321. Proceedings of The IFIP TC 11 23rd International Information Security Conference
Author: / edited by Sushil Jajodia, Pierangela Samarati, Stelvio Cimato.
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer networks -- Security measures -- Congresses, Computers -- Access control -- Congresses, Computer security -- Congresses,Computer networks -- Access control -- Congresses,Data protection -- Congresses
Classification :
QA
76
.
9
.
A25I461
2008


322. Protecting LAN resources: a comprehensive guide to securing, Protecting and rebuilding a network
Author: Held, Gilbert
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Local area networks )Computer networks( - Security measures , Computer security , Data protection
Classification :
TK
5105
.
59
.
H44
1995


323. Protecting information assets and IT infrastructure in the cloud /
Author: by Ravi Das and Preston de Guise.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures.,Computer networks-- Security measures.,Cloud Computing,Computer networks-- Security measures.,COMPUTERS / Computer Literacy,COMPUTERS / Computer Science,COMPUTERS / Data Processing,COMPUTERS / Hardware / General,COMPUTERS / Information Technology,COMPUTERS / Machine Theory,COMPUTERS / Reference,Computersicherheit,Datensicherung
Classification :
QA76
.
585


324. Protecting your library's digital sources
Author: / Miriam B. Kahn
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Libraries- Safety measures,Archives- Safety measures,Library information networks- Security measures,Electronic records- Conservation and restoration,Emergency management- Planning,Computer security,Data protection,Electronic data processing- Backup processing alternatives
Classification :
Z679
.
7
.
K385
2004


325. Protecting your library's digital sources: the essential guide to planning and preservation
Author: Kahn, Miriam B.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Safety measures ، Libraries,Safety measures ، Archives,Security measures ، Library information networks,Conservation and restoration ، Electronic records,Planning ، Emergency management,، Computer security,، Data protection,Backup processing alternatives ، Electronic data processing
Classification :
Z
679
.
7
.
K385
2004


326. Protecting your library's digital sources: the essential guide to planning and preservation
Author: Kahn, Miriam )Miriam B.(
Library: Central Library and Documentation Center (Kerman)
Subject: Safety measures ، Libraries,Safety measures ، Archives,Security measures ، Library information networks,Conservation and restoration ، Electronic records,Planning ، Emergency management,، Computer security,، Data protection,Backup processing alternatives ، Electronic data processing
Classification :
Z
679
.
7
.
K385
2004


327. Protecting your library's digital sources :the essential guide to planning and preservation
Author: / Miriam B. Kahn
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Libraries -- Safety measures,Archives -- Safety measures,Library information networks -- Security measures,Electronic records -- Conservation and restoration,Emergency management -- Planning,Computer security,Data protection,Electronic data processing -- Backup processing alternatives
Classification :
Z679
.
7
.
K385
2004


328. Responsive security
Author: Meng-Chow Kang
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures,Data protection,Electronic data processing departments-- Security measures,Information technology-- Security measures,Risk management
Classification :
HF30
.
38
.
K38
2014


329. Risk centric threat modeling :
Author: Tony Uceda Vélez and Marco M. Morana
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Data protection,Management information systems-- Security measures,Risk assessment
Classification :
HF5548
.
37


330. Router security strategies
Author:
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Routers (Computer networks) , Security measures,TCP/IP (Computer network protocol) , Security measures
Classification :
E-BOOK

331. SAP security configuration and deployment :
Author: Leslie Wun-Young, technical editor; Joey Hirao [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises -- Computer networks -- Security measures.,Business information services -- Security measures.,SAP ERP.
Classification :
HF5548
.
37
L475
2009


332. SAS 9.1.3 intelligence platform :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: SAS (Computer file),SAS (Computer file),Computer networks-- Security measures.,Data protection.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.
Classification :
QA76
.
9
.
A25
S27
2006eb


334. Secure data management in decentralized systems /
Author: edited by Ting Yu, Sushil Jajodia
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Database security
Classification :
TK5105
.
59
.
S432
2007


335. Securing social networks in cyberspace
Author: edited by Al-Sakib Khan Pathan.
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer networks,Online social networks,Computer security.,COMPUTERS,COMPUTERS,Security measures.,Security measures.,Security.,Security.,Computer security.

336. Securite Internet
Author: / Solange Ghernaouti-Helie
Library: Faculty of Law and Political Sciences (Tehran)
Subject: Local area networks (Computer networks) -- Security measures,Internet -- Security measures,Data protection,Protection de l`information (informatique),Coupe-feu (securite informatique),Systemes informatiques -- Mesures de surete,Virus informatiques,Reseaux locaux (informatique) -- Mesures de surete,Internet -- Mesures de surete
Classification :
TK5105
.
87
.
G5S4


337. Security and privacy in social network
Author: / Yaniv Altshuler ... [et al., editors]
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Online social networks, Security measures,Data encryption (Computer science),Data protection,Computer crimes, Prevention,Electronic books
Classification :
E-BOOK

338. Security aspects in information technology :
Author: Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Information technology-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
I58
2011


339. Security engineering for cloud computing
Author: / David G. Rosado...[et al.]
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Cloud computing -- Security measures,Computer security,Data protection,Computer networks -- Security measures
Classification :
QA
76
.
58
.
S4
2013


340. Security for cloud computing
Author: / Flavio Lombardi, Roberto Di Pietro
Library: Library of College of Science University of Tehran (Tehran)
Subject: Cloud computing -- Security measures
Classification :
TK
5105
.
59
.
L66
2015

