61. Critical infrastructure protection II
Author: edited by Mauricio Papa, Sujeet Shenoi
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Information networks-- Security measures, Congresses
Classification :
TK5105
.
59
.
C75
2008eb


62. Critical infrastructure protection III
Author: Charles Palmer, Sujeet Shenoi (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Information networks-- Security measures, Congresses
Classification :
TK5105
.
59
.
C75
2009eb


63. Critical infrastructure protection V :
Author: Jonathan Butts, Sujeet Shenoi (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Cyberinfrastructure-- Security measures, Congresses.
Classification :
TK5105
.
59
.
I35
2011


64. Critical infrastructure protection XII :
Author: Jason Staggs, Sujeet Shenoi (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer networks-- Security measures.
Classification :
QA76
.
9
.
A25


65. Critical infrastructure protection XIV :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Congresses. ;

66. Critical infrastructure protection XV :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Congresses. ;

67. Cryptology and network security
Author: Juan A. Garay, Atsuko Miyaji, Akira Otsuka (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I5534
2009eb


68. Cryptology and network security :
Author: Jan Camenisch, Panos Papadimitratos (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer Communication Networks.,Computers and Society.,Cryptology.,Information Systems and Communication Service.,Software Engineering/Programming and Operating Systems.,Computer networking & communications.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- Online Services-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Ethical & social aspects of IT.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25


69. Cryptology and network security
Author: / Feng Bao ... [et al.] (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Congresses,Cryptography--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
I5538
,
2007


70. Cryptology and network security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Congresses. ; Cryptography ; Congresses. ; Authentifikation. ; swd. ; Computersicherheit. ; swd. ; Datensicherung. ; swd. ; Kryptoanalyse. ; swd. ; Kryptosystem. ; swd. ; Passwort. ; swd. ; Privatsph?re. ; swd. ; Re

71. Cryptology and network security :
Author: Srdjan Capkun, Sherman S.M. Chow (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Coding theory & cryptology.,Computer networks-- Security measures.,Computers-- Database Management-- Data Mining.,Computers-- Information Technology.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data mining.,Ethical & social aspects of IT.,Information retrieval.,Software Engineering.
Classification :
QA76
.
9
.
A25


72. Cryptology and network security :6th international conference, CANS 2007 Singapore, December 8-10 2007 : proceedings
Author: ]edited by[ Feng Bao, San Ling, Tatsuaki Okamoto
Library: Library of Niroo Research Institue (Tehran)
Subject: Congresses ، Computer networks - Security measures,Congresses ، Cryptography
Classification :
QA
76
.
9
.
A25I5538
2007


73. Cyber-netwar security in the information age
Author: / edited by Fernando Duarte Carvalho, Eduardo Mateus da Silva
Library: Central Library of Astan Quds Razavi-Hall of Foreign Books (Khorasan Razavi)
Subject: Cyberspace operations (Military science),Information warfare -- Congresses,Computer networks -- Security measures -- Congresses
Classification :
355
.
343
N
279
C


74. Cyber security :
Author: Xiaochun Yun, Weiping Wen, Bo Lang, Hanbing Yan, Li Ding, Jia Li, Yu Zhou (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Internet-- Security measures, Congresses.,Computer networks-- Security measures.,Internet-- Security measures.
Classification :
TK5105
.
875
.
I57


75. Cyberspace Security and Defense
Author: \ edited by Janusz S. Kowalik, Janusz Gorski and Anatoly Sachenko.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses. ,Computer networks -- Security measures -- Congresses
Classification :
E-Book
,

76. Cyberwar-Netwar :
Author: edited by Fernando Duarte Carvalho and Eduardo Mateus da Silva.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,HISTORY -- Military -- Biological & Chemical Warfare.,Information warfare -- Congresses.
Classification :
UA929
.
95
.
E43
E358
2006


77. DIM '05 : proceedings of the 2005 ACM Workshop on Digital Identity Management, November 11, 2005, Fairfax, Virginia, USA )co-located with CCS 2005(
Author:
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer networks -- Security measures,Congresses ، Computer security,Congresses ، Data protection
Classification :
TK
5105
.
59
.
A2282
2005


78. Data analysis for network cyber-security /
Author: editors, Niall Adams, Nicholas Heard.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.

79. Data and Applications Security and Privacy XXIX
Author: \ Pierangela Samarati (Ed.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses.,Computer networks -- Security measures -- Congresses.,Database management.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,پایگاههای اطلاعاتی -- مدیریت
Classification :
QA
76
.
9
.
A25D32
2015
E-Book
,


80. Data privacy management and autonomous spontaneous security :
Author: Roberto Di Pietro [and others] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.
