21. A classical introduction to cryptography exercise book
Author: / by Thomas Baigneres ... [et al.]
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security,Cryptography,Cryptography -- Problems, exercises, etc
Classification :
QA
76
.
9
.
A25
C544
2006


22. A classical introduction to cryptography exercise book
Author: by Thomas Baigneres ... ]et al.[
Library: Central Library and Documentation Center (Semnan)
Subject: ، Computer security,، Cryptography,Problems, exercises, etc ، Cryptography
Classification :
QA
76
.
9
.
A25
C544
2006


23. A complete guide to Burp Suite :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ;

24. A comprehensive guide to virtual private networks [electronic resource]
Author: / [Martin Murhammer ... [et al.]
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Extranets (Computer networks),Business enterprises--computer networks,Internet,Computer networks--Security measures
Classification :
EB
,
TK5105
.
875
.
E87
,
C65
1998

25. A cryptography primer :
Author: Philip N. Klein, Brown University, Providence, Rhode Island
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Data encryption (Computer science),Digital signatures,Telecommunication-- Safety measures
Classification :
QA76
.
9
.
A25
K557
2014


26. A guide to computer network securit
Author: / Joseph Migga Kizza
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures
Classification :
TK
,
5105
.
59
,.
K584
,
2009


27. A guide to computer network security
Author: Kizza, Joseph Migga
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer networks-- Security measures
Classification :
TK
5105
.
59
.
K59
2009


28. A guide to computer network security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ;

29. A leader's guide to cybersecurity :
Author: Thomas J. Parenty, Jack J. Domet.,Parenty, Thomas J.,
Library: Library of Entrepreneurship (Tehran)
Subject: Computer security.,Boards of directors.,Organizational behavior.,Business planning.
Classification :
QA76
.
9
.
A25
P375
2019


30. A management approach to data base applications
Author: / david avison, christine cuthbertson
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Database management,Computer security- United States,United States.- Privacy Act of 1974
Classification :
QC100
.
A857
2002


31. A multidisciplinary introduction to information security /
Author: [edited by] Stig F. Mjølsnes
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Multidisciplinary design optimization
Classification :
QA76
.
9
.
A25
M845
2012


32. A practical guide to TPM 2.0 :
Author: Will Arthur, David Challener, Kenneth Goldman
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Computer Science.,Data Encryption.,Software Engineering/Programming and Operating Systems.
Classification :
QA76
.
9
.
A25


33. A practical guide to managing information securit
Author: / Steve Purser
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Management,Data protection.
Classification :
QA
,
76
.
9
,.
A25
,
P88
,
2004eb


34. A practical guide to managing information security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Management. ; Data protection. ;

35. A practical guide to managing information security /
Author: Steve Purser.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management.,BUSINESS & ECONOMICS-- Corporate Governance.,BUSINESS & ECONOMICS-- Leadership.,BUSINESS & ECONOMICS-- Organizational Development.,BUSINESS & ECONOMICS-- Workplace Culture.,Computer Science.,Computer security-- Management.,Engineering & Applied Sciences.
Classification :
QA76
.
9
.
A25
P88
2004eb


36. A practical guide to managing information security
Author: / Steve Purser
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security- Management
Classification :
QA76
.
9
.
A25
,
P88
2004


37. A practical guide to managing information security
Author: Purser, Steve
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Management ، Computer security
Classification :
QA
76
.
9
.
A25P87


38. A practical guide to managing information security
Author: / Steve Purser
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security- Management
Classification :
QA76
.
9
.
A25
,
P88
2004


39. A practical guide to security engineering and information assurance
پدیدآورنده : Herrmann, Debra S
موضوع : ، Computer security,، Data protection
۳ نسخه از این کتاب در ۳ کتابخانه موجود است.
40. <A> practical guide to security engineering and information assurance
Author: Herrmann, Debra S.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Computer security,، Data protection
Classification :
QA
76
.
9
.
A25
H47

