421. Proceedings of the ACM Workshop on Survivable and Self-Regenerative Systems : in association with 10th ACM Conference on Computer and Communications Security, Fairfax, VA, USA, October 31, 2003
Author: sponsored by ACM SIGSAC with contributions from DARPA; edited by Peng Liu and Partha Pal
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection
Classification :
QA
76
.
9
.
A25A36
2003


422. Protecting LAN resources: a comprehensive guide to securing, Protecting and rebuilding a network
Author: Held, Gilbert
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Local area networks )Computer networks( - Security measures , Computer security , Data protection
Classification :
TK
5105
.
59
.
H44
1995


423. Protecting your library's digital sources :the essential guide to planning and preservation
Author: Kahn, Miriam )Miriam B.(,Miriam B. Kahn
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: Safety measures ، Libraries,Safety measures ، Archives,Security measures ، Library information networks,Conservation and restoration ، Electronic records,Planning ، Emergency management,، Computer security,، Data protection,Backup processing alternatives ، Electronic data processing
Classification :
Z679
.
7
.
K385
2004


424. Provable Security : 11th International Conference, ProvSec 2017 Xian, China, October 23 25, 2017 Proceedings
Author: Editors Tatsuaki Okamoto, Man Ho Au, Yong Yu, Yannan Li
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security -- Congresses,، Data encryption )Computer science( -- Congresses,، Data protection -- Congresses
Classification :
QA
76
.
9
.
A25P787
2017


425. Provable security.
Author: \ Man-Ho Au, Atsuko Miyaji (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,Data encryption (Computer science),Data Protection,کامپیوترها,رمزگذاری دادهها,حفاظت اطلاعات , -- Congresses, -- Congresses, -- Congresses, -- کنگرهها, -- کنگرهها, -- کنگرهها, -- ایمنی اطلاعات,a03,a05,a07,a03,a05,a07
Classification :
QA
76
.
9
.
A25
P7
2015
E-Book
,


426. Provable security :
Author: Joonsang Baek, Willy Susilo, Jongkil Kim (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer Systems Organization and Communication Networks.,Computing Milieux.,Cryptology.,Data Structures and Information Theory.,Software Engineering/Programming and Operating Systems.,Algorithms & data structures.,Computer networking & communications.,Computer security.,Computers-- Hardware-- General.,Computers-- Information Theory.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Data protection.,Information technology: general issues.,Software Engineering.
Classification :
QA76
.
9
.
A25


427. Provable security
Author: Tsuyoshi Takagi ... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
P76
2012eb


428. Responsive security
Author: Meng-Chow Kang
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures,Data protection,Electronic data processing departments-- Security measures,Information technology-- Security measures,Risk management
Classification :
HF30
.
38
.
K38
2014


429. Risk centric threat modeling :
Author: Tony Uceda Vélez and Marco M. Morana
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Data protection,Management information systems-- Security measures,Risk assessment
Classification :
HF5548
.
37


430. SAS 9.1.3 intelligence platform :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: SAS (Computer file),SAS (Computer file),Computer networks-- Security measures.,Data protection.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.
Classification :
QA76
.
9
.
A25
S27
2006eb


431. Secure data management : VLDB 2004 workshop, SDM 2004, Toronto, Canada, August 30, 2004 : proceedings
Author: Willem Jonker, Milan Petkovic )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Database security,Congresses ، Data encryption )Computer science(,Congresses ، Data protection,Congresses ، Computers -- Access control,Congresses ، Database management
Classification :
QA
76
.
L28
Vol
.
3178


432. Secure data management : second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005 : proceedings
Author: Willem Jonker, Milan Petkovic )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Database security,Congresses ، Data encryption )Computer science(,Congresses ، Data protection,Congresses ، Computers -- Access control,Congresses ، Database management
Classification :
QA
76
.
L28
Vol
.
3674


433. Securing SCADA systems
Author: Krutz, Ronald L
Library: Library of Niroo Research Institue (Tehran)
Subject: ، Process control,، Data protection,، Computer security
Classification :
TS
156
.
8
.
K78
2005


434. Securing SCADA systems
Author: / Ronald L. Krutz
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Process control,Data protection,Computer security
Classification :
TS156
.
8
.
K78
2006


435. Securing SCADA systems
Author: / Ronald L. Krutz
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Process control,Data protection,Computer security,Supervisory control systems
Classification :
TS156
.
8
.
K78
2006


436. Securing digital video
Author: / Eric Diehl
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Digital video--Security measures,Digital rights management.,Data protection.,Data encryption (Computer science)
Classification :
TK6680
.
5
.
D54
2012


437. Securing digital video
Author: Eric Diehl
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Data protection,Digital rights management,Digital video-- Security measures
Classification :
TK6680
.
5
.
D54
2012eb


438. Securite Internet
Author: / Solange Ghernaouti-Helie
Library: Faculty of Law and Political Sciences (Tehran)
Subject: Local area networks (Computer networks) -- Security measures,Internet -- Security measures,Data protection,Protection de l`information (informatique),Coupe-feu (securite informatique),Systemes informatiques -- Mesures de surete,Virus informatiques,Reseaux locaux (informatique) -- Mesures de surete,Internet -- Mesures de surete
Classification :
TK5105
.
87
.
G5S4


439. Security and privacy.
Author: edited by Joseph Savirimuthu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Law and legislation.,Data protection-- Law and legislation.,Electronic surveillance-- Law and legislation.,Privacy, Right of.,Computer security-- Law and legislation.,Data protection-- Law and legislation.,Electronic surveillance-- Law and legislation.,Privacy, Right of.
Classification :
K3264
.
C65
S43
2016


440. Security and privacy in biometrics
Author: Patrizio Campisi, editor
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Biometric identification-- Security measures,Data encryption (Computer science),Data protection
Classification :
QA76
.
9
.
A25
S43
2013

