421. Transactions on data hiding and multimedia security VI /
Author: Yun Q. Shi [and others] (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Data protection,Multimedia systems-- Security measures,Algorithm Analysis and Problem Complexity,Computer Science,Computers and Society,Data Encryption,Pattern Recognition,Systems and Data Security
Classification :
QA76
.
9
.
A25
T73
2011


422. Trust and Trustworthy Computing
Author: \ Mauro Conti, Matthias Schunter, Ioannis Askoxylakis (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science),Computer security,رمزگذاری دادهها,کامپیوترها, -- Congresses, -- کنگرهها, -- ایمنی اطلاعات,a03,a05,a03,a05,Computers and Society,کامپیوترها و جامعه
Classification :
QA
76
.
9
.
A25
T79
2015
E-Book
,


423. Trust and trustworthy computing
Author: Stefan Katzenbeisser ... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
T78
2012eb


424. Trust management VII :
Author: Carmen Fernández-Gago [and others] (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
C376
2013


425. Trusted Systems
Author: \ Moti Yung, Liehuang Zhu, Yanjiang Yang (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,Computer networks,Data encryption (Computer science),کامپیوترها,شبکههای کامپیوتری,رمزگذاری دادهها, -- Congresses, -- Congresses, -- Congresses, -- کنگرهها, -- کنگرهها, -- کنگرهها, -- Security measures, -- ایمنی اطلاعات, -- اقدامات تامینی,a03,a05,a07,a03,a05,a07
Classification :
QA
76
.
9
.
A25
I58
2015
E-Book
,


426. Trusted computing--challenges and application
Author: / Peter Lipp, Ahmad-Reza Sadeghi, Klaus-Michael Koch (Eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Data encryption (Computer science)--Congresses,Public key infrastructure (Computer security)--Congresses

427. Trusted computing, challenges and applications: First International Conference on Trusted Computing and Trust in Information Technologies, Trust 2008 Villach, Austria, March 11-12, 2008: Proceedings
Author: Peter Lipp, Ahmad-Reza Sadeghi, Klaus-Michael Koch )eds.(
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Congresses ، Computer security,Congresses ، Data encryption )Computer science(,Congresses ، Public key infrastructure )Computer security(
Classification :
QA
76
.
9
.
A25
I556
2008


428. Trusted platform module basic
Author: / by Steven Kinney
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Embedded computer systems.,Computer security.,Data encryption (Computer science)
Classification :
TK
,
7895
,.
E42
,
K56
,
2006eb


429. Trusted platform module basics
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Embedded computer systems. ; Computer security. ; Data encryption (Computer science) ;

430. Trusted platform module basics
Author: by Steven Kinney.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data encryption (Computer science),Embedded computer systems.

431. Trusted platform module basics
Author: / by Steven Kinney
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Embedded computer systems,Computer security,Data encryption (Computer science)
Classification :
E-BOOK

432. Trusted platform module basics
Author: / by Steven Kinney
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Embedded computer systems,Computer security,Data encryption (Computer science)
Classification :
TK7895
.
E42
,
K56
2006


433. Trusted platform module basics
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Embedded computer systems. ; Computer security. ; Data encryption (Computer science) ;

434. Trusted platform module basics. using TPM in embedded systems
Author: Kinney, Steven
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Embedded computer systems,، Computer security,، Data encryption )Computer science(
Classification :
TK
7895
.
E42K56
2006


435. Trusted systems :
Author: edited by Liqun Chen, Moti Yung
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011


436. Trusted systems
Author: Liqun Chen, Moti Yung, Liehuang Zhu (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011eb


437. Trusted systems
Author: Chris J. Mitchell, Allan Tomlinson (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2012eb


438. Trustworthy computing and services
Author: Yuyu Yuan, Xu Wu, Yueming Lu (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I83
2012


439. Trustworthy execution on mobile devices
Author: Vasudevan, Amit,Amit Vasudevan, Jonathan M. McCune, James Newsome
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Computer security,، Mobile computing,Security measures ، Mobile communication systems,، Computer Science,، Systems and Data Security,، Computer Communication Networks,، Data Encryption,، Communications Engineering, Networks
Classification :
QA76
.
9
.
A25


440. Unix secure shell
Author: Carasik, Anne H
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، UNIX )Computer file(,، UNIX shells,، Computer networks-- Management,، Data encryption )Computer science(,، Computer networks-- Security measures
Classification :
QA
76
.
76
.
O63
.
C37
1999

