• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۳۳ پاسخ غیر تکراری از ۳۵ پاسخ تکراری در مدت زمان ۰,۴۷ ثانیه یافت شد.

1. A Question of Chemistry

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: John Garratt,Tina Overton ,Terry Threlfall

Library: Central Library and Document Center of Shahid Madani University of Azarbayjan (East Azarbaijan)

Subject: Computer security,Computer architecture

Classification :
QD
,
39
,.
G27Q8
,
1999

2. Advances in computers.

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by Marshall C. Yovits.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer science.,Computers.,Electronic data processing.,ARCHITECTURE (COMPUTERS),COMPUTER INFORMATION SECURITY.,COMPUTER NETWORKS.,Computer science.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Computers.,COMPUTERS.,DATA PROCESSING.,DESIGN ANALYSIS.,Electronic data processing.,MAN-COMPUTER INTERFACE.,PROTOCOL (COMPUTERS),U.S.S.R., 7

Classification :
QA76
.
A3eb
vol
.
29

3. Architecting secure software systems

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Asoke K. Talukder, Manish Chaitanya

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer security.,Computer architecture.,Computer networks--Security measures

Classification :

4. Architecting secure software systems

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Asoke K. Talukder, Manish Chaitanya

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer security.,Computer architecture.,Computer networks--Security measures

Classification :
QA
,
76
.
9
,.
A25
,
T34
,
2009

5. Architecting secure software systems

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer security. ; Computer architecture. ; Computer networks ; Security measures. ; Computer architecture. ; fast ; (OCoLC)fst00872026 ; Computer networks ; Security measures. ; fast ; (OCoLC)fst00872341 ; Computer security. ; fast ; (OCoLC)fst00872484

Classification :

6. Architecting secure software systems

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Talukder, Asoke K.,Asoke K. Talukder, Manish Chaitanya

Library: Library and Documentation Center of Kurdistan University (Kurdistan)

Subject: ، Computer security,، Computer architecture,، Computer network

Classification :
QA
76
.
9
.
A25
T34
2009

7. CORBA security: an introduction to safe computing with objects

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Blakley, Bob.

Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)

Subject: ، Computer security,، CORBA )Computer architecture(,، Object-oriented methods )Computer science(

Classification :
QA
76
.
9
.
A25
B58
2000

8. CORBA security : an introduction to safe computing with objects

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Blakley, Bob, 0691-

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Computer security,، CORBA )Computer architecture(,، Object-oriented methods )Computer science(

Classification :
QA
76
.
9
.
A25B53

9. Computer architecture and security :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Shuangbao (Paul) Wang, Robert S. Ledley

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer architecture,Computer security,System design

Classification :
QA76
.
9
.
A73
W36
2013

10. Developing secure distributed systems with CORBA /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Ulrich Lang, Rudolf Schreiner

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security,CORBA (Computer architecture),Distributed operating systems (Computers)

Classification :
QA76
.
9
.
A73
L36
2002

11. Disruptive security technologies with mobile code and peer-to-peer networks

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / R.R. Brooks

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Peer-to-peer architecture (Computer networks),Computer networks--Security measures,Computer viruses.

Classification :
TK5105
.
525
.
B76
2005

12. Enterprise security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Aaron Woody

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business-- Data processing,Computer architecture,Computer security

Classification :
TK5103
.
4885
.
W384
2013

13. Enterprise security architecture :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: John Sherwood, Andrew Clark, David Lynas

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business-- Data processing,Computer architecture,Computer security

Classification :
QA76
.
9
.
A25

14. Enterprise security with EJB and CORBA

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Hartman, Bret.,Bret Hartman, Donald Flinn, Konstantin Beznosov

Library: Library and Documentation Center of Kurdistan University (Kurdistan)

Subject: ، JavaBeans,، Electronic commerce , Security measures,، Business enterprises , Computer networks , Security measures,، Java )Computer program language(,، CORBA )Computer architecture(,، Electronic books. , local

Classification :
HF
5548
.
32
.
H372
2001eb

15. Information security architecture

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Jan Killmeyer,Tudor

Library: Central Library and Documents Center of Tehran University (Tehran)

Subject: Computer security,Computer architecture

Classification :
QA
76
.
9
.
A25T83

16. Information security architecture :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Jan Killmeyer Tudor.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer architecture.,Computer security.,Computer architecture.,COMPUTER INFORMATION SECURITY.,COMPUTER NETWORKS.,COMPUTER PROGRAM INTEGRITY.,Computer security.,COMPUTER VIRUSES.,COMPUTERS.,Computersicherheit,OPERATING SYSTEMS (COMPUTERS)

Classification :
QA76
.
9
.
A25
T83
2001

17. Information security architecture

پدیدآورنده : Jan Killmeyer Tudor

موضوع : Computer security,Computer architecture

۲ نسخه از این کتاب در ۲ کتابخانه موجود است.

18. Information security architecture: an integrated approach to security in the organization

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Tudor, Jan Killmeyer

Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)

Subject: ، Computer security,، Computer architecture

Classification :
QA
76
.
9
.
A25
T83
2006

19. Internet of Things for architects :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Perry Lea.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Architecture-- Technological innovations.,Computer architecture.,Computer network architectures-- Security measures.,Internet of things.,Architecture-- Technological innovations.,Cloud computing.,Computer architecture & logic design.,Computer architecture.,Computer networking & communications.,COMPUTERS / Computer Literacy.,COMPUTERS / Computer Science.,COMPUTERS / Data Processing.,COMPUTERS / Hardware / General.,COMPUTERS / Information Technology.,COMPUTERS / Machine Theory.,COMPUTERS / Reference.,Internet of things.

Classification :
TK5105
.
8857

20. Official (ISC)² guide to the ISSAP CBK /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by Harold F. Tipton.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer architecture-- Examinations, Study guides.,Computer networks-- Examinations, Study guides.,Computer security-- Examinations, Study guides.,Electronic data processing personnel-- Certification.

Classification :
  • »
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival