121. Securite Internet
Author: / Solange Ghernaouti-Helie
Library: Faculty of Law and Political Sciences (Tehran)
Subject: Local area networks (Computer networks) -- Security measures,Internet -- Security measures,Data protection,Protection de l`information (informatique),Coupe-feu (securite informatique),Systemes informatiques -- Mesures de surete,Virus informatiques,Reseaux locaux (informatique) -- Mesures de surete,Internet -- Mesures de surete
Classification :
TK5105
.
87
.
G5S4


122. Security and privacy in social network
Author: / Yaniv Altshuler ... [et al., editors]
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Online social networks, Security measures,Data encryption (Computer science),Data protection,Computer crimes, Prevention,Electronic books
Classification :
E-BOOK

123. Security engineering for cloud computing
Author: / David G. Rosado...[et al.]
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Cloud computing -- Security measures,Computer security,Data protection,Computer networks -- Security measures
Classification :
QA
76
.
58
.
S4
2013


124. Security, privacy, and anonymity in computation, communication, and storage :
Author: Guojun Wang, Jinjun Chen, Laurence T. Yang (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Computer security.,Data protection.
Classification :
QA76
.
9
.
A25


125. The Executive guide to information security: threats, challenges, and solutions
Author: Mark Egan with Tim Mather
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection
Classification :
HF
،
5548
.
32
،.
E325
،
2005


126. The business case for network security
Author: / Catherine Paquet, Warren Saxe
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management
Classification :
TK5105
.
59
.
P37
2005


127. The business case for network security
Author: / Catherine Paquet, Warren Saxe
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management
Classification :
TK5105
.
59
.
P37
2005


128. The international handbook of computer security
Author: / Jae K. Shim, Anique A. Qureshi, Joel G. Siegel
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security Handbooks, manuals, etc,Data protection Handbooks, manuals, etc,Computer networks- Security measures Handbooks, manuals, etc
Classification :
QA76
.
9
.
A25
,
S468
2000


129. Topics in Cryptology – CT-RSA 2016
Author: \ Kazue Sako (Ed.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Data protection -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها ,حفاظت اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
QA
76
.
9
.
T6
2016
E-Book
,


130. Transparent user authentication
Author: / Nathan Clarke
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures,Computers, Access control,Data protection
Classification :
E-BOOK

131. Transparent user authentication biometrics, RFID and behavioural profiling
Author: / Nathan Clarke
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer networks, Security measures,Computers, Access control,Data protection
Classification :
TK5105
.
59
.
C575
2011


132. Tribe of Hackers :
Author: Marcus J. Carey & Jennifer Jin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,Computers.,Data protection.,Risk management.,Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Security-- Cryptography.,Computers.,Data protection.,Risk management.
Classification :
HF5548
.
37
C37
2019eb


133. Tribe of hackers :
Author: Marcus J, Carey and Jennifer Jin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,Data protection.,Risk management.,Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,Data protection.,Risk management.

134. counter hack
Author:
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Computer networks - Security measures,Data protection
Classification :
TK
5105
.
59
.
S57
2002


135. international handbook of computer security
Author: Shim, Jae K
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer security- Handbooks, manuals, etc ► Data protection- Handbooks, manuals, etc ► Computer networks- Security measures- Handbooks, Manuals, etc
Classification :
005
S556i

