1. Decision and Game Theory for Security.
Author: \ MHR Khouzani , Emmanouil Panaousis, George Theodorakopoulos (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer science,کامپیوتر,a05,a05,Computer security --Congresses,Game theory -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,نظریه بازی -- کنگره ها
Classification :
QA
76
.
9
.
D4
2015
E-Book
,


2. Secure It Systems.
Author: \ Sonja Buchegger , Mads Dam (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer science,کامپیوتر,a04,a04,Computer security -- Congresses.,Computer security.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,امنیت کامپیوتر
Classification :
QA
76
.
9
.
S4
2015
E-Book
,


3. Theoretical Computer Science and Discrete Mathematics
Author: \ [Edited by] S. Arumugam...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer science,کامپیوتر,a03,a03,Computer security.,کامپیوترها -- ایمنی اطلاعات
Classification :
E-Book
,

4. Transactions on Computational Science XXVI
Author: \ [edited by] Marina L. Gavrilova...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer science,Artificial intelligence,کامپیوتر,هوش مصنوعی,a03,a04,a03,a04,Computer security.,کامپیوترها -- ایمنی اطلاعات
Classification :
QA
76
.
T7
2016
E-Book
,

