1. Applied Network Security.
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer networks-- Security measures.,Business enterprises-- Computer networks-- Security measures.,Computer networks-- Security measures.
Classification :
T55
.
4-60
.
8


2. Becoming the hacker :
Author: Adrian Pruteanu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Hacking.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Hacking.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25


3. Business data networks and security /
Author: Raymond R. Panko, University of Hawai'i at Mānoa, Julia L. Panko, Weber State University.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer networks-- Management.,Computer networks-- Security measures.,Computer security.,Business enterprises-- Computer networks-- Security measures.,Computer networks-- Management.,Computer networks-- Security measures.,Computer security.,Computersicherheit,Datensicherung,Rechnernetz
Classification :
HD30
.
37
.
P36
2019


4. Essential skills for hackers /
Author: Kevin Cardwell ; contributing editor, Henry Dalziel.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control.,Computer networks-- Security measures.,Computer security.,Hacking.
Classification :
QA76
.
9
.
A25
C37
2016


5. Ethical hacking and countermeasures /
Author: EC-Council Council.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Secuity measures-- Examinations, Study guides.,Computers-- Access control-- Examinations, Study guides.,Electronic data processing personnel-- Certification.,Penetration testing (Computer security),Telecommunications engineers-- Certification.
Classification :
QA76
.
9
.
A25
E865
2010


6. Handbook of research on information and cyber security in the fourth industrial revolution /
Author: Ziska Fields, University of KwaZulu-Natal, South Africa.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Confidential communications-- Protection.,Electronic information resources-- Access control.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Electronic information resources-- Access control.
Classification :
TK5105
.
59
.
P744
2018e


7. Implementing NAP and NAC security technologies :
Author: Daniel V. Hoffman.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols.,Computer networks -- Access control.,Computer networks -- Security measures.

8. Network security tools
Author: Dhanjani, Nitesh
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Computer security,Security measures ، Computer networks,Access control ، Computers
Classification :
QA
76
.
9
.
A25
D523
2005


9. Network security tools
Author: Nitesh Dhanjani and Justin Clarke
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Computer networks -- Security measures,، Computers -- Access control
Classification :
QA
76
.
9
.
A25D486


10. Network security tools
Author: / Nitesh Dhanjani and Justin Clarke
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer networks- Security measures,Computers- Access control
Classification :
QA76
.
9
.
A25
,
D523
2005


11. The Browser Hacker's Handbook /
Author: Wade Alcorn, Christian Frichot, Michele Orrù.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Browsers (Computer programs)-- Security measures.,Computer networks-- Access control.,Computer networks-- Security measures.
Classification :
QA76
.
9
.
A25
.
A384
2014
.
A393
2014


12. آموزش مقدماتی برنامه نویسی هک و تست نفوذ با پایتون
Author: / [سانجیب سینها],عنواناصلی: Beginning ethical hacking with python, [ 2017].
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: پیتون (زبان برنامه نویسی کامپیوتر),Python (Computer program language),آزمایش نفوذ ( ایمن سازی کامپیوتر),Penetration testing (Computer security),شبکه های کامپیوتری -- تدابیر ایمنی -- آزمایش ها,Computer networks -- Security measures - Testing,هکرها,Hackers,کامپیوترها -- کنترل دستیابی -- آزمایشها,Testing -- Access control -- Computers
Classification :
QA
۷۶
/
۷۳
/
پ
۹۵
س
۹ ۱۳۹۷

