
1637
,.
U72
,
2005


342. Image and video encryption :
Author: / by Andreas Uhl, Andreas Pommer
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Image processing , Security measures,Data encryption (Computer science)
Classification :
E-BOOK

343. Image and video encrytion
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Image processing ; Security measures. ; Data encryption (Computer science) ; Telecommunication ; Security measures. ; Copyright and electronic data processing. ;

344. Implementing SSH
Author: Himanshu Dwivedi
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: UNIX Shells,Computer networks- Security measures,Data encryption (Computer science)
Classification :
QA
,
76
.
76
,.
O63
,
D895
,
2004


345. Implementing SSH
Author: / Himanshu Dwivedi
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: UNIX Shells,Computer networks- Security measures,Data encryption (Computer science)
Classification :
QA76
.
76
.
O63
,
D895
2004


346. Implementing SSL/TLS using cryptography and PKI /
Author: Joshua Davies.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Data encryption (Computer science)
Classification :
TK5105
.
59
.
D39
2011


347. Improving Advanced Encryption Standard Performance with Residue Number System
Author: Odunayo, Tajudeen Kafayat
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science

348. Improving Advanced Encryption Standard Performance with Residue Number System
Author: Odunayo, Tajudeen Kafayat
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science

349. Improving Data Security with Honey Encryption and Residue Number System
Author: Afoluwaso Giwa, Tawakalitu
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science

350. Improving Data Security with Honey Encryption and Residue Number System
Author: Afoluwaso Giwa, Tawakalitu
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science

351. 20090601 ,Includes bibliographical references and index. 0
Author: 20090602 ,20090602 0
Library: Library of Islamic Parliament (Tehran)
Subject:

352. Information Assuranc
Author: / by Andrew Blyth, Gerald L. Kovacich
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer science.,Data encryption (Computer science).,Information systems.,Computers--Law and legislation,Information Systems.

353. Information Hiding
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses,Data encryption (Computer science) -- Congresses,Data protection -- Congresses,کامپیوترها -- ایمنی اطلاعات -- کنگرهها,رمزگذاری دادهها -- کنگرهها,حفاظت دادهها -- کنگرهها
Classification :
E-Book
,

354. Information Security
Author: \ Yvo Desmedt (Ed.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses,Data encryption (Computer science) -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
QA
76
.
9
.
I5
2015
E-Book
,


355. Information Security
Author: \ Javier Lopez , Chris J. Mitchell (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer science,کامپیوتر,a05,a05,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
QA
76
.
9
.
I5
2015
E-Book
,


356. Information Security
Author: edited by Xuejia Lai, Jianying Zhou, Hui Li.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Computer software.,Data encryption (Computer science),Data protection.,Software engineering.

357. Information Security Management & Small Systems Security :
Author: edited by Jan H.P. Eloff, Les Labuschagne, Rossouw Solms, Jan Verschuren.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Data structures (Computer science),Information storage and retrieval systems.
Classification :
QA76
.
9
.
M3
E358
1999


358. Information Security Practice and Experience
Author: edited by Mark D. Ryan, Ben Smyth, Guilin Wang
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks,Computer science,Data encryption (Computer science),Data protection,Information storage and retrieval systems,Information Systems,Computer Communication Networks,Computer Science,Computers and Society,Data Encryption,Information Storage and Retrieval,Management of Computing and Information Systems,Systems and Data Security

359. Information Security Practice and Experience
Author: \ Javier Lopez , Yongdong Wu (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses.,Computer networks -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
QA
76
.
9
.
A25I5
2015
E-Book
,

