• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۴۰۸ پاسخ غیر تکراری از ۴۱۷ پاسخ تکراری در مدت زمان ۰,۶۷ ثانیه یافت شد.

341. Security for cloud storage systems /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Kan Yang, Xiaohua Jia.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Cloud computing-- Security measures.,Computer networks-- Security measures.

Classification :
TK5105
.
59

342. Security for cloud storage systems

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Kan Yang

Library: Central library and document university of Kurdistan (Kurdistan)

Subject: Cloud computing -- Security measures,Computer networks -- Security measures,COMPUTERS -- Internet / Security

Classification :
TK

343. Security in computing and communications :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Sabu M. Thampi, Sanjay Madria, Guojun Wang, Danda B. Rawat, Jose M. Alcaraz Calero (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computer networks-- Security measures.,Computer security.

Classification :
QA76
.
9
.
A25

344. Security, privacy, and anonymity in computation, communication, and storage :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Guojun Wang, Jinjun Chen, Laurence T. Yang (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Computer security.,Data protection.

Classification :
QA76
.
9
.
A25

345. Security, privacy and trust in cloud systems /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Surya Nepal, Mukaddim Pathan, editors

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Cloud computing-- Security measures,Computer networks-- Security measures,Computer security

Classification :
QA76
.
585

346. Security technology, disaster recovery and business continuit

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Tai-hoon Kim ... [et al.], (eds.)

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer security--Congresses,Computer networks--Security measures--Congresses,Computer networks--Access control--Congresses,Data protection--Congresses

Classification :
QA
,
76
.
9
,.
A25
,
S374
,
2010

347. Security technology, disaster recovery and business continuity

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer security ; Congresses. ; Computer networks ; Security measures ; Congresses. ; Computer networks ; Access control ; Congresses. ; Data protection ; Congresses. ;

Classification :

348. Solving Cyber Risk :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Data protection.,BUSINESS & ECONOMICS-- Insurance-- Risk Assessment & Management.,Computer security.,Data protection.

Classification :
QA76
.
9
.
A25
C577
2018

349. Stabilization, safety, and security of distributed systems :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Xavier Défago, Franck Petit, Vincent Villainches

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security, Congresses,Electronic data processing-- Distributed processing-- Safety measures, Congresses,Self-stabilization (Computer science), Congresses

Classification :
QA76
.
9
.
S54
S67
2011

350. Statistical techniques for network security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Yun Wang.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.

Classification :
TK5105
.
59
.
W36
2009eb

351. The Executive guide to information security: threats, challenges, and solutions

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Mark Egan with Tim Mather

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection

Classification :
HF
،
5548
.
32
،.
E325
،
2005

352. The Practice of Network Security Monitoring :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: by Richard Bejtlich.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Electronic countermeasures.

Classification :
TK
5105
.
59
.
B436
2013

353. The business case for network security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Catherine Paquet, Warren Saxe

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management

Classification :
TK5105
.
59
.
P37
2005

354. The business case for network security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Catherine Paquet, Warren Saxe

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management

Classification :
TK5105
.
59
.
P37
2005

355. The international handbook of computer security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jae K. Shim, Anique A. Qureshi, Joel G. Siegel

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer security Handbooks, manuals, etc,Data protection Handbooks, manuals, etc,Computer networks- Security measures Handbooks, manuals, etc

Classification :
QA76
.
9
.
A25
,
S468
2000

356. The international handbook of computer security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Shim, Jae K.

Library: Central Library and Documentation Center (Semnan)

Subject: Handbooks, manuals, etc ، Computer security,Handbooks, manuals, etc ، Data protection,Handbooks, manuals, etc ، Computer networks - Security measures

Classification :
QA
76
.
9
.
A25
S468
2000

357. The international handbook of computer security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jae K. Shim, Anique A. Qureshi, Joel G. Siegel

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Handbooks, manuals, etc ، Computer security,Handbooks, manuals, etc ، Data protection,Handbooks, manuals, etc ، Computer networks -- Security measures

Classification :
QA
76
.
9
.
A25S46

358. The official (ISC)² CISSP CBK reference /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: John Warsinkse ; with Mark Graff, Kevin Henry, Christopher Hoover, Ben Malisow, Sean Murphy, C. Paul Oakes, George Pajari, Jeff T. Parker, David Seidl, Mike Vasquez.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Administrative agencies-- Information resources management-- Security measures-- United States-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations, Study guides.,Computers-- Access control-- Examinations, Study guides.,Telecommunications engineers-- Certification-- United States.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer networks-- Security measures-- Examinations.,Telecommunications engineers-- Certification.,United States., 7

Classification :
TK5105
.
59

359. Topics in Cryptology – CT-RSA 2016

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: \ Kazue Sako (Ed.)

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Data encryption (Computer science) -- Congresses.,Data protection -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری داده‌ها -- کنگره‌ها ,حفاظت اطلاعات -- کنگره‌ها ,شبکه‌های کامپیوتری -- تدابیر ایمنی -- کنگره‌ها

Classification :
QA
76
.
9
.
T6
2016
E-Book
,

360. Toward a safer and more secure cyberspace /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Cyberterrorism-- Prevention.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Cyberterrorism-- Prevention.

Classification :
QA76
.
9
.
A25
T695
2007eb
  • »
  • 21
  • 20
  • 19
  • 18
  • 17
  • 16
  • 15
  • 14
  • ...
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival