121. Aspects of network and information security
Author: / edited by Evangelos Kranakis, Evgueni Haroutunian, and Elisa Shahbazia
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures,Information networks, Security measures
Classification :
E-BOOK

122. Aspects of network and information security
Author: edited by Evangelos Kranakis, Evgueni Haroutunian, and Elisa Shahbazian.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Information networks-- Security measures.

123. Assessing network security
Author: Lam, Kevin
Library: (Semnan)
Subject: Security measures ، Computer networks
Classification :
TK
5105
.
59
.
L3A8


124. Assessing network security /
Author: Kevin Lam, David LeBlanc, Ben Smith.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.

125. Assessing network security
Author: Lam, Kevin
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: ، Computer networks--Security measures
Classification :
TK
5105
.
59
.
L36
2004


126. Auditing IT infrastructures for compliance /
Author: Marty M. Weiss and Michael G. Solomon.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Compliance auditing.,Computer networks-- Security measures.,Computer security.,Compliance auditing.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25


127. Auditing cloud computing :
Author: [edited by] Ben Halpert
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures,Cloud computing-- Security measures,Data protection,Information technology-- Security measures
Classification :
HF5548
.
37
.
A93
2011


128. Authentication systems for secure networks
Author: Oppliger, Rolf
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,، Computers -- Access control,، Authentication,، Cryptography
Classification :
TK
5105
.
59
.
O62


129. Authentication systems for secure networks
Author: Oppliger, Rolf.
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer networks - Security measures , Computers - Access control , Authentication , Cryptography
Classification :
TK
5105
.
59
.
O77
1996


130. Automatic defense against zero-day polymorphic worms in communication networks
Author: Mohssen Mohammed, Al-Sakib Khan Pathan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer algorithms.,Computer networks-- Security measures.,Computer viruses.,Machine theory.

131. Autonomic and trusted computin
Author: / Chunming Rong ... [et al.] (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Autonomic computing--Congresses,Computer security--Congresses,Computer networks--Security measures--Congresses

132. Autonomic and trusted computing
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Autonomic computing ; Congresses. ; Computer security ; Congresses. ; Computer networks ; Security measures ; Congresses. ;

133. Autonomic and trusted computing: 5th international conference, ATC 2008, Oslo, Norway, June 23-25, 2008 ; proceedings
Author: Chunming Rong ... ]et al.[ )eds.(
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Congresses ، Autonomic conputing,Congresses ، Computer security,Security measures -- Congresses ، Computer networks
Classification :
QA
76
.
9
.
A97
A83
2008


134. Autonomous cyber deception :
Author: Ehab Al-Shaer, Jinpeng Wei, Kevin W. Hamlen, Cliff Wang.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25


135. BackTrack :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Testing.,Open source software.,Wireless communication systems-- Security measures-- Testing.
Classification :
TK5103
.
2


136. BackTrack 4
Author: Shakeel Ali, Tedi Heriyanto.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Evaluation.
Classification :
TK5105
.
59
.
A45
2011eb


137. BackTrack 5 wireless penetration testing
Author: Vivek Ramachandran
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Testing,Computers-- Access control,Penetration testing (Computer security),Wireless Internet-- Security measures
Classification :
TK5103
.
4885
R355
2011


138. Beautiful security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ;

139. Beautiful security
Author: / edited by Andy Oram and John Viega
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures
Classification :
TK
,
5105
.
59
,.
B423
,
2009


140. Becoming the hacker :
Author: Adrian Pruteanu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Hacking.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Hacking.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25

