381. Information security
Author: Mike Burmester ... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Computers-- Access control, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I83
2011


382. Information security and assurance
Author: / Samir Kumar Bandyopadhyay, Wael Adi, Tai-hoon Kim, Yang Xiao (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Artificial intelligence--Congresses,Computer networks--Access control--Congresses,Data encryption (Computer sicnece)--Congresses
Classification :
QA
,
76
.
9
,.
I83
,
2010


383. Information security and cryptology :
Author: Xuejia Lai, Moti Yung, Dongdai Lin (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I5525
2010eb


384. Information security and cryptology
Author: Feng Bao ... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
76
.
O63


385. Information security and cryptology
Author: Mirosław Kutyłowski, Moti Yung (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I57
2012


386. Information security and cryptology :
Author: Fuchun Guo, Xinyi Huang, Moti Yung (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer security.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25


387. Information security and cryptology--ICISC 2012
Author: Taekyoung Kwon, Mun-Kyu Lee, Daesung Kwon (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I25
2012


388. Information security and cryptology -- ICISC 2018 :
Author: Kwangsu Lee (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer security.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25


389. Information security and cryptology -- ICISC 2017 :
Author: Howon Kim, Dong-Chan Kim (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Artificial intelligence.,Coding theory & cryptology.,Computer security.,Computer security.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25


390. Information security and cryptology ICISC 2015
Author: \ Soonhak Kwon , Aaram Yun (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
QA
76
.
9
.
I5
2016
E-Book
,


391. Information security and cryptology - ICISC 2011
Author: Howon Kim (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I32
2011eb


392. Information security and privacy :
Author: Julian Jang-Jaccard, Fuchun Guo (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computers-- Access control, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
A279
2019eb


393. Information security and privacy :
Author: Josef Pieprzyk, Jennifer Seberry (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Data encryption (Computer science)

394. Information security and privacy
Author: Willy Susilo, Yi Mu, Jennifer Seberry (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
A279
2012eb


395. Information security and privacy : 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29-July 1, 2015, Proceedings
Author: edited by Ernest Foo, Douglas Stebila
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer science,، Computer software,، Data encryption )Computer science(
Classification :
QA
76
.
9
.
A25A279
2015


396. Information security applications
Author: Souhwan Jung, Moti Yung (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
W577
2011eb


397. Information security applications
Author: Dong Hoon Lee, Moti Yung (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Database security, Congresses
Classification :
QA76
.
9
.
A25
W57
2012eb


398. Information security applications :
Author: Yongwha Chung, Moti Yung (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Computers-- Access control, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
W57
2011


399. Information security practice and experience
Author: Mark D. Ryan, Ben Smyth, Guilin Wang (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I855
2012eb


400. Information systems security and privacy :
Author: edited by Paolo Mori, Steven Furnell, Olivier Camp.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25

