141. Innovative security solutions for information technology and communications :
Author: Jean-Louis Lanet, Cristian Toma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Information technology-- Security measures, Congresses.,Computer networks-- Security measures.,Computer security.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25


142. Intelligent, secure, and dependable systems in distributed and cloud environments :
Author: Issa Traore, Isaac Woungang, Sherif Saad Ahmed, Yasir Malik (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures, Congresses.,Computer networks-- Security measures, Congresses.,Artificial intelligence.,Coding theory & cryptology.,Computer networks-- Security measures.,Computer security.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Information retrieval.,Network hardware.
Classification :
TK5105
.
59


143. Internet security for business
Author:
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Business enterprises- Computer networks- Security measures ► Internet (Computer network)- Security measures ► World Wide Web (Information retrieval system)- Security measures ► Electronic funds transfers- Security measures ► Data encryption (Computer science)
Classification :
I61

144. Introduction to certificateless cryptography /
Author: Hu Xiong, Zhen Qin, Athanasios V. Vasilakos
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Data encryption (Computer science),Identification,Public key cryptography,Public key infrastructure (Computer security)
Classification :
QA76
.
9
.
A25
X75
2017


145. Introduction to computer and network security :
Author: Richard R. Brooks, Clemson University, South Carolina, USA
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Data encryption (Computer science),Data protection
Classification :
QA76
.
9
.
A25
B7745
2014


146. Introduction to Cryptography
Author: Hans Delfs and Helmut Knebl
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Data encryption (Computer science),Wireless communication systems -- Security measures,Computer networks -- Security measures
Classification :
QA
،
76
.
9
،.
D34
,
I721
،
2007


147. Make a shield from wisdom :
Author: 20090507 0
Library: Library of Islamic Parliament (Tehran)
Subject:

148. Malicious attack propagation and source identification /
Author: Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, Wanlei Zhou.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Communications engineering-- telecommunications.,Computer networks-- Security measures.,Computer security.,Computer security.,COMPUTERS-- Security-- General.,Data encryption (Computer science),Network hardware.
Classification :
QA76
.
9
.
A25


149. Modern Cryptography
Author: \ Chuck Easttom
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science),Information networks -- Security measures -- Mathematics.,رمزگذاری دادهها,شبکههای اطلاعرسانی -- تدابیر ایمنی -- ریاضیات
Classification :
E-Book
,

150. Modern cryptography :
Author: Chuck Easttom
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Mathematics,Computer security-- Mathematics,Data encryption (Computer science),Information networks-- Security measures-- Mathematics
Classification :
TK5102
.
94


151. Network science and cybersecurity /
Author: Robinson E. Pino, editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Internet-- Security measures.
Classification :
TK5105
.
59
.
N48
2014eb


152. Netzwerk- und Datensicherheit :
Author: Martin Kappes.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures.,Computer security.,Data encryption (Computer science)
Classification :
TK5105
.
59
M378
2013


153. Next generation SSH2 implementation :
Author: Dale Liu, lead author and technical editor ; Max Caceres [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: UNIX Shells.,UNIX Shells.,UNIX Shells.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
L585
2009eb


154. Non-repudiation in electronic commerce
Author: Zhou, Jianying
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Electronic commerce-- Computer network resources,، Business enterprises-- Computer networks-- Security measures,، Data encryption )Computer science(,، Internet-- Security measures
Classification :
HF
5548
.
32
.
Z49
2001


155. Non- repudiation in electronic commerce
Author: Zhou, Jianying
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Electronic commerce- Computer network resources ► Business enterprises- Computer networks- Security measures ► Data encryption (Computer science) ► Internet- Security measures
Classification :
Z44n

156. Outsourcing information security
Author: / C. Warren Axelrod
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks, Security measures, United States,Computers, Access control, United States,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
,
A88
2004


157. Outsourcing information security
Author: / C. Warren Axelrod
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures United States,Computers- Access control United States,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
,
A88
2004


158. Outsourcing information security [electronic resource]
Author: / C. Warren Axelrod
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Computer networks--Security measures--United States,Computers--Access control--United States,Data encryption (Computer science)
Classification :
EB
,
QA76
.
9
.
A25A88
2004

160. Policies and research in identity management :
Author: Simone Fischer-Hübner, Elisabeth de Leeuw, Chris Mitchell (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Access control -- Congresses.,Computer networks -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
S566
2013

