• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۵ پاسخ غیر تکراری از ۵ پاسخ تکراری در مدت زمان ۰,۴۹ ثانیه یافت شد.

1. Check Point NG VPN-1/Firewall-1 :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jim Noble [and others].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Computer programs.,Computer security-- Computer programs.,Firewalls (Computer security),Computer networks-- Security measures-- Computer programs.,Computer security-- Computer programs.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Firewalls (Computer security)

Classification :
QA76
.
9
.
A25
N63
2003eb

2. Cyber threat intelligence /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Ali Dehghantanha, Mauro Conti, Tooska Dargahi, editors.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Internet-- Security measures.,Artificial intelligence.,Computer networking & communications.,Computer security.,Computer security.,COMPUTERS-- Security-- General.,Internet-- Security measures.,Network hardware.

Classification :
QA76
.
9
.
A25

3. Eliciting the requirements for intelligent systems in law enforcement /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jeffrey L. Goldberg [and others].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Case studies.,Internet-- Security measures, Case studies.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Internet-- Security measures.

Classification :
TK5105
.
59
.
E45
2004eb

4. Fuzzing for software security testing and quality assurance /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Ari Takanen, Jared DeMott, Charlie Miller.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Computer software-- Development.,Logiciels-- Qualité-- Contrôle.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Sécurité informatique.,Computer networks-- Security measures.,Computer security.,Computer software-- Development.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.

Classification :
QA76
.
9
.
A25
T335
2008eb

5. Network security assessment :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Steve Manzuik, André Gold, Chris Gatford.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Evaluation-- Methodology.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.

Classification :
TK5105
.
59
.
M38
2007eb
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival