141. Snort for dummies
Author: / by Charlie Scott, Paul Wolfe, and Bert Hayes
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computers- Access control
Classification :
TK5105
.
59
.
S388
2004


142. Snort for dummies
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ; Computer security. ; Computers ; Access control. ; Snort (Software) ; fast ; (OCoLC)fst01792875 ; Intrusion detection systems (Computer security) ; fast ; (OCoLC)fst01762593 ;

143. Spring Security 3.x cookbook
Author: Anjana Mankale
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Application software-- Access control,Application software-- Security measures,Computer networks-- Security measures,Java (Computer program language)
Classification :
QA76
.
76
.
A65
M36
2013


144. Sudo mastery :
Author: by Michael W. Lucas.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Access control.,Computer networks -- Security measures.,Data encryption (Computer science)
Classification :
TK5105
.
59
B965
2013


145. Tableaux de bord de la sécurité réseau /
Author: Cédric Llorens, Laurent Levier, Denis Valois ; avec la contribution de Olivier Salvatori.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computers-- Access control.,Réseaux d'ordinateurs-- Sécurité-- Mesures, Cas, Études de.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Computer networks-- Security measures.,Computers-- Access control.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
L56
2006eb


146. The Browser Hacker's Handbook /
Author: Wade Alcorn, Christian Frichot, Michele Orrù.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Browsers (Computer programs)-- Security measures.,Computer networks-- Access control.,Computer networks-- Security measures.
Classification :
QA76
.
9
.
A25
.
A384
2014
.
A393
2014


147. The Stephen Cobb complete book of PC and LAN security
Author: / by Stephen Cobb,Cobb
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Local area networks (Computer networks) -- Security measures,Computers -- Access control
Classification :
TK
5105
.
7
.
C62
1992


148. The Stephen Cobb complete book of PC and LAN security
Author: / Stephen Cobb
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Local area networks (Computer networks),Computer - Access control,-- Security measures
Classification :
005
.
8
C653S


149. The antivirus hacker's handbook /
Author: Joxean Koret, Elias Bachaalany
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control,Computer networks-- Security measures, Handbooks, manuals, etc,Computer security, Handbooks, manuals, etc
Classification :
QA76
.
9
.
A25


150. The basics of digital privacy :
Author: Denny Cherry ; technical editor, Thomas LaRock
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control
Classification :
QA76
.
9
.
A25
C438
2014


151. The hacker's handboo
Author: / Susan Young, Dave Aitel
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Computer networks--Access control,Hackers.
Classification :
TK
,
5105
.
59
,.
Y68
,
2004


152. The hacker's handbook: the strategy behind breaking into and defending networks
Author: Young, Susan )Susan Elizabeth(
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer networks-- Security measures,، Computer networks-- Access control,، Computer hackers
Classification :
TK
5105
.
59
.
Y68
2004


153. The state of the art in intrusion prevention and detection
Author: edited by Al-Sakib Khan Pathan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures.,Computer security.,Computers -- Access control.
Classification :
QA76
.
9
.
A25
E358
9999


154. Transparent user authentication
Author: / Nathan Clarke
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures,Computers, Access control,Data protection
Classification :
E-BOOK

155. Transparent user authentication biometrics, RFID and behavioural profiling
Author: Clarke, Nathan.,Nathan Clarke
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Computer networks, Security measures,، Computers, Access control,، Data protection
Classification :
TK
5105
.
59
.
C575
2011


156. Trusted computing platforms
Author: / Siani Pearson, editor
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security- Standards,Computer networks- Security measures,Electronic information resources- Access control
Classification :
QA76
.
9
.
A25
,
T75
2003


157. Tutorial computer and network security
Author: Abrams, Marshall D.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Access control ، Computers,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
A27
1987


158. UTM security with Fortinet
Author: Kenneth Tam ... [et al.]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control,Computer networks-- Security measures
Classification :
TK5105
.
59
.
U86
2013


159. Windows Server 2003 networking recipes
Author: Robbie Allen, Laura E. Hunter, and Bradley J. Dinerman
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Microsoft Windows server,Computer networks-- Access control,Computer networks-- Security measures,Internet

160. 802.1X port-based authenticatio
Author: / Edwin Lyle Brown
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Standards,Computers--Access control--Standards,Computer network protocols.
Classification :
TK
,
5105
.
59
,.
B765
,
2007

