• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۱۴۸ پاسخ غیر تکراری از ۱۴۹ پاسخ تکراری در مدت زمان ۱,۱۶ ثانیه یافت شد.

1. A multidisciplinary introduction to information security /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: [edited by] Stig F. Mjølsnes

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Multidisciplinary design optimization

Classification :
QA76
.
9
.
A25
M845
2012

2. AAA identity management security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Vivek Santuka, Premdeep Banga, Brandon J. Carroll

Library: Farabi Faculty Library, University of Tehran (Qom)

Subject: Computer networks, Security measures,Computers, Access control,Identification,Authentication

Classification :
TK
5105
.
59
.
S316
2011

3. Advanced monitoring in P2P botnets :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Shankar Karuppayah.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Access control.,Computer networks-- Security measures.,Malware (Computer software),Peer-to-peer architecture (Computer networks),Computer networks-- Access control.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Networking-- General.,Malware (Computer software),Mathematical physics.,Network hardware.,Peer-to-peer architecture (Computer networks)

Classification :
TK5105
.
59
.
K37
2018

4. Advances in information and computer security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Tetsu Iwata, Masakatsu Nishigaki (editions.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses,Computer security-- Congresses,Electronic information resources-- Access control-- Congresses

Classification :
QA76
.
9
.
A25
I58
2011

5. Authentication systems for secure networks

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Oppliger, Rolf.

Library: Central Library of Amirkabir University of Technology (Tehran)

Subject: Computer networks - Security measures , Computers - Access control , Authentication , Cryptography

Classification :
TK
5105
.
59
.
O77
1996

6. Authentication systems for secure networks

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Rolf Oppliger

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Computer networks -- Security measures,، Computers -- Access control,، Authentication,، Cryptography

Classification :
TK
5105
.
59
.
O62

7. BackTrack 5 wireless penetration testing

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Vivek Ramachandran

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Testing,Computers-- Access control,Penetration testing (Computer security),Wireless Internet-- Security measures

Classification :
TK5103
.
4885
R355
2011

8. Becoming the hacker :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Adrian Pruteanu.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Hacking.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Hacking.,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25

9. Building virtual pentesting labs for advanced penetration testing :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Kevin Cardwell.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Testing.,Computers-- Access control.,Computer networks-- Monitoring.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.

Classification :
TK5105
.
59

10. Building virtual pentesting labs for advanced penetration testing :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Kevin Cardwell.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Testing.,Computers-- Access control.,Computer networks-- Security measures.,COMPUTERS / Security / General.,Computers-- Access control.

Classification :
TK5105
.
59

11. Building virtual pentesting labs for advanced penetration testing :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Kevin Cardwell.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Testing.,Computers-- Access control.,Computer networks-- Monitoring.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.

Classification :
TK5105
.
59

12. CCNP security SISAS 300-208 official cert guide /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Aaron Woland, Kevin Redmon

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Examinations, Study guides,Computers-- Access control-- Examinations, Study guides,Electronic data processing personnel-- Certification, Study guides

Classification :
QA76
.
9
.
A25

13. Cisco NAC appliance

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jamey Heary

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer networks- Security measures,Computers- Access control

Classification :
E-BOOK

14. Cisco NAC appliance

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jamey Heary

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Computers- Access control

Classification :
TK5105
.
59
.
H42
2008

15. Cisco NAC appliance

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jamey Heary

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computers , Access control,Computer networks , Security measures,Electronic books. , lcsh

Classification :
E-BOOK

16. Computer networks and Internets /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Douglas E. Comer, Department of Computer Sciences, Purdue University, West Lafayette, IN 47907.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks.,Internetworking (Telecommunication),Computer networks.,Internetworking (Telecommunication)

Classification :
TK5105
.
5
.
C5897
2015

17. Cybersecurity essentials /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Charles J. Brooks, Christopher Grow, Philip Craig, Donald Short.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Security-- Networking.

Classification :
TK5105
.
59

18. Data protection and security for personal computers

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / by Robert Schifreen

Library: Library of College of Science University of Tehran (Tehran)

Subject: Microcomputers -- Access control,Data protection,Electronic data processing departments -- Security measures,Computer networks -- Security measures,Microcomputers

Classification :
QA
76
.
9
.
A25
S3
1992

19. Data security technologies in SAS 9.1.3.

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: SAS (Computer file),SAS (Computer file),Computer networks-- Security measures.,Computers-- Access control.,Data protection.,Computer networks-- Security measures.,Computers-- Access control.,Data protection.

Classification :
QA76
.
9
.
A25
D3532
2005

20. Detection of intrusions and malware, and vulnerability assessment :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Thorsten Holz, Herbert Bos (editions.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Computers-- Access control-- Evaluation, Congresses,Computers-- Access control, Congresses,Malware (Computer software), Congresses

Classification :
QA76
.
9
.
A25
  • »
  • 8
  • 7
  • 6
  • 5
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival