121. Communication networks for smart grids :
Author: Kenneth C. Budka, Jayant G. Deshpande, Marina Thottan
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Smart power grids.,Computer Communication Networks.,Computer Science.,Data Encryption.,Power Electronics, Electrical Machines and Networks.
Classification :
TK3105


122. Communication networks for smart grids
Author: / Kenneth C. Budka, Jayant G. Deshpande, Marina Thottan
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Smart power grids,Computer networks,Computer Science,Computer Communication Networks,Data Encryption,Power Electronics, Electrical Machines and Networks
Classification :
E-BOOK

123. Communications and multimedia security :
Author: Bart De Decker [and others] (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Telecommunication systems-- Security measures, Congresses
Classification :
TK5105
.
59
.
I35
2011


124. Compression of biomedical images and signals
Author: / edited by Amine Nait-Ali, Christine Cavaro-Menard
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Diagnosis -- Data processing,Data compression (Computer science),Medical informatics,Data Compression,Diagnostic imaging.
Classification :
RC
78
.
7
.
D35C63813
2008


125. Computer security :
Author: Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25


126. Computer security - ESORICS 2012
Author: Sara Foresti, Moti Yung, Fabio Martinelli (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
E98
2012eb


127. Computer security and cryptography
Author: Alan G. Konheim
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Ciphers,Computer security,Cryptography,Cryptography-- History,Data encryption (Computer science)
Classification :
Z103
.
A2
K638
2007


128. Concurent zero-knowledge
Author: / Alon Rosen,Rosen
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Data encryption (Computer science),Zero - Knowledge proofs,Cryptography
Classification :
QA
76
.
9
.
A25R657


129. Concurrent zero-knowledge
Author: Rosen, Alon
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Cryptography,، Data encryption )Computer science(,، Zero-knowledge proofs
Classification :
QA
76
.
9
.
A25
.
R653
2006


130. Concurrent zero-knowledge
Author: / Alon Rosen; with additional background by Oded Goldreich.
Library: Library of College of Science University of Tehran (Tehran)
Subject: Data encryption (Computer science),Cryptography,a04,a07,Zero-knowledge proofs.
Classification :
QA76
.
9
.
A25
R657
2006


131. Constructive Side-Channel Analysis and Secure Design
Author: \ Stefan Mangard , Axel Y. Poschmann (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer security -- Congresses.,Data Encryption.,رمزگذاری دادهها -- کنگرهها ,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,رمزگذاری دادهها
Classification :
QA
76
.
9
.
C6
2015
E-Book
,


132. Constructive side-channel analysis and secure design
Author: edited by Werner Schindler, Sorin A. Huss
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
C675
2012eb


133. Constructive side-channel analysis and secure design :
Author: Ilia Polian, Marc Stöttinger (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer security.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25


134. Constructive side-channel analysis and secure design :
Author: edited by Junfeng Fan, Benedikt Gierlichs.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Algorithms & data structures.,Coding theory & cryptology.,Computer security.,Computer security.,Computers-- Expert Systems.,Computers-- Information Technology.,Computers-- Information Theory.,Computers-- Security-- General.,Computers-- Systems Architecture-- General.,Data encryption (Computer science),Expert systems-- knowledge-based systems.,Systems analysis & design.
Classification :
QA76
.
9
.
A25


135. Cracking codes with Python :
Author: by Al Sweigart.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data encryption (Computer science),Hacking.,Python (Computer program language),Computer security.,COMPUTERS-- Programming Languages-- Python.,COMPUTERS-- Security-- Cryptography.,Data encryption (Computer science),Hacking.,Python (Computer program language)
Classification :
QA76
.
9
.
A25
S9317
2018


136. Crafting the InfoSec playbook /
Author: Jeff Bollinger, Brandon Enright & Matthew Valites
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25


137. Critical information infrastructure security :
Author: Sandro Bologna, Bernhard Hämmerli, Dimitris Gritzalis, Stephen Wolthusen (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
C75
2011


138. Critical information infrastructures security :
Author: Eric Luiijf, Inga Žutautaitė, Bernhard M. Hämmerli (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
C75
2018eb


139. Critical information infrastructures security :
Author: Christos Xenakis, Stephen Wolthusen (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
C75
2010


140. Critical infrastructure protection
Author: / Javier Lopez, Roberto Setola, Stephen D. Wolthusen (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks--Security measures,Information networks--Security measures,Data encryption (Computer science),Data structures (Computer science),Information technology--Security measures
Classification :
TK5105
.
59
.
C725
2012

