1081. Trusted computing--challenges and application
Author: / Peter Lipp, Ahmad-Reza Sadeghi, Klaus-Michael Koch (Eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Data encryption (Computer science)--Congresses,Public key infrastructure (Computer security)--Congresses

1082. Trusted computing, challenges and applications: First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008: Proceedings
Author: Peter Lipp, Ahmad-Reza Sadeghi, Klaus-Michael Koch )eds.(
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Congresses ، Computer security,Congresses ، Data encryption )Computer science(,Congresses ، Public key infrastructure )Computer security(
Classification :
QA
76
.
9
.
A25
I556
2008


1083. Trusted informatio
Author: / edited by Michel Dupuy, Pierre Paradinas
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Data protection--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
I45
,
2001eb


1084. Trusted information (Online)
Author: edited by Michel Dupuy, Pierre Paradinas.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data protection, Congresses.

1085. Trusted systems :
Author: edited by Liqun Chen, Moti Yung
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011


1086. Trusted systems
Author: Liqun Chen, Moti Yung, Liehuang Zhu (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011eb


1087. Trusted systems
Author: Chris J. Mitchell, Allan Tomlinson (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2012eb


1088. Trustworthy Global Computing
Author: \ Pierre Ganty, Michele Loreti (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,Computer networks,کامپیوترها,شبکههای کامپیوتری, -- Congresses, -- Congresses, -- کنگرهها, -- کنگرهها, -- Security measures, -- ایمنی اطلاعات, -- اقدامات تامینی,a03,a05,a03,a05
Classification :
QA
76
.
9
.
A25
T34
2016
E-Book
,


1089. Trustworthy Internet
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Congresses. ; Internet ; Security measures ; Congresses. ; Wireless communication systems ; Security measures ; Congresses. ; Data protection ; Congresses. ; Privacy, Right of ; Congresses. ; Digital communications

1090. Trustworthy Internet
Author: / Nicola Blefari-Melazzi, Giuseppe Bianchi, Luca Salgarelli, editors
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Congresses,Internet--Security measures--Congresses,Wireless communication systems--Security measures--Congresses,Data protection--Congresses,Privacy, Right of--Congresses,Digital communications--Congresses
Classification :
TK
,
5105
.
59
,.
T79
,
2010


1091. Trustworthy Internet
Author: \ Nicola Blefari-Melazzi, Giuseppe Bianchi, Luca Salgarelli, editors.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks-- Security measures, Congresses.,Internet-- Security measures, Congresses.,Wireless communication systems-- Security measures, Congresses.,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,اینترنت -- تدابیر ایمنی -- کنگره ها,ارتباطات بیسیم -- تدابیر ایمنی -- کنگره ها
Classification :
TK
5105
.
59
.
T7
2010
E-Book
,


1092. Trustworthy computing and services
Author: Yuyu Yuan, Xu Wu, Yueming Lu (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I83
2012


1093. Trustworthy internet /
Author: Nicola Blefari-Melazzi, Giuseppe Bianchi, Luca Salgarelli, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Internet-- Security measures, Congresses.,Computer science.
Classification :
TK5105
.
875
.
I57
T78
2011


1094. Ubiquitous security :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ;

1095. Understanding the insider threat :
Author: Richard C. Brackney, Robert H. Anderson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- United States, Congresses.,Computer security-- United States, Congresses.,Computers-- Access control-- United States, Congresses.,Electronic information resources-- Access control-- United States, Congresses.,Intelligence service-- Computer networks-- Security measures-- United States.,Intelligence service-- United States-- Data processing.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Electronic information resources-- Access control.,Intelligence service-- Computer networks-- Security measures.,Intelligence service-- Data processing.,POLITICAL SCIENCE-- Political Freedom & Security-- General.,POLITICAL SCIENCE-- Political Freedom & Security-- Terrorism.,United States., 7
Classification :
QA76
.
9
.
A25
B696
2004


1096. Verification of infinite-state systems with applications to security /
Author: edited by Edmund Clarke, Marius Minea and Ferucio Laurenţiu Ţiplea.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Computer software-- Verification, Congresses.,System theory-- Mathematical models, Congresses.,System theory-- Security measures, Congresses.,Computer security.,Computer software-- Verification.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,System theory-- Mathematical models.
Classification :
Q295
.
N38
2005eb


1097. VizSEC 200
Author: / John R. Goodall, Gregory Conti, Kwan-Liu Ma, editors
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
V59
,
2007eb


1098. VizSEC 2007
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ;

1099. VizSEC/DMSEC'04 : proceedings of the 2004 ACM Workshop on Visualization and Data Mining for Computer Security, Washington, DC, USA, October 29, 2004, co-located with CCS 2004
Author: sponsored by ACM SIGSAC
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data mining
Classification :
QA
76
.
9
.
A25A384
2004


1100. WORM'05 : proceedings of the 2005 ACM Workshop on Rapid Malcode, November 11, 2005, Fairfax, Virginia, USA; co-located with CCS 2005
Author: Angelos D. Keromytis, editor; sponsored by ACM Special Interest Group on Security, Audit & Control )SIGSAC(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computer networks -- Security measures,Congresses ، Computer viruses
Classification :
QA
76
.
9
.
A25A345
2005

