1. A survey of data leakage detection and prevention solutions
Author: Asaf Shabtai, Yuval Elovici, Lior Rokach
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data protection,Database management,Database security
Classification :
QA76
.
9
.
A25
S46
2012eb


2. Advances in cryptology-- ASIACRYPT 2011 :
Author: edited by Dong Hoon Lee, Xiaoyun Wang
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
.
I58
2011


3. Contemporary computing :
Author: Sanjay Ranka [and others] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science, Congresses.,Soft computing, Congresses.,Computer science.,Computer science.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Informatique.,Soft computing.,Soft computing.
Classification :
QA75
.
5
.
I584
2009


4. Data security and security data
Author: Lachlan M. MacKinnon (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data protection, Congresses,Database management, Congresses,Database security, Congresses
Classification :
QA76
.
9
.
D3
B75
2010eb


5. Electric, electronic and control engineering
Author: editors, Fun Shao, Wise Shu and Tracy Tian.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Automatic control -- Congresses.,Electrical engineering -- Congresses.,Electronics -- Congresses.
Classification :
TK5
.
E358
9999


6. Emerging security algorithms and techniques /
Author: editors, Khaleel Ahmad, M.N. Doja, Nur Izura Udzir, Manu Pratap Singh.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Cryptography.,Data encryption (Computer science),Computer security.,COMPUTERS-- Computer Graphics-- Game Programming & Design.,COMPUTERS-- General.,COMPUTERS-- Security-- Cryptography.,COMPUTERS-- Security-- General.,Cryptography.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
E466
2019eb


7. Information security in research and business :
Author: edited by Louise Yngström, Jan Carlsen.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business -- Data processing -- Security measures -- Congresses.,Business -- Data processing -- Security measures.,Computer security -- Congresses.
Classification :
QA76
.
9
.
A25
E358
1997


8. Information storage and management :
Author: edited by G. Somasundaram, Alok Shrivastava.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer storage devices.,Data protection.,Information storage and retrieval systems.,Computer storage devices.,COMPUTERS-- Database Management-- General.,COMPUTERS-- Desktop Applications-- Databases.,COMPUTERS-- System Administration-- Storage & Retrieval.,Data protection.,Information storage and retrieval systems.,Information storage and retrieval systems.,Information technology.
Classification :
QA76
.
9
.
D3
I54
2009eb


9. Information systems methodology :
Author: ed. by G. Bracchi ...
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Datenverarbeitung.,Informationssystem,Informationssystem.
Classification :
T58
.
6
E339
1978


10. Intelligence computation and evolutionary computation :
Author: Zhenyu Du (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computational intelligence -- Congresses.,Evolutionary computation -- Congresses.,Intelligence informatique -- Congrès.

11. Introduction to e-commerce /
Author: by Zheng Qin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Electronic commerce, Case studies.,Electronic commerce.,BUSINESS & ECONOMICS-- E-Commerce-- Auctions & Small Business.,BUSINESS & ECONOMICS-- E-Commerce-- Internet Marketing.,BUSINESS & ECONOMICS-- Mail Order.,BUSINESS & ECONOMICS-- Marketing-- Telemarketing.,COMPUTERS-- Electronic Commerce.,Electronic commerce.,Informatique.
Classification :
HF5548
.
32


12. Metasploit Penetration Testing Cookbook :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Computers-- Access control.,Data protection.,Information technology-- Security measures.,Computer networking & communications.,Computer networks-- Security measures.,Computer security-- Management.,Computer security.,Computers-- Access control.,Computers-- Networking-- Security.,Computers-- Security-- General.,Computers-- System Administration-- General.,Data protection.,Information technology-- Security measures.,Network security.
Classification :
QA76
.
9
.
A25
.
T459
2018eb


13. Microsoft System center configuration manager 2007 administrator's companion
Author: Steven D. Kaczmarek with the Microsoft System center configuration manager team.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Management.,COMPUTERS -- Data Transmission Systems -- General.,Microsoft System center configuration manager.
Classification :
TK5105
.
5
S748
2008


14. Migrating to MariaDB :
Author: William Wood.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: MariaDB.,MariaDB.,Database management-- Computer programs.,Open source software.,Database management-- Computer programs.,Open source software.
Classification :
QA76
.
9
.
D3
W66
2016


15. Oracle high availability, disaster recovery, and cloud services :
Author: Y.V. Ravi Kumar, Nassyam Basha, Krishna Kumar K.M., Bal Mukund Sharma and Konstantin Kerekovski.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Oracle (Computer file),Oracle (Computer file),Cloud computing.,Relational databases.,Cloud computing.,COMPUTERS-- Databases-- General.,Relational databases.
Classification :
QA76
.
9
.
D3


16. Policy-based autonomic data governance /
Author: Seraphin Calo, Elisa Bertino, Dinesh Verma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Autonomic computing.,Computer networks-- Security measures.,Computer security.,Autonomic computing.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25
P65
2019


17. Privacy-preserving data mining :
Author: edited by Charu C. Aggarwal and Philip S. Yu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data mining.,Data protection.,Computer security.,Computer security.,COMPUTERS-- Database Management-- Data Mining.,Data mining.,Data mining.,Data protection.,Data protection.,Informatique.
Classification :
QA76
.
9
.
D343
P75
2008eb


18. Proceedings of The IFIP TC 11 23rd International Information Security Conference
Author: / edited by Sushil Jajodia, Pierangela Samarati, Stelvio Cimato.
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer networks -- Security measures -- Congresses, Computers -- Access control -- Congresses, Computer security -- Congresses,Computer networks -- Access control -- Congresses,Data protection -- Congresses
Classification :
QA
76
.
9
.
A25I461
2008


19. Proceedings of The Ifip Tc 11 23rd International Information Security Conference :
Author: edited by Sushil Jajodia, Pierangela Samarati, Stelvio Cimato, Sushil Jajodia, Pierangela Samarati, Stelvio Cimato.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Computers -- Law and legislation.,Data protection.

20. Quality of protection :
Author: edited by Dieter Gollmann, Fabio Massacci, Artsiom Yautsiukhin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Quality control, Congresses.,Computer networks-- Standards, Congresses.,Computer security-- Quality control, Congresses.,Computer security-- Standards, Congresses.,Computer networks-- Quality control.,Computer networks-- Quality control.,Computer networks-- Standards.,Computer networks-- Standards.,Computer security-- Quality control.,Computer security-- Standards.,Computer security-- Standards.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Informatique.
Classification :
QA76
.
9
.
A25
Q35
2006eb

