• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۳ پاسخ غیر تکراری از ۳ پاسخ تکراری در مدت زمان ۰,۳۶ ثانیه یافت شد.

1. Applied security visualization /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Raffael Marty

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Computer security,Information visualization

Classification :
TK5105
.
59
.
M369
2009

2. Data-driven security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Jay Jacobs + Bob Rudis

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Computer security,Information visualization

Classification :
QA76
.
9
.
A25
J324
2014

3. Understanding intrusion detection through visualization

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / by Stefan Axelsson, David Sands

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer networks--Security measures,Information visualization.,Computer security.

Classification :
TK
,
5105
.
59
,.
A95
,
2006
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival