101. Information and Communications Security
Author: \ Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks -- Security measures -- Congresses,Data protection -- Congresses,Data encryption (Computer science) -- Congresses,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها,حفاظت اطلاعات -- کنگرهها,رمزگذاری دادهها -- کنگرهها
Classification :
TK
5105
.
59
.
I25
I58
2016
E-Book
,


102. Information and Communications Security
Author: \ [Edited by] Lucas C. K. Hui...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Data protection -- Congresses.,Data encryption (Computer science) -- Congresses.,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,حفاظت اطلاعات -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
TK
5105
.
59
.
I5
2015
E-Book
,


103. Information and communications security
Author: Tat Wing Chim, Tsz Hon Yuen (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.

104. Information and communications security :
Author: Sihan Qing [and others] (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011


105. Information security
Author: Dieter Gollmann, Felix C. Freiling (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
I83
2012eb


106. Information security and privacy :
Author: Josef Pieprzyk, Jennifer Seberry (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Data encryption (Computer science)

107. Information security applications
Author: Souhwan Jung, Moti Yung (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
W577
2011eb


108. Information security applications
Author: Dong Hoon Lee, Moti Yung (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Database security, Congresses
Classification :
QA76
.
9
.
A25
W57
2012eb


109. Information security practice and experience
Author: Mark D. Ryan, Ben Smyth, Guilin Wang (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I855
2012eb


110. Information systems security and privacy :
Author: edited by Paolo Mori, Steven Furnell, Olivier Camp.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25


111. Information theoretic security
Author: Adam Smith (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I25
2012eb


112. Innovative Security Solutions for Information Technology and Communications.
Author: \ Ion Bica , David Naccache, Emil Simion (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses.,Computer networks -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
QA
76
.
9
.
I55
2015
E-Book
,


113. Introduction to certificateless cryptography /
Author: Hu Xiong, Zhen Qin, Athanasios V. Vasilakos
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Data encryption (Computer science),Identification,Public key cryptography,Public key infrastructure (Computer security)
Classification :
QA76
.
9
.
A25
X75
2017


114. Introduction to computer and network security :
Author: Richard R. Brooks, Clemson University, South Carolina, USA
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Data encryption (Computer science),Data protection
Classification :
QA76
.
9
.
A25
B7745
2014


115. Introduction to Cryptography
Author: Hans Delfs and Helmut Knebl
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Data encryption (Computer science),Wireless communication systems -- Security measures,Computer networks -- Security measures
Classification :
QA
،
76
.
9
،.
D34
,
I721
،
2007


116. Malicious attack propagation and source identification /
Author: Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, Wanlei Zhou.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Communications engineering-- telecommunications.,Computer networks-- Security measures.,Computer security.,Computer security.,COMPUTERS-- Security-- General.,Data encryption (Computer science),Network hardware.
Classification :
QA76
.
9
.
A25


117. Modern Cryptography
Author: \ Chuck Easttom
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science),Information networks -- Security measures -- Mathematics.,رمزگذاری دادهها,شبکههای اطلاعرسانی -- تدابیر ایمنی -- ریاضیات
Classification :
E-Book
,

118. Modern cryptography :
Author: Chuck Easttom
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Mathematics,Computer security-- Mathematics,Data encryption (Computer science),Information networks-- Security measures-- Mathematics
Classification :
TK5102
.
94


119. Netzwerk- und Datensicherheit :
Author: Martin Kappes.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures.,Computer security.,Data encryption (Computer science)
Classification :
TK5105
.
59
M378
2013


120. Non-repudiation in electronic commerce
Author: Zhou, Jianying
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Electronic commerce-- Computer network resources,، Business enterprises-- Computer networks-- Security measures,، Data encryption )Computer science(,، Internet-- Security measures
Classification :
HF
5548
.
32
.
Z49
2001

