21. Collaborative computer security and trust managemen
Author: / Jean-Marc Seigneur, Adam Slagell
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Public key infrastructure (Computer security),Data protection.,Computer networks--Security measures,Computer crimes--Prevention
Classification :
QA
,
76
.
9
,.
A25
,
C6145
,
2010


22. Collaborative computer security and trust management
Author: ]edited by[ Jean-Marc Seigneur, Adam Slagell
Library: Central Library and Documentation Center (Semnan)
Subject: ، Computer security,، Public key infrastructure )Computer security(,، Data protection,Security measures ، Computer networks,Prevention ، Computer crimes
Classification :
QA
76
.
9
.
A25
C6145
2010


23. Collaborative computer security and trust management
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Public key infrastructure (Computer security) ; Data protection ; Computer networks ; Security measures ; Computer crimes ; Prevention ;

24. Collaborative computer security and trust management
Author: / [edited by] Jean-Marc Seigneur, Adam Slagell.
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer security,Public key infrastructure (Computer security),Data protection,Computer networks--Security measures,Computer crimes--Prevention.
Classification :
QA
76
.
9
.
A25
C614
2010


25. Collaborative computer security and trust management
Author: ]edited by[ Jean-Marc Seigneur, Adam Slagell
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,، Public key infrastructure )Computer security(,، Data protection,Security measures ، Computer networks,Prevention ، Computer crimes
Classification :
QA
76
.
9
.
A25
C6145
2010


26. CompTIA security+ guide to network security fundamentals /
Author: Mark Ciampa.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides.,Data protection.,Computer networks-- Security measures-- Examinations.,Data protection.
Classification :
TK5105
.
59
.
C52
2018


27. Computer and information security handbook
Author: edited by John R. Vacca
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Computer networks -- Security measures,، Data protection
Classification :
QA
76
.
9
.
A25C625
2017


28. Cyber criminalité :
Author: Éric Filiol ; Phillipe Richard.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer crimes.,Computer security.,Data protection.,criminalité-- Internet.,sécurité informatique.,Criminalité informatique.,Entreprises-- Réseaux d'ordinateurs-- Sécurité-- Mesures.,Protection de l'information (Informatique),Sécurité informatique.,Business enterprises-- Computer networks-- Security measures.,Computer crimes.,Computer security.,Crime informatique.,Criminalité informatique.,criminalité-- Internet.,Data protection.,Fraude.,Internet.,Piratage informatique.,Pirate informatique.,Sécurité des données.,sécurité informatique.,Sécurité informatique.
Classification :
HV6773
.
F55
2006


29. Cyber-security and global information assurance :
Author: Kenneth J. Knapp [editor].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Cyberspace-- Security measures.,Data protection.,Information technology-- Security measures.,Computer networks-- Security measures.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25
C918
2009eb


30. Cyber security standards, practices and industrial applications :
Author: Junaid Ahmed Zubairi, Athar Mahboob.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data protection.,Electronic data processing departments-- Security measures.

31. DIM '05 : proceedings of the 2005 ACM Workshop on Digital Identity Management, November 11, 2005, Fairfax, Virginia, USA )co-located with CCS 2005(
Author:
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer networks -- Security measures,Congresses ، Computer security,Congresses ، Data protection
Classification :
TK
5105
.
59
.
A2282
2005


32. Data privacy
Author: Nataraj Venkataramanan and Ashwin Shriram.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Customer relations.,Data protection.,Management information systems-- Security measures.,Privacy, Right of.

33. Data security technologies in SAS 9.1.3.
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: SAS (Computer file),SAS (Computer file),Computer networks-- Security measures.,Computers-- Access control.,Data protection.,Computer networks-- Security measures.,Computers-- Access control.,Data protection.
Classification :
QA76
.
9
.
A25
D3532
2005


34. Defending the digital frontier
Author: / Mark W. Doll, Sajay Rai, Jose Granado
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures,Data protection
Classification :
E-BOOK

35. Defending the digital frontier :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Data protection ;

36. Defending the digital frontier
Author: / Mark W. Doll, Sajay Rai, Jose Granado
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Data protection.
Classification :
TK
,
5105
.
59
,.
D65
,
2003


37. Der IT Security Manager :
Author: Heinrich Kersten, Gerhard Klett ; herausgegeben von Heinrich Kersten und Klaus-Dieter Wolfenstetter.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures.,COMPUTERS / Security / General.,Data protection.
Classification :
QA76
.
9
.
A25
H456
9999


38. Digital signature
Author: Kailash n.gupta, kamlesh n.agarwala, prateek a.agarwala
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computer networks -- Security measures,Computer security,Data protection,Computer networks -- Security measures
Classification :
TK
،
5105
,.
59
،.
G8
,
D5
،
2005


39. Engineering information security
Author: Stuart Jacobs
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computer security,Computer networks, Security measures,Information technology, Security measures,Data protection
Classification :
QA
،
76
.
9
،.
J3
،
2011


40. Engineering information security. the application of systems engineering concepts to achieve information assurance
Author: Jacobs, Stuart.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Computer networks- Security measures,، Information technology- Security measures,، Data protection
Classification :
QA
76
.
9
.
A25
J325
2011

