61. Building the infrastructure for cloud security
Author: Raghu Yeluri, Enrique Castro-Leon
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures,Data encryption (Computer science)
Classification :
QA76
.
585
.
Y458
2014


62. CCS'10 : proceedings of the 17th ACM Conference on Computer and Communications Security, October 4-8, 2010, Chicago, Illinois, USA
Author: ]general chair, Ehab Al-Shaer; program chairs, Angelos D. Keromytis, Vitaly Shmatikov[; sponsored by, ACM SIGSAC; supported by, National Science Foundation...]et al.[
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection,Congresses ، Data encryption )Computer science(
Classification :
QA
76
.
9
.
A25A26
2010


63. Chaos synchronization and cryptography for secure communications: applications for encryption
Author: ]edited by[ Santo Banerjee
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Security measures ، Telecommunication,، Chaotic behavior in systems,، Cryptography,، Data encryption )Computer science(,، Synchronization
Classification :
TK
5102
.
94
.
C523


64. Codes
Author: / Richard A. Mollin
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25M67
2005


65. Codes, Cryptology, and Information Security
Author: \ [edited by] Said El Hajji...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer security -- Congresses.,Internet -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها ,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,اینترنت -- تدابیر ایمنی --کنگره ها
Classification :
QA
76
.
9
.
C6
2015
E-Book
,


66. Codes, cryptology and information security :
Author: Claude Carlet, Sylvain Guilley, Abderrahmane Nitaj, El Mamoun Souidi (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Internet-- Security measures, Congresses.,Computer security.,Data encryption (Computer science),Internet-- Security measures.
Classification :
QA76
.
9
.
A25


67. Coding theory, cryptography, and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998
Author: Johannes Buchmann ... ]et al.[, editors
Library: Central Library and Documentation Center (Kerman)
Subject: Congresses ، Coding theory,Congresses ، Data encryption )Computer science(,Security measures - Congresses ، Data transmission systems
Classification :
TK
5102
.
94
.
I58
2000


68. Coding theory, cryptography, and related areas: proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998
Author: Johannes Buchmann ... ]et al.[, editors
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Congresses ، Coding theory,Congresses ، Data encryption )Computer science(,Security measures -- Congresses ، Data transmission systems
Classification :
TK
5102
.
94
.
I58
1998


69. Coding theory, cryptography and related areas : proceedings of an International Conference on Coding Theory, Cryptography, and Related Areas, held in Guanajuato, Mexico, in April 1998
Author: Johannes Buchmann...]et al.[, editors
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Coding theory,Congresses ، Data encryption )Computer science(,Security measures -- Congresses ، Data transmission systems
Classification :
TK
5102
.
94
.
I58
1998


70. Coding theory, cryptography and related areas: proceedings of and International Conference on Coding Theory, Cryptography and Related Areas, held in Guanajuato, Mexico, in April 1998
Author: International Conference on Coding Theory, Cryptography, and Related Areas )8991: Guanajuato, Mexico(
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Coding theory -- Congresses,، Data encryption )Computer science( -- Congresses,، Data transmission systems -- Security measures -- Congresses
Classification :
TK
5102
.
94
.
I58


71. Computer security :
Author: Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25


72. Computer security - ESORICS 2012
Author: Sara Foresti, Moti Yung, Fabio Martinelli (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
E98
2012eb


73. Computer security and cryptography
Author: Alan G. Konheim
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Ciphers,Computer security,Cryptography,Cryptography-- History,Data encryption (Computer science)
Classification :
Z103
.
A2
K638
2007


74. Constructive Side-Channel Analysis and Secure Design
Author: \ Stefan Mangard , Axel Y. Poschmann (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer security -- Congresses.,Data Encryption.,رمزگذاری دادهها -- کنگرهها ,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,رمزگذاری دادهها
Classification :
QA
76
.
9
.
C6
2015
E-Book
,


75. Constructive side-channel analysis and secure design
Author: edited by Werner Schindler, Sorin A. Huss
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
C675
2012eb


76. Constructive side-channel analysis and secure design :
Author: Ilia Polian, Marc Stöttinger (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer security.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25


77. Constructive side-channel analysis and secure design :
Author: edited by Junfeng Fan, Benedikt Gierlichs.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Algorithms & data structures.,Coding theory & cryptology.,Computer security.,Computer security.,Computers-- Expert Systems.,Computers-- Information Technology.,Computers-- Information Theory.,Computers-- Security-- General.,Computers-- Systems Architecture-- General.,Data encryption (Computer science),Expert systems-- knowledge-based systems.,Systems analysis & design.
Classification :
QA76
.
9
.
A25


78. Cracking codes with Python :
Author: by Al Sweigart.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data encryption (Computer science),Hacking.,Python (Computer program language),Computer security.,COMPUTERS-- Programming Languages-- Python.,COMPUTERS-- Security-- Cryptography.,Data encryption (Computer science),Hacking.,Python (Computer program language)
Classification :
QA76
.
9
.
A25
S9317
2018


79. Crafting the InfoSec playbook /
Author: Jeff Bollinger, Brandon Enright & Matthew Valites
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25


80. Critical information infrastructure security :
Author: Sandro Bologna, Bernhard Hämmerli, Dimitris Gritzalis, Stephen Wolthusen (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
C75
2011

