461. Protocol :
Author: Alexander R. Galloway.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols.,Computer networks-- Management.,Computer networks-- Security measures.,Electronic data processing-- Distributed processing.,Protocoles de réseaux d'ordinateurs.,Réseaux d'ordinateurs-- Gestion.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Traitement réparti.,Beheersing.,Computer network protocols.,Computer network protocols.,Computer networks-- Management.,Computer networks-- Management.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Culturele aspecten.,Electrical & Computer Engineering.,Electronic data processing-- Distributed processing.,Electronic data processing-- Distributed processing.,Engineering & Applied Sciences.,Programmeertalen.,Protocollen (informatica),Telecommunications.
Classification :
TK5105
.
59
.
G35
2004


462. Protocol
Author: / Alexander R. Galloway
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures,Computer networks, Management,Computer network protocols,Electronic data processing, Distributed processing
Classification :
E-BOOK

463. Quick start guide to penetration testing :
Author: Sagar Rahalkar.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Metasploit (Electronic resource),Metasploit (Electronic resource),Computer networks-- Security measures-- Testing.,Penetration testing (Computer security),COMPUTERS / Security / General.,Penetration testing (Computer security)
Classification :
TK5105
.
59


464. Real-time security extensions for EPCglobal networkscase study for the pharmaceutical industry
Author: / Matthieu-P. Schapranow
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer networks -- Security measures,Computer network architectures,Business logistics -- Data processing
Classification :
TK5105
.
59
.
S33
2014


465. Responsive security
Author: Meng-Chow Kang
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures,Data protection,Electronic data processing departments-- Security measures,Information technology-- Security measures,Risk management
Classification :
HF30
.
38
.
K38
2014


466. Rights, legal empowerment, and poverty : an overview of the issues / Dan Banik -- The political economy of legal empowerment of the poor / Arjun Sengupta -- Legal empowerment as a new concept in development : transforming good ideas into global action / Mona Elisabeth Brøther -- Constitutionalism in an insurgent state : rethinking legal empowerment of the poor in a divided Bolivia / John-Andrew McNeish -- Poverty, legal activism, and development in rural China / Susanne Brandtstädter -- The access to justice challenge in Uganda / Donald Rukare -- Legal empowerment and the right to food / Marc Cohen and Mary Ashby Brown -- Are Africans cul
Author: edited by Dan Banik.
Library: Library of Islamic Parliament (Tehran)
Subject:

467. Risk centric threat modeling :
Author: Tony Uceda Vélez and Marco M. Morana
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Data protection,Management information systems-- Security measures,Risk assessment
Classification :
HF5548
.
37


468. Risk, complexity and ICT /
Author: edited by Ole Hanseth and the late Claudio Ciborra.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Management information systems.,Risk management.,BUSINESS & ECONOMICS-- Information Management.,BUSINESS & ECONOMICS-- Knowledge Capital.,Computer networks-- Security measures.,Management information systems.,Risk management.
Classification :
T58
.
64
.
R57
2007eb


469. Risk management solutions for Sarbanes-Oxley section 404 IT compliance
Author: Quarterman, John S.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Computer networks Security measures ، Business enterprises,Security measures ، Internet,، Computer security,Access control ، Computers
Classification :
HD
30
.
38
.
Q37


470. Risks, controls, and security
Author: / Vasant Raval, Ashok Fichadia
Library: Library and knowledge management of the management schools of Tehran University (Tehran)
Subject: Computer security,Computer networks, Security measures
Classification :
658
. .
478
R252r


471. Router security strategies
Author:
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Routers (Computer networks) , Security measures,TCP/IP (Computer network protocol) , Security measures
Classification :
E-BOOK

472. Router security strategies : securing IP network traffic planes
Author: Gregg Schudel, David J. Smith
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Security measures ، Routers )Computer networks(,، Computer networks -- Security measures,Security measures ، TCP/IP )Computer network protocol(
Classification :
TK
5105
.
543
.
S38R6


473. SAP security configuration and deployment :
Author: Leslie Wun-Young, technical editor; Joey Hirao [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises -- Computer networks -- Security measures.,Business information services -- Security measures.,SAP ERP.
Classification :
HF5548
.
37
L475
2009


475. Seamless and secure communications over heterogeneous wireless networks /
Author: Jiannong Cao, Chisheng Zhang
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Heterogeneous computing.,Wireless communication systems-- Security measures.,Wireless communication systems.,Computer Communication Networks.,Computer Science.
Classification :
TK5103
.
2


476. Secure Your network for Free
Author: Eric Seagren,Wesley J.Noonan
Library: Library of Payam Noor University of Esfahan (Esfahan)
Subject: Computer networks - Security measures,Computer security,Computer networks - Management
Classification :
TK
،
5105
.
5
،.
S2


477. Secure data management in decentralized systems
Author: edited by Ting Yu, Sushil Jajodia
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Security measures ، Computer networks,، Database security,، Computer security
Classification :
TK
5105
.
59
.
S432
2007


478. Secure data management in decentralized systems /
Author: edited by Ting Yu, Sushil Jajodia
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Database security
Classification :
TK5105
.
59
.
S432
2007


479. Secure data management in decentralized systems
Author: edited by Ting Yu, Sushil Jajodia
Library: (Semnan)
Subject: Security measures ، Computer networks,، Database security,، Computer security
Classification :
TK
5105
.
59
.
S432
2007


480. Secure data networking
Author: Purser, Michael
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer networks - Security measures , Computer security , Computer networks - Management
Classification :
TK
5105
.
5
.
P87

