341. Data privacy management, cryptocurrencies and blockchain technology :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ;

342. Database security, II : status and prospects : results of the IFIP WG 11.3 Workshop on Database Security, Kingston, Ontario, Canada, 5-7 October 1988
Author: edited by Carl E. Landwehr
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Data base security - Congresses , Computer security - Congresses
Classification :
QA
76
.
9
.
D314
I34
1988


343. Database security : status and prospects : results of the IFIP WG 11.3 initial meeting, Annapolis, Maryland, U.S.A., October 1987
Author: edited by Carl E. Landwehr
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Data base security - Congresses , Computer security - Congresses
Classification :
QA
76
.
9
.
D314
I34
1987


344. Datenschutz und Datensicherung im Wandel der Informationstechnologien :
Author: herausgegeben von P.P. Spies.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security -- Congresses.,Computer security.,Data protection -- Congresses.
Classification :
QA76
.
9
.
A25
H473
1985


345. Decision and Game Theory for Security.
Author: \ MHR Khouzani , Emmanouil Panaousis, George Theodorakopoulos (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer science,کامپیوتر,a05,a05,Computer security --Congresses,Game theory -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,نظریه بازی -- کنگره ها
Classification :
QA
76
.
9
.
D4
2015
E-Book
,


346. Decision and game theory for securit
Author: / Tansu Alpcan, Levente Buttyaan, John S. Baras (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures, Congresses,Decision making, Congresses,Game theory, Congresses,Electronic books., local

347. Decision and game theory for security :
Author: Linda Bushnell, Radha Poovendran, Tamer Başar (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Game theory, Congresses.,Artificial intelligence.,Business applications.,Computer security.,Computer security.,Computers-- Electronic Commerce.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Game theory.,Information retrieval.,Network hardware.
Classification :
QA76
.
76
.
A65


348. Decision and game theory for security :
Author: John S. Baras, Jonathan Katz, Eitan Altman (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Game theory, Congresses
Classification :
QA76
.
9
.
A25
G36
2011


349. Decrypted secrets : methods and maxims of cryptology
Author: Bauer, Friedrich Ludwig
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer security - Congresses , Cryptography - Congresses
Classification :
QA
76
.
9
.
A25
B38513
1997


350. Decrypted secrets: methods and maxims of cryptology,Entzifferte Geheimnisse. English
Author: Bauer, Friedrich Ludwig
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Computer security,Congresses ، Cryptography
Classification :
QA
76
.
9
.
A25
.
B38513
1997


351. Dependability in sensor, cloud, and big data systems and applications :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ;

352. Dependable networks and services
Author: edited by Ramin Sadre ... [et al.]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Management, Congresses,Computer networks-- Scalability, Congresses,Computer security, Congresses
Classification :
TK5105
.
5
.
I55
2012eb


353. Dependable networks and services
Author: / edited by Ramin Sadre ... [et al.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks--Management--Congresses,Computer networks--Scalability--Congresses,Computer security--Congresses
Classification :
TK5105
.
5
.
I55
2012


354. Designing privacy enhancing technologies : International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000 : proceedings
Author: Hannes Federrath )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computer networks -- Security measures
Classification :
QA
76
.
L28
Vol
.
2009


355. Detection of Intrusions and Malware, and Vulnerability Assessment
Author: \ Magnus Almgren, Vincenzo Gulisano, Federico Maggi (eds.).
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Intrusion detection systems (Computer security) -- Congresses,Computer security -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها
Classification :
QA
76
.
9
.
A25D4
2015
E-Book
,


356. Detection of intrusions and malware, and vulnerability assessmen
Author: / Christian Kreibich, Marko Jahnke (Eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures, Congresses,Computer networks, Access control, Congresses,Electronic books
Classification :
TK5105
.
59
.
D56
2010


357. Detection of intrusions and malware, and vulnerability assessment :
Author: Thorsten Holz, Herbert Bos (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Computers-- Access control-- Evaluation, Congresses,Computers-- Access control, Congresses,Malware (Computer software), Congresses
Classification :
QA76
.
9
.
A25


358. Detection of intrusions and malware, and vulnerability assessment :
Author: Roberto Perdisci, Clémentine Maurice, Giorgio Giacinto, Magnus Almgren (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Intrusion detection systems (Computer security), Congresses.,Computer security.,Intrusion detection systems (Computer security)
Classification :
QA76
.
9
.
A25
D55
2019eb


359. Detection of intrusions and malware, and vulnerability assessment
Author: / Klaus Julisch, Christopher Kruegel (eds.).
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security--Congresses.
Classification :
QA
76
.
9
.
A25
D563
2005


360. Detection of intrusions and malware, and vulnerability assessment
Author: / Christian Kreibich, Marko Jahnke (Eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures, Congresses,Computer networks, Access control, Congresses
Classification :
TK5105
.
59
.
D56
2010

