1401. Towards sustainable society on ubiquitous networks
Author: edited by Makoto Oya, Ryuya Uda, Chizuko Yasunobu
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks, Congresses,Computer science, Congresses,Data protection, Congresses

1402. Towards the harnessing of chaos. a collection of contributions based on lectures presented at the seventh Toyota Conference, Mikkabi, Shizuoka, Japan, October 31 to November 3, 1993
Author: Edited by Masaya Yamaguti
Library: CENTRAL LIBRARY UNIVERCITY OF HORMOZGAN (Hormozgan)
Subject: ، Chaotic behavior in systems, Congresses,، Neural networks )Computer science(, Congresses,، Computational complexity, Congresses
Classification :
Q
172
.
5
.
T69
1993


1403. Transactions on large-scale data- and knowledge-centered systems XXXVII /
Author: edited by Abdelkader Hameurlain, Roland Wagner.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data mining, Congresses.,Database management, Congresses.,Artificial intelligence.,Artificial intelligence.,Computer networks.,Computer science.,Computer security.,Computer security.,Computers-- Database Management-- Data Mining.,Computers-- Hardware-- Network Hardware.,Computers-- Intelligence (AI) & Semantics.,Computers-- Operating Systems-- General.,Computers-- Security-- General.,Computers-- Software Development & Engineering-- General.,Data mining.,Data mining.,Network hardware.,Operating systems (Computers),Operating systems.,Software engineering.,Software Engineering.
Classification :
QA76
.
9
.
A25


1404. Transactions on large-scale data- and knowledge-centered systems XXXVIII :
Author: Abdelkader Hameurlain, Roland Wagner, Sven Hartmann, Hui Ma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data mining, Congresses.,Database management, Congresses.,Computer networks-- Security measures.,Computer security.,Data mining.,Database management.
Classification :
QA76
.
9
.
A25


1405. Trends and advances in information systems and technologies.
Author: Álvaro Rocha, Hojjat Adeli, Luís Paulo Reis, Sandra Costanzo, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks, Congresses.,Computer science, Congresses.,Information technology, Congresses.,Artificial intelligence.,Computer networks.,Computer science.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Information technology.
Classification :
T58
.
5


1406. Trends in enterprise application architectur
Author: / Dirk Draheim, Gerald Weber (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Business enterprises--Computer networks--Congresses,Application software--Congresses

1407. Trends in enterprise application architecture
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Business enterprises ; Computer networks ; Congresses. ; Application software ; Congresses. ; Computer architecture ; Congresses. ;

1408. Trust, Privacy and Security in Digital Business
Author: \ Simone Fischer-Hübner, Costas Lambrinoudakis, Javier Lopez (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Business enterprises -- Computer networks -- Security measures -- Congresses.,Computer security -- Management -- Congresses.,شرکتهای اقتصادی -- شبکههای کامپیوتری -- تدابیر ایمنی -- کنگره ها, کامپیوترها -- ایمنی اطلاعات -- مدیریت -- کنگره ها
Classification :
QA76
.
9
.
A25
T7
2015
E-Book
,


1409. Trust and trustworthy computing
Author: Stefan Katzenbeisser ... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
T78
2012eb


1410. Trust management VII :
Author: Carmen Fernández-Gago [and others] (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
C376
2013


1411. Trust, privacy and security in digital business
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Business enterprises ; Computer networks ; Security measures ; Congresses. ; Data transmission systems ; Security measures ; Congresses. ;

1412. Trusted computing and information security :
Author: Huanguo Zhang, Bo Zhao, Fei Yan (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25


1413. Trusted systems :
Author: edited by Liqun Chen, Moti Yung
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011


1414. Trusted systems
Author: Liqun Chen, Moti Yung, Liehuang Zhu (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011eb


1415. Trusted systems
Author: Chris J. Mitchell, Allan Tomlinson (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2012eb


1416. Trustworthy Global Computing
Author: \ Pierre Ganty, Michele Loreti (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,Computer networks,کامپیوترها,شبکههای کامپیوتری, -- Congresses, -- Congresses, -- کنگرهها, -- کنگرهها, -- Security measures, -- ایمنی اطلاعات, -- اقدامات تامینی,a03,a05,a03,a05
Classification :
QA
76
.
9
.
A25
T34
2016
E-Book
,


1417. Trustworthy Internet
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Congresses. ; Internet ; Security measures ; Congresses. ; Wireless communication systems ; Security measures ; Congresses. ; Data protection ; Congresses. ; Privacy, Right of ; Congresses. ; Digital communications

1418. Trustworthy Internet
Author: / Nicola Blefari-Melazzi, Giuseppe Bianchi, Luca Salgarelli, editors
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Congresses,Internet--Security measures--Congresses,Wireless communication systems--Security measures--Congresses,Data protection--Congresses,Privacy, Right of--Congresses,Digital communications--Congresses
Classification :
TK
,
5105
.
59
,.
T79
,
2010


1419. Trustworthy Internet
Author: \ Nicola Blefari-Melazzi, Giuseppe Bianchi, Luca Salgarelli, editors.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks-- Security measures, Congresses.,Internet-- Security measures, Congresses.,Wireless communication systems-- Security measures, Congresses.,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,اینترنت -- تدابیر ایمنی -- کنگره ها,ارتباطات بیسیم -- تدابیر ایمنی -- کنگره ها
Classification :
TK
5105
.
59
.
T7
2010
E-Book
,


1420. Trustworthy computing and services
Author: Yuyu Yuan, Xu Wu, Yueming Lu (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I83
2012

