201. Handbook of information and communication security
Author: / Peter Stavroulakis, Mark Stamp, editors
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security,Data encryption (Computer science),Computer Science, IT
Classification :
QA76
.
9
.
A25H355
2010


202. Handbook of information and communication security
پدیدآورنده : Peter Stavroulakis, Mark Stamp, editors
موضوع : Computer security,Data encryption (Computer science)
۲ نسخه از این کتاب در ۲ کتابخانه موجود است.
203. Handbook of information and communication security
Author: Peter Stavroulakis, Mark Stamp, editors
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,، Data encryption )Computer science(
Classification :
QA
76
.
9
.
A25
H355
2010


204. Hardware security :
Author: Debdeep Mukhopadhyay, Rajat Subhra Chakraborty
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Computers-- Circuits-- Design and construction,Data encryption (Computer science),Integrated circuits-- Design and construction
Classification :
QA76
.
9
.
A25
M85
2015


205. Hashing in computer science
Author: / Alan G. Konheim
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Hashing (Computer science),Cryptography,Data encryption (Computer science),Computer security
Classification :
QA76
.
9
.
H36K65
]
2010


206. Hashing in computer science :
Author: Alan G. Konheim
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Cryptography,Data encryption (Computer science),Hashing (Computer science)
Classification :
QA76
.
9
.
H36
K65
2010


207. Human Aspects of Information Security, Privacy, and Trust.
Author: \ Theo Tryfonas , Ioannis Askoxylakis (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
QA76
.
9
.
H8
2015
E-Book
,


208. IOS penetration testing :
Author: Kunal Relan
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Application software.,Computer security.,Apple and iOS.,Computer Science.,Data Encryption.,Software Engineering.,Systems and Data Security.
Classification :
QA76
.
9
.
A25


209. Image and video encryption :
Author: by Andreas Uhl, Andreas Pommer
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Image processing-- Security measures
Classification :
TA1637
.
U72
2005


210. Image and video encryption
Author: / by Andreas Uhl, Andreas Pommer
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Image processing--Security measures,Data encryption (Computer science)
Classification :
TA
,
1637
,.
U72
,
2005


211. Image and video encryption :
Author: / by Andreas Uhl, Andreas Pommer
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Image processing , Security measures,Data encryption (Computer science)
Classification :
E-BOOK

212. Image and video encrytion
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Image processing ; Security measures. ; Data encryption (Computer science) ; Telecommunication ; Security measures. ; Copyright and electronic data processing. ;

213. Implementing SSH
Author: Himanshu Dwivedi
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: UNIX Shells,Computer networks- Security measures,Data encryption (Computer science)
Classification :
QA
,
76
.
76
,.
O63
,
D895
,
2004


214. Implementing SSH
Author: / Himanshu Dwivedi
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: UNIX Shells,Computer networks- Security measures,Data encryption (Computer science)
Classification :
QA76
.
76
.
O63
,
D895
2004


215. Implementing SSL/TLS using cryptography and PKI /
Author: Joshua Davies.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Data encryption (Computer science)
Classification :
TK5105
.
59
.
D39
2011


216. Information Hiding
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses,Data encryption (Computer science) -- Congresses,Data protection -- Congresses,کامپیوترها -- ایمنی اطلاعات -- کنگرهها,رمزگذاری دادهها -- کنگرهها,حفاظت دادهها -- کنگرهها
Classification :
E-Book
,

217. Information Security
Author: \ Yvo Desmedt (Ed.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses,Data encryption (Computer science) -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
QA
76
.
9
.
I5
2015
E-Book
,


218. Information Security
Author: \ Javier Lopez , Chris J. Mitchell (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer science,کامپیوتر,a05,a05,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
QA
76
.
9
.
I5
2015
E-Book
,


219. Information Security Practice and Experience
Author: \ Javier Lopez , Yongdong Wu (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses.,Computer networks -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
QA
76
.
9
.
A25I5
2015
E-Book
,


220. Information Security and Cryptology
Author: \ Dongdai Lin, Moti Yung, Jianying Zhou (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer security -- Congresses.,Data Encryption.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها
Classification :
QA
76
.
9
.
I5
2015
E-Book
,

