• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۴۱۳ پاسخ غیر تکراری از ۴۲۲ پاسخ تکراری در مدت زمان ۰,۴۷ ثانیه یافت شد.

341. Snort for Dummies

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: \ by Charlie Scott, Paul Wolfe, and Bert Hayes

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Computer networks--Security measures,Computer security,Computers--Access control,شبکه‌های کامپیوتری -- تدابیر ایمنی,امنیت رایانه‌ای,کامپیوترها -- کنترل دستیابی

Classification :
E-Book
,

342. Snort for dummies

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / by Charlie Scott, Paul Wolfe, and Bert Hayes

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Computer security,Computers- Access control

Classification :
TK5105
.
59
.
S388
2004

343. Snort for dummies

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer networks ; Security measures. ; Computer security. ; Computers ; Access control. ; Snort (Software) ; fast ; (OCoLC)fst01792875 ; Intrusion detection systems (Computer security) ; fast ; (OCoLC)fst01762593 ;

Classification :

344. Solving Cyber Risk :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Data protection.,BUSINESS & ECONOMICS-- Insurance-- Risk Assessment & Management.,Computer security.,Data protection.

Classification :
QA76
.
9
.
A25
C577
2018

345. Spring Security 3.x cookbook

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Anjana Mankale

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Application software-- Access control,Application software-- Security measures,Computer networks-- Security measures,Java (Computer program language)

Classification :
QA76
.
76
.
A65
M36
2013

346. Sudo mastery :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: by Michael W. Lucas.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks -- Access control.,Computer networks -- Security measures.,Data encryption (Computer science)

Classification :
TK5105
.
59
B965
2013

347. Tableaux de bord de la sécurité réseau /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Cédric Llorens, Laurent Levier, Denis Valois ; avec la contribution de Olivier Salvatori.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computers-- Access control.,Réseaux d'ordinateurs-- Sécurité-- Mesures, Cas, Études de.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Computer networks-- Security measures.,Computers-- Access control.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.

Classification :
QA76
.
9
.
A25
L56
2006eb

348. The Browser Hacker's Handbook /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Wade Alcorn, Christian Frichot, Michele Orrù.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Browsers (Computer programs)-- Security measures.,Computer networks-- Access control.,Computer networks-- Security measures.

Classification :
QA76
.
9
.
A25
.
A384
2014
.
A393
2014

349. The Stephen Cobb complete book of PC and LAN security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / by Stephen Cobb,Cobb

Library: Central Library and Documents Center of Tehran University (Tehran)

Subject: Local area networks (Computer networks) -- Security measures,Computers -- Access control

Classification :
TK
5105
.
7
.
C62
1992

350. The Stephen Cobb complete book of PC and LAN security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Stephen Cobb

Library: Central Library and Archive Center of shahid Beheshti University (Tehran)

Subject: Local area networks (Computer networks),Computer - Access control,-- Security measures

Classification :
005
.
8
C653S

351. The antivirus hacker's handbook /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Joxean Koret, Elias Bachaalany

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Access control,Computer networks-- Security measures, Handbooks, manuals, etc,Computer security, Handbooks, manuals, etc

Classification :
QA76
.
9
.
A25

352. The basics of digital privacy :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Denny Cherry ; technical editor, Thomas LaRock

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Computer security,Computers-- Access control

Classification :
QA76
.
9
.
A25
C438
2014

353. The hacker's handboo

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Susan Young, Dave Aitel

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer networks--Security measures,Computer networks--Access control,Hackers.

Classification :
TK
,
5105
.
59
,.
Y68
,
2004

354. The hacker's handbook: the strategy behind breaking into and defending networks

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Young, Susan )Susan Elizabeth(

Library: Central Library of Sharif University of Technology (Tehran)

Subject: ، Computer networks-- Security measures,، Computer networks-- Access control,، Computer hackers

Classification :
TK
5105
.
59
.
Y68
2004

355. The modelling and analysis of security protocols :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: P.Y.A. Ryan and S.A. Schneider, with M.H. Goldsmith, G. Lowe and A.W. Roscoe

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer network protocols,Computer networks-- Security measures,Computer security-- Mathematical models,Computer software-- Verification,Computers-- Access control,Cryptography

Classification :
TK5105
.
59
.
R93
2001

356. The official (ISC)² CISSP CBK reference /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: John Warsinkse ; with Mark Graff, Kevin Henry, Christopher Hoover, Ben Malisow, Sean Murphy, C. Paul Oakes, George Pajari, Jeff T. Parker, David Seidl, Mike Vasquez.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Administrative agencies-- Information resources management-- Security measures-- United States-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations, Study guides.,Computers-- Access control-- Examinations, Study guides.,Telecommunications engineers-- Certification-- United States.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer networks-- Security measures-- Examinations.,Telecommunications engineers-- Certification.,United States., 7

Classification :
TK5105
.
59

357. The state of the art in intrusion prevention and detection

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Al-Sakib Khan Pathan.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks -- Security measures.,Computer security.,Computers -- Access control.

Classification :
QA76
.
9
.
A25
E358
9999

358. Transactions on data hiding and multimedia security VI /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Yun Q. Shi [and others] (editions.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Data encryption (Computer science),Data protection,Multimedia systems-- Security measures,Algorithm Analysis and Problem Complexity,Computer Science,Computers and Society,Data Encryption,Pattern Recognition,Systems and Data Security

Classification :
QA76
.
9
.
A25
T73
2011

359. Transparent user authentication

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Nathan Clarke

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer networks, Security measures,Computers, Access control,Data protection

Classification :
E-BOOK

360. Transparent user authentication biometrics, RFID and behavioural profiling

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Nathan Clarke

Library: Central library and document university of Kurdistan (Kurdistan)

Subject: Computer networks, Security measures,Computers, Access control,Data protection

Classification :
TK5105
.
59
.
C575
2011
  • »
  • 21
  • 20
  • 19
  • 18
  • 17
  • 16
  • 15
  • 14
  • ...
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival