1. Advanced Concepts for Intelligent Vision Systems.
Author: \ [Edited by] Sebastiano Battiato...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer science,کامپیوتر,a04,a04,Computer vision -- Congresses.,Computer security,بینایی ماشین -- کنگره ها ,کامپیوترها -- ایمنی اطلاعات
Classification :
TA
1634
.
A3
2015
E-Book
,


2. Computer Safety, Reliability, and Security
Author: \ Floor Koornneef, Coen van Gulijk (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,کامپیوترها, -- Congresses, -- کنگرهها, -- ایمنی اطلاعات,a03,a03,Computer systems -- Reliability -- Congresses,سیستمهای کامپیوتری -- اطمینانپذیری -- کنگره ها
Classification :
QA
76
.
9
.
A25
S34
2015
E-Book
,


3. Computer Safety, Reliability, and Security
Author: \ Floor Koornneef, Coen van Gulijk (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,کامپیوترها, -- Congresses, -- کنگرهها, -- ایمنی اطلاعات,a03,a03,Computer systems -- Reliability -- Congresses,سیستمهای کامپیوتری -- اطمینانپذیری -- کنگره ها
Classification :
QA
76
.
9
.
A25
S3
2015
E-Book
,


4. Cyber Security and privacy
Author: \ Frances Cleary , Massimo Felici (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer science,Computer networks,کامپیوتر,شبکههای کامپیوتری,a04,a05,a04,a05,Computer security -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها
Classification :
QA
76
.
9
.
C9
2015
E-Book
,


5. Decision and Game Theory for Security.
Author: \ MHR Khouzani , Emmanouil Panaousis, George Theodorakopoulos (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer science,کامپیوتر,a05,a05,Computer security --Congresses,Game theory -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,نظریه بازی -- کنگره ها
Classification :
QA
76
.
9
.
D4
2015
E-Book
,


6. Digital Forensics and Cyber Crime
Author: \ Joshua I. James , Frank Breitinger (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer science,کامپیوتر,a05,a05,Computer crimes -- Investigation -- Congresses.,Computer security -- Congresses.,جرایم کامپیوتری -- پیجویی -- کنگره ها,کامپیوترها -- ایمنی اطلاعات -- کنگرهها
Classification :
HV
8079
.
C65D5
2015
E-Book
,


7. Foundations and Practice of Security
Author: \ [Edited by] Frédéric Cuppens...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer science,کامپیوتر,a05,a05,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
QA
76
.
9
.
F68
2015
E-Book
,


8. Future Network Systems and Security
Author: \ [Edited by] Robin Doss, Selwyn Piramuthu and Wei Zhou
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer science,کامپیوتر,a03,a03,Computer networks -- Congresses.,Computer networks -- Security measures -- Congresses.,شبکههای کامپیوتری -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
TK
5105
.
5
.
F8
2015
E-Book
,


9. Human interactive proofs
Author: / Henry S. Baird, Daniel P. Lopresti (eds.).
Library: Library of College of Science University of Tehran (Tehran)
Subject: Pattern recognition systems,Computer security, -- Congresses, -- Congresses,a04,a07,Computer network protocols--Congresses.,Computers--Access control--Congresses.
Classification :
TK7882
.
P3
H57
2005


10. Information Security
Author: \ Javier Lopez , Chris J. Mitchell (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer science,کامپیوتر,a05,a05,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
QA
76
.
9
.
I5
2015
E-Book
,


11. Information Security Theory and Practice
Author: \ Raja Naeem Akram, Sushil Jajodia (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,کامپیوترها, -- Congresses, -- کنگرهها, -- ایمنی اطلاعات,a05,a05,Systems and Data Security,Data Encryption,Ubiquitous computing -- Congresses,سیستم ها و امنیت اطلاعات,رمزگذاری دادهها,محاسبه فراگیر -- کنگره ها
Classification :
QA
76
.
9
.
A25
W5
2015
E-Book
,


12. Information Security and Cryptology -- ICISC 2014
Author: \ Jooyoung Lee , Jongsung Kim (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer science,کامپیوتر,a05,a05,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses,امنیت کامپیوتر -- کنگره ها ,رمزگذاری دادهها -- کنگره ها
Classification :
QA
76
.
9
.
I5
2015
E-Book
,


13. Information security practice and experience
Author: / Robert H. Deng ... [et al.] (eds.)
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security,Computer networks,Data Protection, -- Congresses, -- Congresses, -- Congresses, -- Security measures,a04,a06,a08
Classification :
QA76
.
9
.
A25
I855
2005


14. Network and System Security
Author: \ [edited by] Meikang Qiu...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer science,Computer networks,کامپیوتر,شبکههای کامپیوتری,a04,a05,a04,a05,Computer security -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها
Classification :
QA
76
.
9
.
N4
2015
E-Book
,


15. Proceedings of International Conference on Smart Computing and Cyber Security
Author: Prasant Kumar Pattnaik, Mangal Sain, Ahmed A. Al-Absi, editors
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security, -- Congresses,a03

16. Public key cryptography
Author: / Serge Vaudenay (ed.).
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security,Data encryption (Computer science), -- Congresses, -- Congresses,a04,a06,Computers--Access control--Congresses.,Public key cryptography--Congresses.
Classification :
QA76
.
9
.
A25
I575
2005


17. Secure It Systems.
Author: \ Sonja Buchegger , Mads Dam (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer science,کامپیوتر,a04,a04,Computer security -- Congresses.,Computer security.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,امنیت کامپیوتر
Classification :
QA
76
.
9
.
S4
2015
E-Book
,


18. Security Protocols XXIII
Author: \ [edited by] Bruce Christianson...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer science,Computer networks,کامپیوتر,شبکههای کامپیوتری,a04,a05,a04,a05,Computer security -- Congresses.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها
Classification :
QA
76
.
9
.
S4
2015
E-Book
,


19. Security in pervasive computing
Author: / Dieter Hutter, Markus Ullmann (eds.).
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security, -- Congresses,a05,Ubiquitous computing--Congresses.
Classification :
QA76
.
5915
.
I58
2005


20. Theory of cryptography
Author: / Joe Kilian (ed.).
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security,Cryptography, -- Congresses, -- Congresses,a04,a06
Classification :
QA76
.
9
.
A25
T473
2005

