• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۱۶۵ پاسخ غیر تکراری از ۱۶۷ پاسخ تکراری در مدت زمان ۰,۵۲ ثانیه یافت شد.

141. Snort for dummies

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / by Charlie Scott, Paul Wolfe, and Bert Hayes

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Computer security,Computers- Access control

Classification :
TK5105
.
59
.
S388
2004

142. Snort for dummies

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer networks ; Security measures. ; Computer security. ; Computers ; Access control. ; Snort (Software) ; fast ; (OCoLC)fst01792875 ; Intrusion detection systems (Computer security) ; fast ; (OCoLC)fst01762593 ;

Classification :

143. Spring Security 3.x cookbook

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Anjana Mankale

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Application software-- Access control,Application software-- Security measures,Computer networks-- Security measures,Java (Computer program language)

Classification :
QA76
.
76
.
A65
M36
2013

144. Sudo mastery :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: by Michael W. Lucas.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks -- Access control.,Computer networks -- Security measures.,Data encryption (Computer science)

Classification :
TK5105
.
59
B965
2013

145. Tableaux de bord de la sécurité réseau /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Cédric Llorens, Laurent Levier, Denis Valois ; avec la contribution de Olivier Salvatori.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computers-- Access control.,Réseaux d'ordinateurs-- Sécurité-- Mesures, Cas, Études de.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Computer networks-- Security measures.,Computers-- Access control.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.

Classification :
QA76
.
9
.
A25
L56
2006eb

146. The Browser Hacker's Handbook /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Wade Alcorn, Christian Frichot, Michele Orrù.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Browsers (Computer programs)-- Security measures.,Computer networks-- Access control.,Computer networks-- Security measures.

Classification :
QA76
.
9
.
A25
.
A384
2014
.
A393
2014

147. The Stephen Cobb complete book of PC and LAN security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / by Stephen Cobb,Cobb

Library: Central Library and Documents Center of Tehran University (Tehran)

Subject: Local area networks (Computer networks) -- Security measures,Computers -- Access control

Classification :
TK
5105
.
7
.
C62
1992

148. The Stephen Cobb complete book of PC and LAN security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Stephen Cobb

Library: Central Library and Archive Center of shahid Beheshti University (Tehran)

Subject: Local area networks (Computer networks),Computer - Access control,-- Security measures

Classification :
005
.
8
C653S

149. The antivirus hacker's handbook /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Joxean Koret, Elias Bachaalany

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Access control,Computer networks-- Security measures, Handbooks, manuals, etc,Computer security, Handbooks, manuals, etc

Classification :
QA76
.
9
.
A25

150. The basics of digital privacy :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Denny Cherry ; technical editor, Thomas LaRock

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Computer security,Computers-- Access control

Classification :
QA76
.
9
.
A25
C438
2014

151. The hacker's handboo

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Susan Young, Dave Aitel

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer networks--Security measures,Computer networks--Access control,Hackers.

Classification :
TK
,
5105
.
59
,.
Y68
,
2004

152. The hacker's handbook: the strategy behind breaking into and defending networks

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Young, Susan )Susan Elizabeth(

Library: Central Library of Sharif University of Technology (Tehran)

Subject: ، Computer networks-- Security measures,، Computer networks-- Access control,، Computer hackers

Classification :
TK
5105
.
59
.
Y68
2004

153. The state of the art in intrusion prevention and detection

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by Al-Sakib Khan Pathan.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks -- Security measures.,Computer security.,Computers -- Access control.

Classification :
QA76
.
9
.
A25
E358
9999

154. Transparent user authentication

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Nathan Clarke

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer networks, Security measures,Computers, Access control,Data protection

Classification :
E-BOOK

155. Transparent user authentication biometrics, RFID and behavioural profiling

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Clarke, Nathan.,Nathan Clarke

Library: Library and Documentation Center of Kurdistan University (Kurdistan)

Subject: ، Computer networks, Security measures,، Computers, Access control,، Data protection

Classification :
TK
5105
.
59
.
C575
2011

156. Trusted computing platforms

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Siani Pearson, editor

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer security- Standards,Computer networks- Security measures,Electronic information resources- Access control

Classification :
QA76
.
9
.
A25
,
T75
2003

157. Tutorial computer and network security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Abrams, Marshall D.

Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)

Subject: Access control ، Computers,Security measures ، Computer networks

Classification :
QA
76
.
9
.
A25
A27
1987

158. UTM security with Fortinet

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Kenneth Tam ... [et al.]

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Access control,Computer networks-- Security measures

Classification :
TK5105
.
59
.
U86
2013

159. Windows Server 2003 networking recipes

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Robbie Allen, Laura E. Hunter, and Bradley J. Dinerman

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Microsoft Windows server,Computer networks-- Access control,Computer networks-- Security measures,Internet

Classification :

160. 802.1X port-based authenticatio

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Edwin Lyle Brown

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer networks--Security measures--Standards,Computers--Access control--Standards,Computer network protocols.

Classification :
TK
,
5105
.
59
,.
B765
,
2007
  • »
  • 9
  • 8
  • 7
  • 6
  • 5
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival