361. Information Security Technology for Applications
Author: edited by Peeter Laud
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory,Computer science,Data encryption (Computer science),Data protection,Data structures (Computer science),Information Systems,Coding and Information Theory,Computer Science,Data Encryption,Data Structures, Cryptology and Information Theory,Information Systems Applications (incl. Internet),Management of Computing and Information Systems,Systems and Data Security

362. Information Security Theory and Practice
Author: \ Raja Naeem Akram, Sushil Jajodia (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,کامپیوترها, -- Congresses, -- کنگرهها, -- ایمنی اطلاعات,a05,a05,Systems and Data Security,Data Encryption,Ubiquitous computing -- Congresses,سیستم ها و امنیت اطلاعات,رمزگذاری دادهها,محاسبه فراگیر -- کنگره ها
Classification :
QA
76
.
9
.
A25
W5
2015
E-Book
,


363. Information Security and Assurance
Author: edited by Tai-hoon Kim, Hojjat Adeli, Rosslin John Robles, Maricel Balitanas.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory.,Computer network architectures.,Computer networks.,Computer science.,Computer system performance.,Data encryption (Computer science),Data structures (Computer science)

364. Information Security and Cryptology
Author: \ Dongdai Lin, Moti Yung, Jianying Zhou (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer security -- Congresses.,Data Encryption.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها
Classification :
QA
76
.
9
.
I5
2015
E-Book
,


365. Information Security and Cryptology -- ICISC 2014
Author: \ Jooyoung Lee , Jongsung Kim (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer science,کامپیوتر,a05,a05,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses,امنیت کامپیوتر -- کنگره ها ,رمزگذاری دادهها -- کنگره ها
Classification :
QA
76
.
9
.
I5
2015
E-Book
,


366. Information Security and Privacy
Author: \ Ernest Foo , Douglas Stebila (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.,Computer networks -- Security measures -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها,رمزگذاری دادهها -- کنگرهها,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
QA
76
.
9
.
A25I5
2015
E-Book
,


367. Information Systems Security :
Author: Sushil Jajodia, Chandan Mazumdar (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
I25
2011


368. Information Systems Security
Author: edited by Somesh Jha, Anish Mathuria.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Biometry,Computer networks.,Computer science.,Data encryption (Computer science),Data protection.,Information storage and retrieval systems.,Information Systems.

369. Information Systems Security and privacy.
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.,Data protection -- Congresses.,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,رمزگذاری دادهها -- کنگرهها ,حفاظت اطلاعات -- کنگرهها
Classification :
TK
5105
.
59
.
I532
2015
E-Book
,


370. Information Theoretic Security
Author: \ Anja Lehmann, Stefan Wolf (eds.).
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer security -- Congresses.,Data protection -- Congresses.,رمزگذاری دادهها -- کنگرهها,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,حفاظت اطلاعات -- کنگرهها
Classification :
QA
76
.
9
.
I5
2015
E-Book
,


371. Information and Communications Security
Author: \ Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks -- Security measures -- Congresses,Data protection -- Congresses,Data encryption (Computer science) -- Congresses,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها,حفاظت اطلاعات -- کنگرهها,رمزگذاری دادهها -- کنگرهها
Classification :
TK
5105
.
59
.
I25
I58
2016
E-Book
,


372. Information and Communications Security
Author: \ [Edited by] Lucas C. K. Hui...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Data protection -- Congresses.,Data encryption (Computer science) -- Congresses.,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,حفاظت اطلاعات -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
TK
5105
.
59
.
I5
2015
E-Book
,


373. Information and communications security
Author: Tat Wing Chim, Tsz Hon Yuen (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.

374. Information and communications security :
Author: Sihan Qing [and others] (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011


375. Information and communications security :
Author: David Naccache [and 7 more] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Telecommunication systems-- Security measures, Congresses.,Algorithms & data structures.,Computer networking & communications.,Computer security.,Computers-- Hardware-- General.,Computers-- Information Theory.,Computers-- Online Services-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Information technology: general issues.,Software Engineering.,Telecommunication systems-- Security measures.
Classification :
QA76
.
9
.
A25


376. Information hiding :
Author: Matthias Kirchner ... (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computerforensik.,Elektronische Unterschrift.,Elektronisches Wasserzeichen.
Classification :
QA76
.
9
.
A25
M388
2013


377. Information hiding :
Author: Tomáš Filler [and others] (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
I3
2011


378. Information hiding
Author: / Stefan Katzenbeisser, Fabien Petitcolas
Library: Library of College of Science University of Tehran (Tehran)
Subject: Data encryption (Computer science),Digital watermarking,Data encryption (Computer science),Digital watermarking
Classification :
QA
76
.
9
.
A25
K35
2016


379. Information hiding and application
Author: / Jeng-Shyang Pan, Hsiang-Chen Huang, and Lakhmi C. Jain (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Digital watermarking.,Data protection.,Data encryption (Computer science),Genetic programming (Computer science)
Classification :
QA
,
76
.
9
,.
A25
,
I546
,
2009


380. Information security
Author: Dieter Gollmann, Felix C. Freiling (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
I83
2012eb

