441. Planning for survivable networks
Author: / Annlee Hines
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures- Planning,Disasters,Emergency management
Classification :
TK5105
.
59
.
H56
2002


442. Policies and research in identity management :
Author: Simone Fischer-Hübner, Elisabeth de Leeuw, Chris Mitchell (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Access control -- Congresses.,Computer networks -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
S566
2013


443. Policies and research in identity management
Author: edited by Elisabeth de Leeuw ... [et al.]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses

444. Policy-based autonomic data governance /
Author: Seraphin Calo, Elisa Bertino, Dinesh Verma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Autonomic computing.,Computer networks-- Security measures.,Computer security.,Autonomic computing.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25
P65
2019


445. Policy-based network management :
Author: John Strassner.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Management.,Computer networks-- Security measures.,Computer networks-- Management.,Computer networks-- Security measures.,COMPUTERS-- Data Transmission Systems-- General.,COMPUTERS-- Networking-- Vendor Specific.
Classification :
TK5105
.
5
.
S777
2004eb


446. Policy-based network management: solutions for the next generation
Author: Strassner, John
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Management ، Computer networks,Security measures ، Computer networks
Classification :
TK
5105
.
5
.
S777
2004


447. Practical intranet security :
Author: by Paul Ashley, Mark Vandenwauver.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures.,Intranets (Computer networks) -- Security measures.

448. Practical intranet security :
Author: by Paul Ashley, Mark Vandenwauver.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures.,Intranets (Computer networks) -- Security measures.
Classification :
TK5105
.
59
B973
1999


449. Practical vulnerability management :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ;

450. Principles of information security /
Author: Michael E. Whitman, Herbert J. Mattord
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security
Classification :
TK5105
.
59
.
W54
2012


451. Principles of information security /
Author: Michael E. Whitman, Ph. D., CISM, CISSP, Herbert J. Mattord, Ph. D., CISM, CISSP, Kennesaw State University.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer security.
Classification :
TK5105
.
59
.
W54
2018


452. Principles of security and trust :
Author: David Basin, John C. Mitchell (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
D385
2013


453. Privacy
Author: / J.C.Cannon
Library: Library and knowledge management of the management schools of Tehran University (Tehran)
Subject: Computer security.,Business enterprises-Computer networks-Security measures
Classification :
005
.
8
C226p


454. Pro iOS security and forensics :
Author: Eric Butow.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: iOS (Electronic resource)-- Security measures.,IOS (Electronic resource),Computer networks-- Security measures.,iPad (Computer)-- Security measures.,iPhone (Smartphone)-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Operating Systems-- Apple (Mac OS & iOS),COMPUTERS-- Security-- General.,Security systems.
Classification :
QA76
.
774
.
I67


455. Proceedings of The IFIP TC 11 23rd International Information Security Conference
Author: / edited by Sushil Jajodia, Pierangela Samarati, Stelvio Cimato.
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer networks -- Security measures -- Congresses, Computers -- Access control -- Congresses, Computer security -- Congresses,Computer networks -- Access control -- Congresses,Data protection -- Congresses
Classification :
QA
76
.
9
.
A25I461
2008


456. Professional penetration testing :
Author: by Thomas Wilhelm.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Examinations-- Practice.,Computer hackers.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer networks-- Testing.,Computer networks-- Testing.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Hackers.
Classification :
QA76
.
9
.
W55
2010eb


457. Protecting your library's digital sources
Author: / Miriam B. Kahn
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Libraries- Safety measures,Archives- Safety measures,Library information networks- Security measures,Electronic records- Conservation and restoration,Emergency management- Planning,Computer security,Data protection,Electronic data processing- Backup processing alternatives
Classification :
Z679
.
7
.
K385
2004


458. Protecting your library's digital sources: the essential guide to planning and preservation
Author: Kahn, Miriam B.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Safety measures ، Libraries,Safety measures ، Archives,Security measures ، Library information networks,Conservation and restoration ، Electronic records,Planning ، Emergency management,، Computer security,، Data protection,Backup processing alternatives ، Electronic data processing
Classification :
Z
679
.
7
.
K385
2004


459. Protecting your library's digital sources: the essential guide to planning and preservation
Author: Kahn, Miriam )Miriam B.(
Library: Central Library and Documentation Center (Kerman)
Subject: Safety measures ، Libraries,Safety measures ، Archives,Security measures ، Library information networks,Conservation and restoration ، Electronic records,Planning ، Emergency management,، Computer security,، Data protection,Backup processing alternatives ، Electronic data processing
Classification :
Z
679
.
7
.
K385
2004


460. Protecting your library's digital sources :the essential guide to planning and preservation
Author: / Miriam B. Kahn
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Libraries -- Safety measures,Archives -- Safety measures,Library information networks -- Security measures,Electronic records -- Conservation and restoration,Emergency management -- Planning,Computer security,Data protection,Electronic data processing -- Backup processing alternatives
Classification :
Z679
.
7
.
K385
2004

