• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۱۱۰۷ پاسخ غیر تکراری از ۱۱۱۱ پاسخ تکراری در مدت زمان ۰,۶۹ ثانیه یافت شد.

341. Data privacy management, cryptocurrencies and blockchain technology :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer security ; Congresses. ;

Classification :

342. Database security, II : status and prospects : results of the IFIP WG 11.3 Workshop on Database Security, Kingston, Ontario, Canada, 5-7 October 1988

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Carl E. Landwehr

Library: Central Library of Amirkabir University of Technology (Tehran)

Subject: Data base security - Congresses , Computer security - Congresses

Classification :
QA
76
.
9
.
D314
I34
1988

343. Database security : status and prospects : results of the IFIP WG 11.3 initial meeting, Annapolis, Maryland, U.S.A., October 1987

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Carl E. Landwehr

Library: Central Library of Amirkabir University of Technology (Tehran)

Subject: Data base security - Congresses , Computer security - Congresses

Classification :
QA
76
.
9
.
D314
I34
1987

344. Datenschutz und Datensicherung im Wandel der Informationstechnologien :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: herausgegeben von P.P. Spies.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security -- Congresses.,Computer security.,Data protection -- Congresses.

Classification :
QA76
.
9
.
A25
H473
1985

345. Decision and Game Theory for Security.

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: \ MHR Khouzani , Emmanouil Panaousis, George Theodorakopoulos (Eds.)

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Computer science,کامپیوتر,a05,a05,Computer security --Congresses,Game theory -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگره‌ها ,نظریه بازی -- کنگره ها

Classification :
QA
76
.
9
.
D4
2015
E-Book
,

346. Decision and game theory for securit

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Tansu Alpcan, Levente Buttyaan, John S. Baras (eds.

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer networks, Security measures, Congresses,Decision making, Congresses,Game theory, Congresses,Electronic books., local

Classification :

347. Decision and game theory for security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Linda Bushnell, Radha Poovendran, Tamer Başar (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses.,Game theory, Congresses.,Artificial intelligence.,Business applications.,Computer security.,Computer security.,Computers-- Electronic Commerce.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Game theory.,Information retrieval.,Network hardware.

Classification :
QA76
.
76
.
A65

348. Decision and game theory for security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: John S. Baras, Jonathan Katz, Eitan Altman (editions.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Game theory, Congresses

Classification :
QA76
.
9
.
A25
G36
2011

349. Decrypted secrets : methods and maxims of cryptology

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Bauer, Friedrich Ludwig

Library: Central Library of Amirkabir University of Technology (Tehran)

Subject: Computer security - Congresses , Cryptography - Congresses

Classification :
QA
76
.
9
.
A25
B38513
1997

350. Decrypted secrets: methods and maxims of cryptology,Entzifferte Geheimnisse. English

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Bauer, Friedrich Ludwig

Library: Central Library of Sharif University of Technology (Tehran)

Subject: Congresses ، Computer security,Congresses ، Cryptography

Classification :
QA
76
.
9
.
A25
.
B38513
1997

351. Dependability in sensor, cloud, and big data systems and applications :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer security ; Congresses. ;

Classification :

352. Dependable networks and services

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Ramin Sadre ... [et al.]

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Management, Congresses,Computer networks-- Scalability, Congresses,Computer security, Congresses

Classification :
TK5105
.
5
.
I55
2012eb

353. Dependable networks and services

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / edited by Ramin Sadre ... [et al.

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer networks--Management--Congresses,Computer networks--Scalability--Congresses,Computer security--Congresses

Classification :
TK5105
.
5
.
I55
2012

354. Designing privacy enhancing technologies : International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000 : proceedings

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Hannes Federrath )ed.(

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Congresses ، Computer security,Congresses ، Computer networks -- Security measures

Classification :
QA
76
.
L28
Vol
.
2009

355. Detection of Intrusions and Malware, and Vulnerability Assessment

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: \ Magnus Almgren, Vincenzo Gulisano, Federico Maggi (eds.).

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Intrusion detection systems (Computer security) -- Congresses,Computer security -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگره‌ها

Classification :
QA
76
.
9
.
A25D4
2015
E-Book
,

356. Detection of intrusions and malware, and vulnerability assessmen

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Christian Kreibich, Marko Jahnke (Eds.

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer networks, Security measures, Congresses,Computer networks, Access control, Congresses,Electronic books

Classification :
TK5105
.
59
.
D56
2010

357. Detection of intrusions and malware, and vulnerability assessment :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Thorsten Holz, Herbert Bos (editions.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Computers-- Access control-- Evaluation, Congresses,Computers-- Access control, Congresses,Malware (Computer software), Congresses

Classification :
QA76
.
9
.
A25

358. Detection of intrusions and malware, and vulnerability assessment :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Roberto Perdisci, Clémentine Maurice, Giorgio Giacinto, Magnus Almgren (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses.,Intrusion detection systems (Computer security), Congresses.,Computer security.,Intrusion detection systems (Computer security)

Classification :
QA76
.
9
.
A25
D55
2019eb

359. Detection of intrusions and malware, and vulnerability assessment

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Klaus Julisch, Christopher Kruegel (eds.).

Library: Library of College of Science University of Tehran (Tehran)

Subject: Computer security--Congresses.

Classification :
QA
76
.
9
.
A25
D563
2005

360. Detection of intrusions and malware, and vulnerability assessment

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Christian Kreibich, Marko Jahnke (Eds.

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer networks, Security measures, Congresses,Computer networks, Access control, Congresses

Classification :
TK5105
.
59
.
D56
2010
  • »
  • 56
  • 55
  • 54
  • 53
  • 52
  • ...
  • 22
  • 21
  • 20
  • 19
  • 18
  • 17
  • 16
  • 15
  • 14
  • ...
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival