41. Introduction to computer and network security :
Author: Richard R. Brooks, Clemson University, South Carolina, USA
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Data encryption (Computer science),Data protection
Classification :
QA76
.
9
.
A25
B7745
2014


42. Kryptologie :
Author: von Albrecht Beutelspacher.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25
V663
2002


43. Mobile authentication
Author: Markus Jakobsson
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Data encryption (Computer science),Data protection
Classification :
QA76
.
9
.
A25
J35
2013


44. Multimedia content encryption
Author: / Shiguo Lian
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Multimedia systems--Security measures,Data encryption (Computer science),Data protection.

45. Multimedia content encryption: techniques and applications
Author: / Shiguo Lian
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Multimedia systems,Data encryption (Computer science),Data protection,-- Security measures
Classification :
005
.
82
L693M
2009


46. Multimedia content encryption: techniques and applications
Author: Lian, Shiguo
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Multimedia systems ► Data encryption (Computer science) ► Data protection
Classification :
L693m

47. Multimedia forensics and security /
Author: Chang-Tsun Li [editor]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Data protection,Multimedia systems-- Security measures
Classification :
QA76
.
575
.
M83187
2009


48. Multimedia forensics and security
Author: / Chang-Tsun Li [editor]
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Multimedia systems- Security measures,Data encryption (Computer science),Data protection
Classification :
QA76
.
575
.
M831
2009


49. Practical Hadoop security /
Author: Bhushan Lakhe
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Apache Hadoop,Data encryption (Computer science),Data protection,Database security
Classification :
QA76
.
9
.
D314
L35
2014


50. Privacy technologies and policy :
Author: Manel Medina, Andreas Mitrakas, Kai Rannenberg, Erich Schweighofer, Nikolaos Tsouroulas (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer security.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25


51. Privacy technologies and policy :
Author: Maurizio Naldi, Giuseppe F. Italiano, Kai Rannenberg, Manel Medina, Athena Bourka (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer security.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25


52. Provable Security : 11th International Conference, ProvSec 2017 Xian, China, October 23 25, 2017 Proceedings
Author: Editors Tatsuaki Okamoto, Man Ho Au, Yong Yu, Yannan Li
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security -- Congresses,، Data encryption )Computer science( -- Congresses,، Data protection -- Congresses
Classification :
QA
76
.
9
.
A25P787
2017


53. Provable security.
Author: \ Man-Ho Au, Atsuko Miyaji (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,Data encryption (Computer science),Data Protection,کامپیوترها,رمزگذاری دادهها,حفاظت اطلاعات , -- Congresses, -- Congresses, -- Congresses, -- کنگرهها, -- کنگرهها, -- کنگرهها, -- ایمنی اطلاعات,a03,a05,a07,a03,a05,a07
Classification :
QA
76
.
9
.
A25
P7
2015
E-Book
,


54. Provable security :
Author: Joonsang Baek, Willy Susilo, Jongkil Kim (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer Systems Organization and Communication Networks.,Computing Milieux.,Cryptology.,Data Structures and Information Theory.,Software Engineering/Programming and Operating Systems.,Algorithms & data structures.,Computer networking & communications.,Computer security.,Computers-- Hardware-- General.,Computers-- Information Theory.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Data protection.,Information technology: general issues.,Software Engineering.
Classification :
QA76
.
9
.
A25


55. Provable security
Author: Tsuyoshi Takagi ... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
P76
2012eb


56. Public-Key Cryptography - PKC 2013 :
Author: edited by Kaoru Kurosawa, Goichiro Hanaoka.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science -- Congresses.,Data encryption (Computer science) -- Congresses.,Data protection -- Congresses.
Classification :
QA76
.
9
.
A25
E358
2013


57. Secure data management : VLDB 2004 workshop, SDM 2004, Toronto, Canada, August 30, 2004 : proceedings
Author: Willem Jonker, Milan Petkovic )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Database security,Congresses ، Data encryption )Computer science(,Congresses ، Data protection,Congresses ، Computers -- Access control,Congresses ، Database management
Classification :
QA
76
.
L28
Vol
.
3178


58. Secure data management : second VLDB Workshop, SDM 2005, Trondheim, Norway, September 2-3, 2005 : proceedings
Author: Willem Jonker, Milan Petkovic )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Database security,Congresses ، Data encryption )Computer science(,Congresses ، Data protection,Congresses ، Computers -- Access control,Congresses ، Database management
Classification :
QA
76
.
L28
Vol
.
3674


59. Securing digital video
Author: / Eric Diehl
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Digital video--Security measures,Digital rights management.,Data protection.,Data encryption (Computer science)
Classification :
TK6680
.
5
.
D54
2012


60. Securing digital video
Author: Eric Diehl
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Data protection,Digital rights management,Digital video-- Security measures
Classification :
TK6680
.
5
.
D54
2012eb

