361. Transactions on data hiding and multimedia security VI /
Author: Yun Q. Shi [and others] (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Data protection,Multimedia systems-- Security measures,Algorithm Analysis and Problem Complexity,Computer Science,Computers and Society,Data Encryption,Pattern Recognition,Systems and Data Security
Classification :
QA76
.
9
.
A25
T73
2011


362. Transparent user authentication
Author: / Nathan Clarke
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures,Computers, Access control,Data protection
Classification :
E-BOOK

363. Transparent user authentication biometrics, RFID and behavioural profiling
Author: / Nathan Clarke
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer networks, Security measures,Computers, Access control,Data protection
Classification :
TK5105
.
59
.
C575
2011


364. Tribe of Hackers :
Author: Marcus J. Carey & Jennifer Jin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,Computers.,Data protection.,Risk management.,Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Security-- Cryptography.,Computers.,Data protection.,Risk management.
Classification :
HF5548
.
37
C37
2019eb


365. Tribe of hackers :
Author: Marcus J, Carey and Jennifer Jin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,Data protection.,Risk management.,Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,Data protection.,Risk management.

366. Trust management VII :
Author: Carmen Fernández-Gago [and others] (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
C376
2013


367. Trusted computing and information security :
Author: Huanguo Zhang, Bo Zhao, Fei Yan (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25


368. Trusted systems :
Author: edited by Liqun Chen, Moti Yung
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011


369. Trustworthy Internet
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Congresses. ; Internet ; Security measures ; Congresses. ; Wireless communication systems ; Security measures ; Congresses. ; Data protection ; Congresses. ; Privacy, Right of ; Congresses. ; Digital communications

370. Trustworthy Internet
Author: / Nicola Blefari-Melazzi, Giuseppe Bianchi, Luca Salgarelli, editors
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Congresses,Internet--Security measures--Congresses,Wireless communication systems--Security measures--Congresses,Data protection--Congresses,Privacy, Right of--Congresses,Digital communications--Congresses
Classification :
TK
,
5105
.
59
,.
T79
,
2010


371. Understanding cyber risk :
Author: Thomas R. Koehler.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Business intelligence.,Computer crimes-- Prevention.,Data protection.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Business enterprises-- Computer networks-- Security measures.,Business intelligence.,Computer crimes-- Prevention.,Data protection.
Classification :
HF5548
.
37
.
K64
2018


374. counter hack
Author:
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Computer networks - Security measures,Data protection
Classification :
TK
5105
.
59
.
S57
2002


375. 0203931254 (ebook)
Author: edited by Nancy Snow, Philip M. Taylor.
Library: Library of Islamic Parliament (Tehran)
Subject:

376. international handbook of computer security
Author: Shim, Jae K
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer security- Handbooks, manuals, etc ► Data protection- Handbooks, manuals, etc ► Computer networks- Security measures- Handbooks, Manuals, etc
Classification :
005
S556i


377. security and global information assurance :-Cyber
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Information technology ; Security measures ; Computer security ; Management ; Cyberspace ; Security measures ; Data protection ; Computer networks ; Security measures ;

378. t. 1. Armi� a︡nskai� a︡ rukopisnai� a︡ kniga VI-XIV vekov20
Author: [sostaviteli i avtory teksta V.O. Kazari� a︡n, S.S. Manuki� a︡n].
Library: Library of Islamic Parliament (Tehran)
Subject:

380. xiv, 237 p. :
Author: Chris Johnson & Jolyon Leslie.
Library: Library of Islamic Parliament (Tehran)
Subject:
