• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۱۴۸ پاسخ غیر تکراری از ۱۴۹ پاسخ تکراری در مدت زمان ۰,۵۰ ثانیه یافت شد.

21. Detection of intrusions and malware, and vulnerability assessment

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Klaus Julisch, Christopher Kruegel (eds.)

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computers--Access control--Congresses,Computers--Access control--Evaluation--Congresses,Computer networks--Security measures--Congresses,Computer security--Congresses,Intrusions,Malware,Vulnerability assessment,DIMVA

Classification :
QA
,
76
.
9
,.
A25
,
D563
,
2005

22. Detection of intrusions and malware, and vulnerability assessment

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Ulrich Flegel, Danilo Bruschi (eds.)

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: Computers, Access control, Congresses,Computers, Access control, Evaluation, Congresses,Computer networks, Security measures, Congresses,Computer security, Congresses,Malware (Computer software), Congresses,Eindringerkennung, Kongress, Como <2009>,Kryptoanalyse, Kongress, Como <2009>,Malware, Kongress, Como <2009>,Softwareschwachstelle, Kongress, Como <2009>,Zugriffskontrolle, Kongress, Como <2009>,Como (2009), swd,Kongress., swd,Eindringerkennung., swd,Kryptoanalyse., swd,Malware., swd,Softwareschwachstelle., swd,Zugriffskontrolle., swd

Classification :
QA
،
76
.
9
،.
A25
,
D563
،
2009

23. Detection of intrusions and malware, and vulnerability assessment : Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005 : proceedings

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Klaus Julisch, Christopher Kruegel )eds.(

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Congresses ، Computers -- Access control,Evaluation -- Congresses ، Computers -- Access control,Congresses ، Computer networks -- Security measures,Congresses ، Computer security

Classification :
QA
76
.
L28
Vol
.
3548

24. Ethical hacking and countermeasures /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: EC-Council Council.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Secuity measures-- Examinations, Study guides.,Computers-- Access control-- Examinations, Study guides.,Electronic data processing personnel-- Certification.,Penetration testing (Computer security),Telecommunications engineers-- Certification.

Classification :
QA76
.
9
.
A25
E865
2010

25. Firewalls 24seven

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Matthew Strebe, Charles Perkins

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer networks , Security measures,Computers , Access control,Firewalls (Computer security)

Classification :
E-BOOK

26. Formal correctness of security protocols

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Bella, Giampaolo

Library: Central Library of Sharif University of Technology (Tehran)

Subject: ، Computer security,، Computers-- Access control,، Cryptography,، Computer networks-- Security measures

Classification :
QA
76
.
9
.
A25
.
B44
2007

27. Formal models and techniques for analyzing security protocols

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Veronique Cortier and Steve Kremer

Library: Central Library of Hamedan University of Technology (Hamedan)

Subject: ، Computer security,Access control ، Computers,Security measures ، Computer networks,Access control ، Electronic information resources

Classification :
QA
76
.
9
.
A25
F6563

28. Formal models and techniques for analyzing security protocols /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Véronique Cortier and Steve Kremer

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Electronic information resources-- Access control

Classification :
QA76
.
9
.
A25
F654
2011

29. Guide to computer network security /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Joseph Migga Kizza.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Business & Economics-- Information Management.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- System Administration-- Storage & Retrieval.,Data mining.,Information architecture.,Information retrieval.,Network hardware.

Classification :
TK5105
.
59

30. Hack proofing Windows 2000 /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Chad Todd ; Norris L. Johnson, Jr., technical editor.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer Science.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Engineering & Applied Sciences.

Classification :
QA76
.
9
.
A25
T63
2001eb

31. Hands-on security in DevOps :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Tony Hsu.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Access control.,Computer networks-- Security measures.,Information technology-- Management.,Computer networks-- Access control.,Computer networks-- Security measures.,COMPUTERS-- Security-- General.,Information technology-- Management.

Classification :
HD30
.
2

32. How to cheat at securing Linux /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Mohan Krishnamurthy [and others].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Linux.,Linux.,Linux.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.

Classification :
TK5105
.
59
.
H683
2008eb

33. IT security governance guidebook with security program metrics on CD-ROM

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Cohen, Frederick B., 1956-

Library: Central Library and Document Center of Isfahan University (Esfahan)

Subject: Computer networks- Security measures ► Computers- Access control ► Confidential business information- Security measures- Data processing ► Corporate governance ► Software measurement

Classification :
005
C678i

34. Identity and access management

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Ertem Osmanoglu

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,False personation-- Prevention

Classification :
QA76
.
9
.
A25
O783
2013

35. Information processing and security system

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / edited by Khalid Saeed, Jerzy Peja??

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer networks--Security measures,Information storage and retrieval systems--Security measures,Computers--Access control

Classification :
TK
,
5105
.
59
,.
I525
,
2005

36. Information processing and security systems

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer networks ; Security measures. ; Information storage and retrieval systems ; Security measures. ; Computers ; Access control. ;

Classification :

37. Information security and privacy :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Julian Jang-Jaccard, Fuchun Guo (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computers-- Access control, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Data encryption (Computer science)

Classification :
QA76
.
9
.
A25
A279
2019eb

38. Instant penetration testing

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Vyacheslav Fadyushin

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Computers-- Access control,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25
F33
2013

39. Integrated security systems design : a complete reference for building enterprise-wide digital security systems

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Thomas Norman

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Computer networks -- Security measures,، Computers -- Access control,Security measures ، Information storage and retrieval systems

Classification :
TK
5105
.
5
.
N67I5
2014

40. Internet and Intranet security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Oppliger, Rolf

Library: Central Library of Amirkabir University of Technology (Tehran)

Subject: Internet )Computer network( - Security measures , Intranets )Computer networks( - Security measures , Computers - Access control , TCP/IP )Computer network protocol(

Classification :
TK
5105
.
875
.
I57
O67
1998
  • »
  • 8
  • 7
  • 6
  • 5
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival