101. Advanced encryption standard--AES
Author: / Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa (eds.).
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computers--Access control--Standards--Congresses., Data encryption (Computer science)--Standards--Congresses., Computer security--Standards--Congresses.
Classification :
QA
76
.
9
.
A25
A4
2005


102. Advanced encryption standard -- AES
Author: / Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computers--Access control--Standards--Congresses,Data encryption (Computer science)--Standards--Congresses,Computer security--Standards--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
A4
,
2004


103. Advanced encryption standard--AES
Author: / Hans Dobbertin, Vincent Rijmen, Aleksandra Sowa (eds.)
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computers- Access control- Standards Congresses,Data encryption (Computer science)- Standards Congresses,Computer security- Standards Congresses
Classification :
QA76
.
9
.
A25
,
A4
2004


104. Advanced host intrusion prevention with CSA
Author: / Chad Sullivan, Paul Mauvais, Jeff Asher
Library: Central Library of Imam Khomeini International University of Qazvin (Qazvin)
Subject: Computer security
Classification :
QA76
.
9
.
A25
,
S84
2006


105. Advanced host intrusion prevention with CSA
Author: / Chad Sullivan, Paul Mauvais, Jeff Asher
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security
Classification :
QA76
.
9
.
A25
,
S84
2006


106. Advanced monitoring in P2P botnets :
Author: Shankar Karuppayah.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control.,Computer networks-- Security measures.,Malware (Computer software),Peer-to-peer architecture (Computer networks),Computer networks-- Access control.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Networking-- General.,Malware (Computer software),Mathematical physics.,Network hardware.,Peer-to-peer architecture (Computer networks)
Classification :
TK5105
.
59
.
K37
2018


107. Advanced penetration testing :
Author: Wil Allsopp.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Penetration testing (Computer security),Computer networks-- Security measures.,COMPUTERS-- Security-- General.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25


108. Advanced penetration testing for highly-secured environments
Author: Lee Allen
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Handbooks, manuals, etc,Computer networks, Handbooks, manuals, etc,Computer security-- Testing, Handbooks, manuals, etc,Penetration testing (Computer security), Handbooks, manuals, etc
Classification :
QA76
.
9
.
A25
A45
2012


109. Advanced penetration testing : hacking the world's most secure networks
Author: Wil Allsopp
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Penetration testing )Computer security(,، Computer networks -- Security measures
Classification :
TA
455
.
A43C425
2017


110. Advanced relay technologies in next generation wireless communications /
Author: edited by Ionnis Krikidis and Gan Zheng.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Antenna arrays.,Computer networks.,Electromagnetic interference.,Energy conservation.,Telecommunication-- Security measures.,Wireless communication systems.,antenna arrays.,Antenna arrays.,Computer networks.,cooperative communication.,Electromagnetic interference.,energy conservation.,Energy conservation.,free-space optical communication.,MIMO communication.,next generation networks.,radiofrequency interference.,radiofrequency power transmission.,relay networks (telecommunication),TECHNOLOGY & ENGINEERING-- Mechanical.,telecommunication power management.,Telecommunication-- Security measures.,telecommunication security.,Wireless communication systems
Classification :
TK5103
.
2


111. Advanced security technologies in networking
Author: edited by Borka Jerman-Blazic, Wolfgang S. Schneider and Tomaz Klobucar
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures -- Congresses ، Computer networks,Congresses ، Computer security
Classification :
TK
5105
.
59
.
N38
2000


112. Advanced security technologies in networking
Author: edited by Borka Jerman-Blazic, Wolfgang S. Schneider and Tomaz Klobucar
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,Security measures ، Telecommunication,، Data encryption )Computer science(,، Electronic commerce
Classification :
TK
5105
.
59
.
A3


113. Advanced security technologies in networking
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Computer networks-- Security measures,Congresses ، Computer security
Classification :
TK
5105
.
59
.
N33
2000


114. Advanced smart computing technologies in cybersecurity and forensics
Author: / edited by Keshav Kaushik ... [et al.].
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security.,Computer crimes,Investigation.

115. Advances in Computing and Data Sciences
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data structures (Computer scienc. ; Artificial intelligence. ; Computer vision. ; Information systems. ; Computer security. ; Computer Communication Networks. ; Data Structures and Information Theory. ;

116. Advances in Computing and Data Sciences
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data structures (Computer scienc. ; Artificial intelligence. ; Information systems. ; Computer vision. ; Computer security. ; Computers ; Law and legislation. ; Data Structures and Information Theory. ;

117. Advances in Cryptology – ASIACRYPT 2015
Author: \ Tetsu Iwata , Jung Hee Cheon (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses,Computer security -- Congresses,رمزگذاری دادهها -- کنگرهها,کامپیوترها -- ایمنی اطلاعات -- کنگرهها
Classification :
QA
76
.
9
.
A31
I58
2015
E-Book
,


118. Advances in Cryptology – CRYPTO 2015
Author: \ Rosario Gennaro, Matthew Robshaw (Eds.).
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer security -- Congresses.,رمزگذاری دادهها -- کنگرهها ,کامپیوترها -- ایمنی اطلاعات -- کنگرهها
Classification :
QA76
.
9
.
A31
2015
E-Book
,


119. Advances in Cryptology – CRYPTO 2015
Author: \ Rosario Gennaro, Matthew Robshaw (Eds.).
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Computer security -- Congresses.,رمزگذاری دادهها -- کنگرهها ,علوم کامپیوتر -- کنگره ها
Classification :
QA76
.
9
.
A30
2015
E-Book
,


120. Advances in Cryptology - CRYPTO 2004 : 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 2004 : Proceedings
Author: Matt Franklin
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computers -- Access control,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
3152

