• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۱۲ پاسخ غیر تکراری از ۱۲ پاسخ تکراری در مدت زمان ۲,۰۰ ثانیه یافت شد.

1. Applied Network Security.

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business enterprises-- Computer networks-- Security measures.,Computer networks-- Security measures.,Business enterprises-- Computer networks-- Security measures.,Computer networks-- Security measures.

Classification :
T55
.
4-60
.
8

2. Becoming the hacker :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Adrian Pruteanu.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Hacking.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Hacking.,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25

3. Business data networks and security /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Raymond R. Panko, University of Hawai'i at Mānoa, Julia L. Panko, Weber State University.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business enterprises-- Computer networks-- Security measures.,Computer networks-- Management.,Computer networks-- Security measures.,Computer security.,Business enterprises-- Computer networks-- Security measures.,Computer networks-- Management.,Computer networks-- Security measures.,Computer security.,Computersicherheit,Datensicherung,Rechnernetz

Classification :
HD30
.
37
.
P36
2019

4. Essential skills for hackers /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Kevin Cardwell ; contributing editor, Henry Dalziel.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Access control.,Computer networks-- Security measures.,Computer security.,Hacking.

Classification :
QA76
.
9
.
A25
C37
2016

5. Ethical hacking and countermeasures /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: EC-Council Council.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Secuity measures-- Examinations, Study guides.,Computers-- Access control-- Examinations, Study guides.,Electronic data processing personnel-- Certification.,Penetration testing (Computer security),Telecommunications engineers-- Certification.

Classification :
QA76
.
9
.
A25
E865
2010

6. Handbook of research on information and cyber security in the fourth industrial revolution /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Ziska Fields, University of KwaZulu-Natal, South Africa.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Confidential communications-- Protection.,Electronic information resources-- Access control.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Electronic information resources-- Access control.

Classification :
TK5105
.
59
.
P744
2018e

7. Implementing NAP and NAC security technologies :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Daniel V. Hoffman.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer network protocols.,Computer networks -- Access control.,Computer networks -- Security measures.

Classification :

8. Network security tools

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Dhanjani, Nitesh

Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)

Subject: ، Computer security,Security measures ، Computer networks,Access control ، Computers

Classification :
QA
76
.
9
.
A25
D523
2005

9. Network security tools

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Nitesh Dhanjani and Justin Clarke

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Computer security,، Computer networks -- Security measures,، Computers -- Access control

Classification :
QA
76
.
9
.
A25D486

10. Network security tools

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Nitesh Dhanjani and Justin Clarke

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer security,Computer networks- Security measures,Computers- Access control

Classification :
QA76
.
9
.
A25
,
D523
2005

11. The Browser Hacker's Handbook /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Wade Alcorn, Christian Frichot, Michele Orrù.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Browsers (Computer programs)-- Security measures.,Computer networks-- Access control.,Computer networks-- Security measures.

Classification :
QA76
.
9
.
A25
.
A384
2014
.
A393
2014

12. آموزش مقدماتی برنامه نویسی هک و تست نفوذ با پایتون

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / [سانجیب سینها],عنوان‌اصلی: Beginning ethical hacking with python, [ 2017].

Library: Imam Reza International University library and information center (Khorasan Razavi)

Subject: پیتون (زبان برنامه نویسی کامپیوتر),Python (Computer program language),آزمایش نفوذ ( ایمن سازی کامپیوتر),Penetration testing (Computer security),شبکه های کامپیوتری -- تدابیر ایمنی -- آزمایش ها,Computer networks -- Security measures - Testing,هکرها,Hackers,کامپیوترها -- کنترل دستیابی -- آزمایش‌ها,Testing -- Access control -- Computers

Classification :
QA
۷۶
/
۷۳
/
پ
۹۵
س
۹ ۱۳۹۷
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival