• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۶۱ پاسخ غیر تکراری از ۶۱ پاسخ تکراری در مدت زمان ۰,۶۶ ثانیه یافت شد.

1. A technical guide to IPSec virtual private networks /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: James S. Tiller.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Extranets (Computer networks)-- Security measures.,IPSec (Computer network protocol),COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,IPSec (Computer network protocol)

Classification :
TK5105
.
875
.
E87
T55
2001eb

2. AVIEN malware defense guide for the Enterprise /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: David Harley [and others] ; foreword by Robert S. Vibert.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Management.,Computer viruses.,Computer networks-- Security measures.,Computer security-- Management.,Computer viruses.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.

Classification :
QA76
.
9
.
A25
A873
2007eb

3. Check Point NG VPN-1/Firewall-1 :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Jim Noble [and others].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Computer programs.,Computer security-- Computer programs.,Firewalls (Computer security),Computer networks-- Security measures-- Computer programs.,Computer security-- Computer programs.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Firewalls (Computer security)

Classification :
QA76
.
9
.
A25
N63
2003eb

4. Computer security, privacy, and politics :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Ramesh Subramanian, editor.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Government policy.,Computer security.,Computer networks-- Security measures.,Computer security-- Government policy.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.

Classification :
QA76
.
9
.
A25
C6557
2008eb

5. Configuring Check Point NGX VPN-1/FireWall-1 /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Robert Stephens, Barry J. Stiefel, Stephen Watkins.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: FireWall-1.,Computer networks-- Security measures.,Firewalls (Computer security),Computer networks-- Security measures-- Computer programs.,Computer networks-- Security measures.,Computer security-- Computer programs.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Extranets (Computer networks),Firewalls (Computer security),Firewalls (Computer security)

Classification :
TK5105
.
59
.
S846
2005eb

6. Cryptology and network security :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Jan Camenisch, Panos Papadimitratos (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer Communication Networks.,Computers and Society.,Cryptology.,Information Systems and Communication Service.,Software Engineering/Programming and Operating Systems.,Computer networking & communications.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- Online Services-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Ethical & social aspects of IT.,Network hardware.,Software Engineering.

Classification :
QA76
.
9
.
A25

7. Cyber-security and global information assurance :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Kenneth J. Knapp [editor].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Management.,Cyberspace-- Security measures.,Data protection.,Information technology-- Security measures.,Computer networks-- Security measures.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.,Information technology-- Security measures.

Classification :
QA76
.
9
.
A25
C918
2009eb

8. Cyber threat intelligence /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Ali Dehghantanha, Mauro Conti, Tooska Dargahi, editors.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Internet-- Security measures.,Artificial intelligence.,Computer networking & communications.,Computer security.,Computer security.,COMPUTERS-- Security-- General.,Internet-- Security measures.,Network hardware.

Classification :
QA76
.
9
.
A25

9. Cybersecurity in Nigeria :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Aamo Iorliam.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Nigeria.,Computer security-- Nigeria.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Online Safety & Privacy.,Nigeria., 7

Classification :
QA76
.
9
.
A25

10. Cybersecurity today and tomorrow :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- United States.,Computer networks-- Security measures.,Computer security-- United States.,Computer security.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,United States., 7

Classification :
TK5105
.
59
.
C93
2002eb

11. Eliciting the requirements for intelligent systems in law enforcement /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Jeffrey L. Goldberg [and others].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Case studies.,Internet-- Security measures, Case studies.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Internet-- Security measures.

Classification :
TK5105
.
59
.
E45
2004eb

12. Fuzzing for software security testing and quality assurance /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Ari Takanen, Jared DeMott, Charlie Miller.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Computer software-- Development.,Logiciels-- Qualité-- Contrôle.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Sécurité informatique.,Computer networks-- Security measures.,Computer security.,Computer software-- Development.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.

Classification :
QA76
.
9
.
A25
T335
2008eb

13. Hack proofing Windows 2000 /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Chad Todd ; Norris L. Johnson, Jr., technical editor.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer Science.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Engineering & Applied Sciences.

Classification :
QA76
.
9
.
A25
T63
2001eb

14. Hacking exposed :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Joel Scambray, Stuart McClure, George Kurtz.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer security.,Computerbeveiliging.,Computernetwerken.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Hacking.

Classification :
TK5105
.
59
.
M48
2001eb

15. Hands-on cybersecurity with Blockchain :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Rajneesh Gupta.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Blockchains (Databases),Computer networks-- Security measures.,Computer security.,Database security.,Denial of service attacks.,Blockchains (Databases),Computer networks-- Security measures.,Computer security.,Computer security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Online Safety & Privacy.,Data capture & analysis.,Database security.,Denial of service attacks.,Network security.

Classification :
QA76
.
9
.
A25
G87
2018

16. How to cheat at managing information security /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Mark Osborne ; Paul M. Summitt, technical editor.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security-- Management.,Information technology-- Security measures.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Information technology-- Security measures.

Classification :
QA76
.
9
.
A25
O83
2006eb

17. How to cheat at securing Linux /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Mohan Krishnamurthy [and others].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Linux.,Linux.,Linux.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.

Classification :
TK5105
.
59
.
H683
2008eb

18. Human-computer interaction and cybersecurity handbook /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by Abbas Moallem

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention, Handbooks, manuals, etc.,Computer networks-- Security measures, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Technology and international relations.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Technology and international relations.

Classification :
TK5105
.
59
.
H86
2019eb

19. ISA server and beyond :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Thomas W. Shinder, Debra Littlejohn Shinder ; Martin Grasdal, technical editor.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Microsoft ISA server.,Microsoft ISA server.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.

Classification :
TK5105
.
59
.
S55
2002eb

20. (ISC)² CISSP certified information systems security professional official study guide /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Mike Chapple, James Michael Stewart, Darril Gibson.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Examinations, Study guides.,Electronic data processing personnel-- Certification.,Telecommunications engineers-- Certification.,Computer networks-- Security measures-- Examinations.,Computer security-- Examinations.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Electronic data processing personnel-- Certification.,Telecommunications engineers-- Certification.

Classification :
QA76
.
3
.
C4255
2018
  • »
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival