321. Future data and security engineering :
Author: Tran Khanh Dang, Josef Küng, Roland Wagner, Nam Thoai, Makoto Takizawa (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Big data, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Internet of things, Congresses.,Artificial intelligence.,Big data.,Computer security.,Computer security.,Computers-- Database Management-- Data Mining.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Data encryption (Computer science),Data mining.,Information retrieval.,Internet of things.,Network hardware.
Classification :
QA76
.
9
.
A25


322. Future data and security engineering
Author: \ Tran Khanh Dang,... [et al.] (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,Data encryption (Computer science),کامپیوترها,رمزگذاری دادهها, -- Congresses, -- Congresses, -- کنگرهها, -- کنگرهها, -- ایمنی اطلاعات,a03,a05,a03,a05,Data mining -- Congresses,دادهکاوی -- کنگرهه
Classification :
QA
76
.
9
.
A25
F3
2015
E-Book
,


323. Global security, Safety and Sustainability
Author: \ [Edited by] Hamid Jahankhani...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses.,Internet -- Security measures -- Congresses,Data encryption (Computer science) -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,اینترنت -- تدابیر ایمنی -- کنگره ها ,رمزگذاری دادهها -- کنگرهها
Classification :
QA
76
.
9
.
G55
2015
E-Book
,


324. Hacking point of sale
Author: Slava Gomzin
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures,Data encryption (Computer science),Electronic funds transfers-- Security measures,Point-of-sale systems
Classification :
HD30
.
38
.
G66
2014


325. Hadoop security /
Author: Ben Spivey & Joey Echeverria
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Data protection,Database security
Classification :
QA76
.
9
.
D5


326. Handbook of computer networks and cyber security
Author: Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Computer networks.,Computer security.
Classification :
TK5105
.
5


327. Handbook of financial cryptography and security
Author: edited by Burton Rosenberg
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Security measures ، Electronic funds transfers,Security measures ، Electronic commerce,، Computer networks -- Security measures,Security measures ، Internet,، Data encryption )Computer science(
Classification :
HG
1710
.
H263


328. Handbook of information and communication security
Author: / Peter Stavroulakis, Mark Stamp, editors
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security,Data encryption (Computer science),Computer Science, IT
Classification :
QA76
.
9
.
A25H355
2010


329. Handbook of information and communication security
پدیدآورنده : Peter Stavroulakis, Mark Stamp, editors
موضوع : ، Computer security,، Data encryption )Computer science(
۲ نسخه از این کتاب در ۲ کتابخانه موجود است.
330. Handbook of information and communication security
Author: Peter Stavroulakis, Mark Stamp, editors
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,، Data encryption )Computer science(
Classification :
QA
76
.
9
.
A25
H355
2010


331. Handbook of multimedia information security :
Author: editor, Amit Kumar Singh and Anand Mohan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Multimedia systems.,Computer security.,Multimedia systems.
Classification :
QA76
.
575


332. Handbook of research on modern cryptographic solutions for computer and cyber security
Author: Brij Gupta, Dharma P. Agrawal, Shingo Yamaguchi
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Handbooks, manuals, etc. ، Data encryption )Computer science(,Handbooks, manuals, etc. ، Cyberterrorism,Prevention -- Handbooks, manuals, etc. ، Cyberterrorism,Government policy -- Handbooks, manuals, etc. ، Computer security
Classification :
QA
76
.
9
.
A25H27


333. Hardware security :
Author: Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Computers-- Circuits-- Design and construction,Data encryption (Computer science),Integrated circuits-- Design and construction
Classification :
QA76
.
9
.
A25
M85
2015


334. Hashing in computer science
Author: / Alan G. Konheim
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Hashing (Computer science),Cryptography,Data encryption (Computer science),Computer security
Classification :
QA76
.
9
.
H36K65
]
2010


335. Hashing in computer science :
Author: Alan G. Konheim
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Cryptography,Data encryption (Computer science),Hashing (Computer science)
Classification :
QA76
.
9
.
H36
K65
2010


336. How to cheat at securing Linux /
Author: Mohan Krishnamurthy [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Linux.,Linux.,Linux.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
TK5105
.
59
.
H683
2008eb


337. Human Aspects of Information Security, Privacy, and Trust.
Author: \ Theo Tryfonas , Ioannis Askoxylakis (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
QA76
.
9
.
H8
2015
E-Book
,


338. INetSec 2009 - Open Research Problems in Network Security :
Author: edited by Jan Camenisch, Dogan Kesdogan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Data encryption (Computer science),Data protection.

339. IOS penetration testing :
Author: Kunal Relan
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Application software.,Computer security.,Apple and iOS.,Computer Science.,Data Encryption.,Software Engineering.,Systems and Data Security.
Classification :
QA76
.
9
.
A25


340. Image and video encryption :
Author: by Andreas Uhl, Andreas Pommer
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Image processing-- Security measures
Classification :
TA1637
.
U72
2005

