7. Advanced monitoring in P2P botnets :
Author: Shankar Karuppayah.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control.,Computer networks-- Security measures.,Malware (Computer software),Peer-to-peer architecture (Computer networks),Computer networks-- Access control.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Networking-- General.,Malware (Computer software),Mathematical physics.,Network hardware.,Peer-to-peer architecture (Computer networks)
Classification :
TK5105
.
59
.
K37
2018


8. Advances in communication, network, and computing :
Author: Vinu V. Das, Janahanlal Stephen (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Congresses.,Data mining -- Congresses.,Image processing -- Digital techniques -- Congresses.

10. Applied Cyber Security and the Smart Grid
Author: \ Eric D. Knapp, Raj Samani, Joel Langill, technical editor.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Smart power grids -- Security measures,Computer networks -- Security measures,شبکههای هوشمند توزیع برق -- تدابیر ایمنی,شبکههای کامپیوتری -- تدابیر ایمنی
Classification :
TK3105
.
K63P6
2013


12. BL,BL
Author: / Marshall G.S. Hodgson. ,20090530 0
Library: Library of Islamic Parliament (Tehran)
Subject:

13. Building virtual pentesting labs for advanced penetration testing :
Author: Kevin Cardwell.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Testing.,Computers-- Access control.,Computer networks-- Monitoring.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.
Classification :
TK5105
.
59


14. Building virtual pentesting labs for advanced penetration testing :
Author: Kevin Cardwell.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Testing.,Computers-- Access control.,Computer networks-- Monitoring.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.
Classification :
TK5105
.
59


15. Business data networks and security /
Author: Raymond R. Panko, University of Hawai'i at Mānoa, Julia L. Panko, Weber State University.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer networks-- Management.,Computer networks-- Security measures.,Computer security.,Business enterprises-- Computer networks-- Security measures.,Computer networks-- Management.,Computer networks-- Security measures.,Computer security.,Computersicherheit,Datensicherung,Rechnernetz
Classification :
HD30
.
37
.
P36
2019


16. Cisco security specialist's guide to PIX Firewal
Author: / Vitaly Osipov
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Computer network architectures.
Classification :
TK
,
5105
.
59
,.
O85
,
2002eb


17. Cisco security specialist's guide to PIX Firewall
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ; Computer network architectures. ;

18. Computational Intelligence and Intelligent Systems :
Author: Zhihua Cai ... [et al.] (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence.,Computer science.,Computer simulation.

19. Computer network security
Author: / Igor Kotenko, Victor Skormin (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures, Congresses,Computer networks, Access control, Congresses
Classification :
QA76
.
9
.
A25I58
2010


20. Computer network security
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses
Classification :
QA76
.
9
.
A25
I565
2012eb

