81. Decision and game theory for security :
Author: John S. Baras, Jonathan Katz, Eitan Altman (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Game theory, Congresses
Classification :
QA76
.
9
.
A25
G36
2011


82. Designing privacy enhancing technologies : International Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, July 25-26, 2000 : proceedings
Author: Hannes Federrath )ed.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computer networks -- Security measures
Classification :
QA
76
.
L28
Vol
.
2009


83. Detection of intrusions and malware, and vulnerability assessmen
Author: / Christian Kreibich, Marko Jahnke (Eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures, Congresses,Computer networks, Access control, Congresses,Electronic books
Classification :
TK5105
.
59
.
D56
2010


84. Detection of intrusions and malware, and vulnerability assessment :
Author: Thorsten Holz, Herbert Bos (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Computers-- Access control-- Evaluation, Congresses,Computers-- Access control, Congresses,Malware (Computer software), Congresses
Classification :
QA76
.
9
.
A25


85. Detection of intrusions and malware, and vulnerability assessment
Author: / Christian Kreibich, Marko Jahnke (Eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures, Congresses,Computer networks, Access control, Congresses
Classification :
TK5105
.
59
.
D56
2010


86. Detection of intrusions and malware, and vulnerability assessment
Author: / Klaus Julisch, Christopher Kruegel (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computers--Access control--Congresses,Computers--Access control--Evaluation--Congresses,Computer networks--Security measures--Congresses,Computer security--Congresses,Intrusions,Malware,Vulnerability assessment,DIMVA
Classification :
QA
,
76
.
9
,.
A25
,
D563
,
2005


87. Detection of intrusions and malware, and vulnerability assessment
Author: Ulrich Flegel, Danilo Bruschi (eds.)
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computers, Access control, Congresses,Computers, Access control, Evaluation, Congresses,Computer networks, Security measures, Congresses,Computer security, Congresses,Malware (Computer software), Congresses,Eindringerkennung, Kongress, Como <2009>,Kryptoanalyse, Kongress, Como <2009>,Malware, Kongress, Como <2009>,Softwareschwachstelle, Kongress, Como <2009>,Zugriffskontrolle, Kongress, Como <2009>,Como (2009), swd,Kongress., swd,Eindringerkennung., swd,Kryptoanalyse., swd,Malware., swd,Softwareschwachstelle., swd,Zugriffskontrolle., swd
Classification :
QA
،
76
.
9
،.
A25
,
D563
،
2009


88. E-business and telecommunication networks
Author:
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Telecommunication--Security measures--Congresses,Signal processing--Congresses,Wireless communication systems--Congresses,Electronic commerce--Congresses,Computer networks--Congresses
Classification :
TK
,
5105
.
5
,
157135
,
2008
{
1648
},
3c04493cc6fb2a631804f7


89. E-business and telecommunications
Author: / [edited by] Joaquim Filipe, Mohammad S. Obaidat
Library: Library of Entrepreneurship (Tehran)
Subject: Computer networks -- Congresses,Electronic commerce -- Congresses,Telecommunication -- Security measures -- Congresses,Wireless communication systems -- Congresses,Signal processing -- Congresses
Classification :
TK
5105
.
5
.
I58
2008


90. EC2ND 2005 :
Author: Andrew Blyth (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses
Classification :
TK5105
.
59
.
E97
2006


91. Engineering secure software and systems
Author: Gilles Barthe, Benjamin Livshits, Riccardo Scandariato (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Software engineering, Congresses
Classification :
QA76
.
9
.
A25
E54
2011eb


92. Financial cryptography: First International Conference, FC'97, Anguilla, British West Indies, Feb. 24-28, 1997: proceedings
Author: FC'79 )7991: Anguilla(
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Electronic funds transfers-- Security measures-- Congresses,، Internet )Computer network(-- Security measures-- Congresses,، Computer networks-- Security measures-- Congresses,، Data encryption )Computer science(-- Congresses
Classification :
HG
1710
.
F35
1997


93. Financial cryptography (Online)
Author: Rafael Hirschfeld (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Electronic funds transfers-- Security measures, Congresses.,Internet-- Security measures, Congresses.

94. Financial cryptography and data security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Congresses. ; Data encryption (Computer science) ; Congresses. ; Electronic commerce ; Security measures ; Congresses. ; Electronic funds transfers ; Security measures ; Congresses. ; Internet ; Security measures ;

95. Financial cryptography: 4th international conference, FC 2000, Anguilla, British West Indies, February 20-24, 2000: proceedings
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Electronic funds transfers-- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Electronic commerce-- Security measures,Congresses ، Internet-- Security measures,Congresses ، Computer networks-- Security measures
Classification :
HG
1710
.
F35
2000


96. Financial cryptography: 8th international conference, FC 2004, Key West, FL, USA, February 9-12, 2004 : revised papers
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Electronic funds transfers-- Security measures,Congresses ، Data encryption )Computer science(,Congresses ، Electronic commerce-- Security measures,Congresses ، Internet-- Security measures,Congresses ، Computer networks-- Security measures
Classification :
HG
1710
.
F35
2004


97. First IEEE International Workshop on Critical Infrastructure Protection: proceedings: IWCIP 2005, 3-4 November 2005, Darmstadt, Germany
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computer networks-- Security measures,Prevention ، Cyberterrorism,Congresses ، Emergency management
Classification :
QA
76
.
9
.
A25
.
I339
2005


98. Foundations of security analysis and design III
Author: / Alessandro Aldini, Roberto Gorrieri, Fabio Martinelli (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Computer networks--Security measures--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
F685
,
2005


99. Foundations of security analysis and design IV :
Author: Alessandro Aldini, Roberto Gorrieri (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.

100. Future Network Systems and Security
Author: \ [Edited by] Robin Doss, Selwyn Piramuthu and Wei Zhou
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer science,کامپیوتر,a03,a03,Computer networks -- Congresses.,Computer networks -- Security measures -- Congresses.,شبکههای کامپیوتری -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
TK
5105
.
5
.
F8
2015
E-Book
,

