341. Snort for Dummies
Author: \ by Charlie Scott, Paul Wolfe, and Bert Hayes
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks--Security measures,Computer security,Computers--Access control,شبکههای کامپیوتری -- تدابیر ایمنی,امنیت رایانهای,کامپیوترها -- کنترل دستیابی
Classification :
E-Book
,

342. Snort for dummies
Author: / by Charlie Scott, Paul Wolfe, and Bert Hayes
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computers- Access control
Classification :
TK5105
.
59
.
S388
2004


343. Snort for dummies
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ; Computer security. ; Computers ; Access control. ; Snort (Software) ; fast ; (OCoLC)fst01792875 ; Intrusion detection systems (Computer security) ; fast ; (OCoLC)fst01762593 ;

344. Solving Cyber Risk :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,BUSINESS & ECONOMICS-- Insurance-- Risk Assessment & Management.,Computer security.,Data protection.
Classification :
QA76
.
9
.
A25
C577
2018


345. Spring Security 3.x cookbook
Author: Anjana Mankale
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Application software-- Access control,Application software-- Security measures,Computer networks-- Security measures,Java (Computer program language)
Classification :
QA76
.
76
.
A65
M36
2013


346. Sudo mastery :
Author: by Michael W. Lucas.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Access control.,Computer networks -- Security measures.,Data encryption (Computer science)
Classification :
TK5105
.
59
B965
2013


347. Tableaux de bord de la sécurité réseau /
Author: Cédric Llorens, Laurent Levier, Denis Valois ; avec la contribution de Olivier Salvatori.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computers-- Access control.,Réseaux d'ordinateurs-- Sécurité-- Mesures, Cas, Études de.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Computer networks-- Security measures.,Computers-- Access control.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
L56
2006eb


348. The Browser Hacker's Handbook /
Author: Wade Alcorn, Christian Frichot, Michele Orrù.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Browsers (Computer programs)-- Security measures.,Computer networks-- Access control.,Computer networks-- Security measures.
Classification :
QA76
.
9
.
A25
.
A384
2014
.
A393
2014


349. The Stephen Cobb complete book of PC and LAN security
Author: / by Stephen Cobb,Cobb
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Local area networks (Computer networks) -- Security measures,Computers -- Access control
Classification :
TK
5105
.
7
.
C62
1992


350. The Stephen Cobb complete book of PC and LAN security
Author: / Stephen Cobb
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Local area networks (Computer networks),Computer - Access control,-- Security measures
Classification :
005
.
8
C653S


351. The antivirus hacker's handbook /
Author: Joxean Koret, Elias Bachaalany
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control,Computer networks-- Security measures, Handbooks, manuals, etc,Computer security, Handbooks, manuals, etc
Classification :
QA76
.
9
.
A25


352. The basics of digital privacy :
Author: Denny Cherry ; technical editor, Thomas LaRock
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control
Classification :
QA76
.
9
.
A25
C438
2014


353. The hacker's handboo
Author: / Susan Young, Dave Aitel
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Computer networks--Access control,Hackers.
Classification :
TK
,
5105
.
59
,.
Y68
,
2004


354. The hacker's handbook: the strategy behind breaking into and defending networks
Author: Young, Susan )Susan Elizabeth(
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer networks-- Security measures,، Computer networks-- Access control,، Computer hackers
Classification :
TK
5105
.
59
.
Y68
2004


355. The modelling and analysis of security protocols :
Author: P.Y.A. Ryan and S.A. Schneider, with M.H. Goldsmith, G. Lowe and A.W. Roscoe
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols,Computer networks-- Security measures,Computer security-- Mathematical models,Computer software-- Verification,Computers-- Access control,Cryptography
Classification :
TK5105
.
59
.
R93
2001


356. The official (ISC)² CISSP CBK reference /
Author: John Warsinkse ; with Mark Graff, Kevin Henry, Christopher Hoover, Ben Malisow, Sean Murphy, C. Paul Oakes, George Pajari, Jeff T. Parker, David Seidl, Mike Vasquez.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Administrative agencies-- Information resources management-- Security measures-- United States-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations, Study guides.,Computers-- Access control-- Examinations, Study guides.,Telecommunications engineers-- Certification-- United States.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer networks-- Security measures-- Examinations.,Telecommunications engineers-- Certification.,United States., 7
Classification :
TK5105
.
59


357. The state of the art in intrusion prevention and detection
Author: edited by Al-Sakib Khan Pathan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures.,Computer security.,Computers -- Access control.
Classification :
QA76
.
9
.
A25
E358
9999


358. Transactions on data hiding and multimedia security VI /
Author: Yun Q. Shi [and others] (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Data protection,Multimedia systems-- Security measures,Algorithm Analysis and Problem Complexity,Computer Science,Computers and Society,Data Encryption,Pattern Recognition,Systems and Data Security
Classification :
QA76
.
9
.
A25
T73
2011


359. Transparent user authentication
Author: / Nathan Clarke
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures,Computers, Access control,Data protection
Classification :
E-BOOK

360. Transparent user authentication biometrics, RFID and behavioural profiling
Author: / Nathan Clarke
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer networks, Security measures,Computers, Access control,Data protection
Classification :
TK5105
.
59
.
C575
2011

