441. Mobile authentication
Author: Markus Jakobsson
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Data encryption (Computer science),Data protection
Classification :
QA76
.
9
.
A25
J35
2013


442. Modelling cyber security :
Author: edited by Umberto Gori.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Cryptography, Congresses.,Data encryption (Computer science), Congresses.,Computer security.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Cryptography.,Data encryption (Computer science)
Classification :
QA76
.
9
.
D314
M64
2009


443. Modern Big Data Processing with Hadoop :
Author: V Naresh Kumar, Prashant Shindgikar.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Apache Hadoop.,Apache Hadoop.,Electronic data processing-- Distributed processing.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,Computers-- Data Modeling & Design.,Computers-- Data Processing.,Computers-- Database Management-- Data Mining.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Data capture & analysis.,Data mining.,Database design & theory.,Electronic data processing-- Distributed processing.,Information architecture.
Classification :
QA76
.
9
.
D5
.
K863
2018eb


444. Modern Cryptography
Author: \ Chuck Easttom
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science),Information networks -- Security measures -- Mathematics.,رمزگذاری دادهها,شبکههای اطلاعرسانی -- تدابیر ایمنی -- ریاضیات
Classification :
E-Book
,

445. Modern cryptanalysis : techniques for advanced code breaking
Author: Christopher Swenson
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Data encryption )Computer science(,، Cryptography
Classification :
QA
76
.
9
.
A25S93


446. Modern cryptography :
Author: Chuck Easttom
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Mathematics,Computer security-- Mathematics,Data encryption (Computer science),Information networks-- Security measures-- Mathematics
Classification :
TK5102
.
94


447. Multimedia content encryption
Author: / Shiguo Lian
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Multimedia systems--Security measures,Data encryption (Computer science),Data protection.

448. Multimedia content encryption: techniques and applications
Author: / Shiguo Lian
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Multimedia systems,Data encryption (Computer science),Data protection,-- Security measures
Classification :
005
.
82
L693M
2009


449. Multimedia forensics and security /
Author: Chang-Tsun Li [editor]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Data protection,Multimedia systems-- Security measures
Classification :
QA76
.
575
.
M83187
2009


450. Multimedia forensics and security
Author: / Chang-Tsun Li [editor]
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Multimedia systems- Security measures,Data encryption (Computer science),Data protection
Classification :
QA76
.
575
.
M831
2009


451. Multivariate public key cryptosystems
Author: / by Jintai Ding, Jason E. Gower and Dieter S. Schmidt.
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computers -- Access control,Data encryption (Computer science),Computer security,a04,a06,a06
Classification :
QA76
.
9
.
A25
D5635
2006


452. Network and System Security :
Author: edited by Javier Lopez, Xinyi Huang, Ravi Sandhu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Data protection.

453. Network and system security :
Author: Man Ho Au, Siu Ming Yiu, Jin Li, Xiapu Luo, Cong Wang, Aniello Castiglione, Kamil Kluczniak (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Computer security.
Classification :
QA76
.
9
.
A25


454. Network science and cybersecurity /
Author: Robinson E. Pino, editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Internet-- Security measures.
Classification :
TK5105
.
59
.
N48
2014eb


455. Networking explained /
Author: Michael A. Gallo, William M. Hancock.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Computer networks.,COMPUTERS-- Data Transmission Systems-- General.,COMPUTERS-- Networking-- Vendor Specific.
Classification :
TK5105
.
5
.
G35
2002eb


456. Netzwerk- und Datensicherheit :
Author: Martin Kappes.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures.,Computer security.,Data encryption (Computer science)
Classification :
TK5105
.
59
M378
2013


457. New stream cipher designs: the eSTREAM finalists
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، eSTREAM )Project(,، Computer security,، Data encryption )Computer science(,، Stream ciphers,، Coding theory
Classification :
QA
76
.
9
.
A25
.
N486
2008


458. Next generation SSH2 implementation :
Author: Dale Liu, lead author and technical editor ; Max Caceres [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: UNIX Shells.,UNIX Shells.,UNIX Shells.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
L585
2009eb


459. Non-repudiation in electronic commerce
Author: Zhou, Jianying
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Electronic commerce-- Computer network resources,، Business enterprises-- Computer networks-- Security measures,، Data encryption )Computer science(,، Internet-- Security measures
Classification :
HF
5548
.
32
.
Z49
2001


460. Non- repudiation in electronic commerce
Author: Zhou, Jianying
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Electronic commerce- Computer network resources ► Business enterprises- Computer networks- Security measures ► Data encryption (Computer science) ► Internet- Security measures
Classification :
Z44n
