321. Handbook of research on social interaction technologies and collaboration software
Author: / Tatyana Dumova, Richard Fiordo
Library: Library of Entrepreneurship (Tehran)
Subject: Information technology -- Social aspects,Online social networks,Internet -- Social aspects,Groupware (Computer software) -- Social aspects
Classification :
HM
851
.
H3486
2010


322. Handbook of research on social interaction technologies and collaboration software
Author: / [edited by] Tatyana Dumova, Richard Fiordo
Library: Library and knowledge management of the management schools of Tehran University (Tehran)
Subject: Information technology, Social aspects,Online social networks,Internet, Social aspects,Groupware (Computer software), Social aspects
Classification :
303
.
4833
S678
2010


323. Here comes everybody
Author: / Clay Shirky
Library: Library of Entrepreneurship (Tehran)
Subject: Information technology -- Social aspects,Computer networks -- Social aspects,Internet -- Social aspects,Online social networks
Classification :
HM
851
.
S54
2008


324. How to be an Internet stock investor
Author: Newton, David
Library: (Semnan)
Subject: ، Electronic trading of securities,، Investments- Computer networks,، Internet )Computer network(
Classification :
HG
4515
.
95
.
N4H6


325. How to be an Internet stock investoressential guides to today's most popular investment strategies
Author: Newton, David
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Electronic trading of securities,، Investments-- Computer networks,، Internet
Classification :
HG
4515
.
95
.
N497
2000


326. How to be an internet stock investor
Author: / David B. Newton
Library: Tehran University, technical faculty libraries 1 (Tehran)
Subject: Electronic trading of securities,Investments - - Computer Networks,Internet (Computer Network)
Classification :
HG
4515
.
95
.
N497
2000


327. How to cheat at Voip security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Internet telephony ; Security measures. ; Computer networks ; Security measures. ;

328. How to cheat at Voip security
Author: / Thomas Porter, Michael Gough
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Internet telephony , Security measures
Classification :
E-BOOK

329. How to cheat at Voip security
Author: / Thomas Porter, Michael Gough
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Internet telephony--Security measures,Computer networks--Security measures
Classification :
TK
,
5105
.
8865
,.
P67
,
2007


330. How to cheat at Voip security
Author: Thomas Porter, Michael Gough
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Security measures ، Internet telephony,، Computer networks -- Security measures
Classification :
TK
5105
.
8865
.
P67H6


331. How to cheat at Voip security /
Author: Thomas Porter, Michael Gough
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Internet telephony-- Security measures
Classification :
TK5105
.
8865
.
P67
2007


332. How to cheat at securing Linux /
Author: Mohan Krishnamurthy [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Linux.,Linux.,Linux.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
TK5105
.
59
.
H683
2008eb


333. How to make money online with eBay, Yahoo!, and Google
Author: / Peter Kent, Jill Finlayson
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Electronic commerce,Internet marketing,Business enterprises- Computer networks
Classification :
HF5548
.
32
.
K4665
2006


334. Html 3 manual of style
Author: / Larry Aronson
Library: Central library of medical university of Isfahan (Esfahan)
Subject: Computer networks,Internet (computer networks)
Classification :
TK5105
.
5
.
A7
1995


335. ICCCE 2018 :
Author: Amit Kumar, Stefan Mozar, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks, Congresses.,Cooperating objects (Computer systems), Congresses.,Internet of things, Congresses.,Artificial Intelligence (incl. Robotics).,Communications Engineering, Networks.,Computer Imaging, Vision, Pattern Recognition and Graphics.,Engineering.,Microwaves, RF and Optical Engineering.,Signal, Image and Speech Processing.,Wireless and Mobile Communication.,Artificial intelligence.,Communications engineering / telecommunications.,Computer networks.,Computer vision.,COMPUTERS / Computer Literacy.,COMPUTERS / Computer Science.,COMPUTERS / Data Processing.,COMPUTERS / Hardware / General.,COMPUTERS / Information Technology.,COMPUTERS / Machine Theory.,COMPUTERS / Reference.,Cooperating objects (Computer systems),Imaging systems & technology.,Internet of things.,Microwave technology.,WAP (wireless) technology.
Classification :
TK5105
.
5


336. ICT futures :
Author: edited by Paul Warren, John Davies and David Brown
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Forecasting,Electronic commerce-- Forecasting,Internet-- Social aspects-- Forecasting,Telecommunication-- Technological innovations-- Forecasting,Web sites-- Forecasting
Classification :
TK5102
.
5
.
I295
2008


337. ICT futures
Author: / edited by Paul Warren, John Davies and David Brown
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Telecommunication --Technology,Computer networks -- Security measures -- Forecasting,Electronic commerce -- Forecasting,Internet -- Social aspects -- Forecasting,Web sites--Forecasting.
Classification :
TK
5102
.
5
.
I295
2008


338. ICT systems security and privacy protection :
Author: Gurpreet Dhillon, Fredrik Karlsson, Karin Hedström, André Zúquete (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Internet-- Security measures, Congresses.,Computer networks-- Security measures.,Computer security.,Internet-- Security measures.
Classification :
QA76
.
9
.
A25


339. 2004 IEEE International Conference on e-Technology, e-Commerce, and e-Service: EEE 2004, Taipei, Taiwan, 28-31 March 2004: proceedings
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Electronic commerce-- Technological innovations,Congresses ، Electronic commerce-- Computer networks,Congresses ، Electronic commerce-- Security measures,Congresses ، Business intelligence-- Computer network resources,Congresses ، Business enterprises-- Data processing,Congresses ، Web services,Congresses ، Internet
Classification :
HF
5548
.
32
.
I34
2004


340. IP operations and managemen
Author: / Giorgio Nunzi, Caterina Scoglio, Xing Li (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Management--Congresses,Internet--Management--Congresses,Multimedia communications--Management--Congresses,Wireless communication systems--Management--Congresses,TCP/IP (Computer network protocol)--Congresses
Classification :
TK
,
5105
.
875
,.
I57
,
I33
,
2009

