461. Number-theoretic methods in cryptology :
Author: Jerzy Kaczorowski, Josef Pieprzyk, Jacek Pomykała (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography, Congresses.,Monte Carlo method, Congresses.,Algorithms.,Coding theory & cryptology.,Computer science-- Mathematics.,Computer science.,Computers-- Data Processing.,Computers-- Programming-- Algorithms.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Computers.,Data encryption (Computer science),Discrete mathematics.,Information technology: general issues.,Mathematics-- Number Theory.,Number theory.,Number theory.,Numerical analysis.,Software engineering.,Software Engineering.
Classification :
QA76
.
9
.
A25
N88
2017


462. Outsourcing information security
Author: / C. Warren Axelrod
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks, Security measures, United States,Computers, Access control, United States,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
,
A88
2004


463. Outsourcing information security
Author: / C. Warren Axelrod
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures United States,Computers- Access control United States,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
,
A88
2004


464. Outsourcing information security [electronic resource]
Author: / C. Warren Axelrod
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Computer networks--Security measures--United States,Computers--Access control--United States,Data encryption (Computer science)
Classification :
EB
,
QA76
.
9
.
A25A88
2004

466. PKG 2003 :-Public key cryptography
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses ; Computers ; Access control ; Congresses ; Data encryption (Computer science) ; Congresses ; Public key cryptography ; Congresses ;

467. Pairing-based cryptography-- Pairing 2012
Author: Michel Abdalla, Tanja Lange (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2012


468. Passwords :
Author: Brian Lennon.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computers-- Access control-- Passwords.,Cryptography.,Data encryption (Computer science),Electronic surveillance.,Philology.,54.62 machine readable data.,54.62 machine readable data.,Computers-- Access control-- Passwords.,Cryptography.,Data encryption (Computer science),Digital Humanities,Electronic surveillance.,Kryptologie,Passwort,Philologie,Philology.,Textverarbeitung
Classification :
QA76
.
9
.
A25
L485
2018


469. Policies and research in identity management :
Author: Simone Fischer-Hübner, Elisabeth de Leeuw, Chris Mitchell (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Access control -- Congresses.,Computer networks -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
S566
2013


470. Policy-based autonomic data governance /
Author: Seraphin Calo, Elisa Bertino, Dinesh Verma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Autonomic computing.,Computer networks-- Security measures.,Computer security.,Autonomic computing.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25
P65
2019


471. Post-Quantum Cryptography :
Author: Jintai Ding, Rainer Steinwandt (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses.,Quantum computers, Congresses.,Data encryption (Computer science),Quantum computers.
Classification :
QA76
.
9
.
A25


472. Post-quantum cryptography
Author: Philippe Gaborit (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses,Quantum computers, Congresses
Classification :
QA76
.
9
.
A25
.
P63
2013


473. Post-quantum cryptography :
Author: Bo-Yin Yang (edition)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
P73
2011


474. Post-quantum cryptography :
Author: edited by Tanja Lange, Rainer Steinwandt.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science), Congresses.,Quantum computers, Congresses.,Coding theory & cryptology.,Computer architecture & logic design.,Computers-- Information Theory.,Computers-- Logic Design.,Computers-- Security-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Quantum computers.,Software Engineering.
Classification :
QA76
.
9
.
A25


475. Post-quantum cryptography
Author: \ Tsuyoshi Takagi (Ed.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Quantum computers -- Congresses.,Computer security -- Congresses.,رمزگذاری دادهها -- کنگرهها ,کامپیوترهای کوانتومی -- کنگره ها ,کامپیوترها -- ایمنی اطلاعات -- کنگرهها
Classification :
QA
76
.
9
.
P6
2016
E-Book
,


476. Practical Hadoop security /
Author: Bhushan Lakhe
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Apache Hadoop,Data encryption (Computer science),Data protection,Database security
Classification :
QA76
.
9
.
D314
L35
2014


477. Practical Mobile Forensics :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cell phone systems-- Security measures.,Mobile computing-- Security measures.,Computer networking & communications.,Computer security.,Computers-- Hardware-- Handheld Devices.,Computers-- Networking-- General.,Computers-- Security-- General.,Mobile phones: consumer/user guides.,Portable & handheld devices: consumer/user guides.
Classification :
QA76
.
9
.
A25
.
P733
2018


478. Practical cryptography :algorithms and implementations using C++
Author: edited by Saiful Azad, Al-Sakib Khan Pathan
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: ، Data encryption )Computer science(,، Coding theory,Data processing ، Cryptography,، C++ )Computer program language(,، COMPUTERS / Programming Languages / General,، COMPUTERS / Software Development & Engineering / General,، COMPUTERS / Security / Cryptography
Classification :
QA
76
.
9
.
A25
P725


479. Practical cryptography for data internetworks
Author: Stallings, William.
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer networks - Security measures , Data encryption )Computer science( , Coding theory , Computer security
Classification :
TK
5105
.
59
.
S73
1996


480. Practical cryptography in Python :
Author: Seth James Nielson, Christopher K. Monson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography.,Data encryption (Computer science),Python (Computer program language),Cryptography.,Data encryption (Computer science),Python (Computer program language)
Classification :
QA76
.
9
.
A25

