• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۱۶۵ پاسخ غیر تکراری از ۱۶۷ پاسخ تکراری در مدت زمان ۰,۲۲ ثانیه یافت شد.

121. Security SAGE's guide to hardening the network infrastructure

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Steven AndrouAoes, Brian Kenyon

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer networks , Security measures , Handbook, manuals, etc,Computers , Access control , Handbook, manuals, etc,ETSPASTRAD,Ressources internet

Classification :
E-BOOK

122. Security and trust management :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Rafael Accorsi, Silvio Ranise (eds.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses

Classification :
QA76
.
9
.
A25
S76
2013

123. Security in computing and communications :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Sabu M. Thampi, Pradeep K. Atrey, Chun-I Fan, Gregorio Martinez Perez (eds.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses,Computers-- Access control, Congresses

Classification :
TK5105
.
59
.
S73
2013

124. Security information and event management )SIEM( implementation

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: David R. Miller ... ]et al.[

Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)

Subject: Security measures ، Computer networks,Access control ، Computers,، Application logging )Computer science(

Classification :
TK
5105
.
59
.
S4425
2011

125. Security information and event management (SIEM) implementation /

پدیدآورنده : David R. Miller ... [et al.]&

موضوع : Computer networks- Security measures,Computers- Access control,Application logging (Computer science)

۲ نسخه از این کتاب در ۲ کتابخانه موجود است.

126. Security information and event management (SIEM) implementation

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / David R. Miller ... [et al.]

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer networks, Security measures,Computers, Access control,Application logging (Computer science)

Classification :
‭
TK5105
.
59
‬ ‭.
S4425
2011
‬

127. Security intelligence :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Qing Li, Gregory Clark

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Electronic information resources-- Access control.,Computer networks-- Security measures. World Wide Web-- Security measures.,Computer science.,Network security.

Classification :
TK5105
.
59

128. Security intelligence :a practitioner's guide to solving enterprise security challenges

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Li, Qing

Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)

Subject: Access control ، Electronic information resources,Security measures ، Computer networks,، Computer security,Access control ، Electronic information resources

Classification :
TK
5105
.
59
.
L52

129. Security mechanisms for computer networks

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Sead Muftic, P. Christofferson ... [et all]

Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)

Subject: Computers - Access control,Computer networks - Security measures

Classification :
QA76
.
9
.
A25M84
1989

130. Security technology

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Dominik aSl?ezak ... [et al.] (eds.)

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer security--Congresses,Computer networks--Access control--Congresses,Computer networks--Security measures--Congresses

Classification :
QA
,
76
.
9
,.
A25
,
S374
,
2009

131. Security technology

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer security ; Congresses. ; Computer networks ; Access control ; Congresses. ; Computer networks ; Security measures ; Congresses. ;

Classification :

132. Security technology, disaster recovery and business continuit

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Tai-hoon Kim ... [et al.], (eds.)

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer security--Congresses,Computer networks--Security measures--Congresses,Computer networks--Access control--Congresses,Data protection--Congresses

Classification :
QA
,
76
.
9
,.
A25
,
S374
,
2010

133. Security technology, disaster recovery and business continuity

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer security ; Congresses. ; Computer networks ; Security measures ; Congresses. ; Computer networks ; Access control ; Congresses. ; Data protection ; Congresses. ;

Classification :

134. Security threat mitigation and response

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Dale Tesch and Greg Abelar

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Computer networks- Access control,Computer security- Evaluation,Electronic countermeasures,Firewalls (Computer security),Internet- Security measures

Classification :
TK5105
.
59
.
T47
2007

135. Snor

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / featuring Jay Beale and members of the Snort team, Andrew R. Baker, Joel Esler

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Snort (Computer file),Computer networks--Security measures,Computers--Access control,Computer security.

Classification :
TK
,
5105
.
59
,.
B42
,
2007

136. Snort

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / featuring Jay Beale and members of the Snort team, Andrew R. Baker, Joel Esler

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Computers- Access control,Computer security,Snort (Computer file)

Classification :
TK5105
.
59
.
B42
2007

137. Snort

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / featuring Jay Beale and members of the Snort team, Andrew R. Baker, Joel Esler

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer networks- Security measures,Computers- Access control,Computer security,Snort (Computer file)

Classification :
E-BOOK

138. Snort 2.1 Intrusion Detection

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Featuring the Snort Development Team Andrew R. Baker, Brian Caswell, Mike Poor

Library: Library of Urmia University of Technology (West Azarbaijan)

Subject: Computer networks- Security measures,Computers- Access control,Computer security,Snort (Computer file)

Classification :
TK
,
5105
.
59
,.
B42S7
,
2004

139. Snort cookbook

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Angela Orebaugh, Simon Biles and Jacob Babbin

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Computer security,Computers- Access control

Classification :
TK5105
.
59
.
O785
2005

140. Snort for Dummies

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: \ by Charlie Scott, Paul Wolfe, and Bert Hayes

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Computer networks--Security measures,Computer security,Computers--Access control,شبکه‌های کامپیوتری -- تدابیر ایمنی,امنیت رایانه‌ای,کامپیوترها -- کنترل دستیابی

Classification :
E-Book
,
  • »
  • 9
  • 8
  • 7
  • 6
  • 5
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival