241. Information security and cryptology ICISC 2015
Author: \ Soonhak Kwon , Aaram Yun (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
QA
76
.
9
.
I5
2016
E-Book
,


242. Information security and cryptology - ICISC 2011
Author: Howon Kim (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I32
2011eb


243. Information security and privacy
Author: Willy Susilo, Yi Mu, Jennifer Seberry (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
A279
2012eb


244. Information security applications
Author: Souhwan Jung, Moti Yung (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
W577
2011eb


245. Information security applications
Author: Dong Hoon Lee, Moti Yung (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Database security, Congresses
Classification :
QA76
.
9
.
A25
W57
2012eb


246. Information security applications :
Author: Yongwha Chung, Moti Yung (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Computers-- Access control, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
W57
2011


247. Information security practice and experience
Author: Mark D. Ryan, Ben Smyth, Guilin Wang (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I855
2012eb


248. Information systems security and privacy :
Author: edited by Paolo Mori, Steven Furnell, Olivier Camp.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25


249. Information theoretic securit
Author: / Reihaneh Safavi-Naini (ed.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Cryptography--Congresses,Data encryption (Computer science)--Congresses,Data protection--Congresses,Electronic books.

250. Information theoretic security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ; Cryptography ; Congresses. ; Data encryption (Computer science) ; Congresses. ; Data protection ; Congresses. ;

251. Information theoretic security
Author: Yvo Desmedt (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
I33
2007eb


252. Information theoretic security
Author: Adam Smith (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I25
2012eb


253. Innovative Security Solutions for Information Technology and Communications.
Author: \ Ion Bica , David Naccache, Emil Simion (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses.,Computer networks -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
QA
76
.
9
.
I55
2015
E-Book
,


254. Innovative cryptography
Author: / Nick Moldovyan, Alex Moldovyan
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Data encryption (Computer science),Telecommunication--Security measures,Cryptography.
Classification :
QA
,
76
.
9
,.
A25
,
M665
,
2007


255. Innovative cryptography
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data encryption (Computer science) ; Telecommunication ; Security measures. ; Cryptography. ;

256. Innovative cryptography /
Author: Nick Moldovyan, Alex Moldovyan
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cryptography,Data encryption (Computer science),Telecommunication-- Security measures
Classification :
QA76
.
9
.
A25
M665
2007


257. Intel® trusted execution technology for server platforms :
Author: William Futral, James Greene
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Client/server computing-- Security measures,Data encryption (Computer science),Database security.,Computer Science,Data Encryption,Database Management
Classification :
QA76
.
9
.
A25


258. Intelligence and Security Informatics
Author: \ Michael Chau, G. Alan Wang, Hsinchun Chen (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses,Data encryption (Computer science) -- Congresses.,Internet -- Security measures -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,رمزگذاری دادهها -- کنگرهها ,اینترنت -- تدابیر ایمنی -- کنگره ها
Classification :
QA
76
.
9
.
I5
2015
E-Book
,


259. Internet security
Author: / Man Young Rhee
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Internet--Security measures,Data encryption (Computer science),Public key cryptography
Classification :
EB
,
TK5105
.
875
.
I57R447
2003

260. Internet security
Author: / Man Young Rhee
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Internet--Security measures,Data encryption (Computer science),Public key cryptography.
Classification :
TK
,
5105
.
875
,.
I57
,.
R447
,
2003

