• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۱۶۵ پاسخ غیر تکراری از ۱۶۷ پاسخ تکراری در مدت زمان ۰,۶۱ ثانیه یافت شد.

81. Intrusion detection with Snort /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Jack Koziol.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.

Classification :
TK5105
.
59
.
K69
2003eb

82. Intrusion prevention fundamentals

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Earl Carter, Jonathan Hogue

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Computer networks- Access control,Computer security,intrusion prevention system

Classification :
TK5105
.
59
.
C385
2006

83. Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Sharma, Himanshu

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Penetration testing )Computer security(,، Computer security,، Computers -- Access control,، Computer networks -- Security measures

Classification :
QA
76
.
9
.
A25S522

84. Kali Linux network scanning cookbook

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Justin Hutchens

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25
H883
2014

85. Keep your kids safe on the Internet /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Simon Johnson.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer network resources-- Evaluation.,Computer networks-- Access control.,Computer networks-- Security measures.,Internet-- Access control.,Internet and children.,Internet-- Security measures.,Internet-- Access control.,Computer network resources-- Evaluation.,Computer networks-- Access control.,Computer networks-- Security measures.,Internet-- Access control.,Internet and children.,Internet-- Security measures.

Classification :
HQ784
.
I58
J66
2004

86. Kerberos :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer networks ; Security measures. ; Computer networks ; Access control. ;

Classification :

87. Kerberos

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Jason Garman,On cover: Cross-platform authentication & single-sign-on..

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer networks--Access control,Computer networks--Security measures

Classification :
QA
,
76
.
9
,.
A25
,
G37
,
2003

88. Kerberos :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Jason Garman

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer networks , Security measures,Computer networks , Access control

Classification :
E-BOOK

89. Kerberos

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Jason Garman

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Computer networks- Access control

Classification :
TK5105
.
59
.
G375
2003

90. Managing security with Snort and IDS tools

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Kerry Cox and Christopher Gerg

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Snort (Computer file),Computer security,Computers- Access control,Computer networks- Security measures

Classification :
E-BOOK

91. Managing security with Snort and IDS tools

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Kerry Cox and Christopher Gerg

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Snort (Computer file),Computer security,Computers- Access control,Computer networks- Security measures

Classification :
TK5105
.
59
.
C65
2004

92. Metasploit

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: by David Kennedy ... [et al.]

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Testing,Computers-- Access control,Open source software,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25
M4865
2011

93. Metasploit Penetration Testing Cookbook :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Management.,Computers-- Access control.,Data protection.,Information technology-- Security measures.,Computer networking & communications.,Computer networks-- Security measures.,Computer security-- Management.,Computer security.,Computers-- Access control.,Computers-- Networking-- Security.,Computers-- Security-- General.,Computers-- System Administration-- General.,Data protection.,Information technology-- Security measures.,Network security.

Classification :
QA76
.
9
.
A25
.
T459
2018eb

94. Metasploit penetration testing cookbook

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Testing,Computers-- Access control,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25
S56
2012

95. Metasploit penetration testing cookbook

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Monika Agarwal, Abhinav Singh

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Testing,Computers-- Access control,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25
A34
2013

96. Network security assessment

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Chris McNab

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computers- Access control- Evaluation,Computer networks- Security measures- Evaluation

Classification :
QA76
.
9
.
A25
,
M4355
2008

97. Network security assessment

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Chris McNab

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computers- Access control- Evaluation,Computer networks- Security measures- Evaluation

Classification :
QA76
.
9
.
A25
,
M4355
2004

98. Network security tools

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Dhanjani, Nitesh

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Computer security,، Computer networks -- Security measures,، Computers -- Access control

Classification :
QA
76
.
9
.
A25D486

99. Network security tools

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Dhanjani, Nitesh

Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)

Subject: ، Computer security,Security measures ، Computer networks,Access control ، Computers

Classification :
QA
76
.
9
.
A25
D523
2005

100. Network security tools

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Nitesh Dhanjani and Justin Clarke

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer security,Computer networks- Security measures,Computers- Access control

Classification :
QA76
.
9
.
A25
,
D523
2005
  • »
  • 9
  • 8
  • 7
  • 6
  • 5
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival