141. Building virtual pentesting labs for advanced penetration testing :
Author: Kevin Cardwell.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Testing.,Computers-- Access control.,Computer networks-- Monitoring.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.
Classification :
TK5105
.
59


142. Business Continuity Management :
Author: Stefan Spörrer.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Crisis management.,Data protection.,Emergency management-- Planning.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer networks-- Security measures.,Crisis management.,Data protection.,Emergency management-- Planning.
Classification :
HD49


143. Business data networks and security /
Author: Raymond R. Panko, University of Hawai'i at Mānoa, Julia L. Panko, Weber State University.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer networks-- Management.,Computer networks-- Security measures.,Computer security.,Business enterprises-- Computer networks-- Security measures.,Computer networks-- Management.,Computer networks-- Security measures.,Computer security.,Computersicherheit,Datensicherung,Rechnernetz
Classification :
HD30
.
37
.
P36
2019


144. CISO compass :
Author: Todd Fitzgerald.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,BUSINESS & ECONOMICS-- Management.,Business enterprises-- Computer networks-- Security measures.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Security-- General.
Classification :
TK5105
.
59


145. Cloud computing security :
Author: editor, John R. Vacca
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures.,Computer networks-- Security measures.,Computer security.,Data protection.
Classification :
QA76
.
585
.
C5825
2017eb


146. Cloud computing security :foundations and challenges
Author: editor, John R. Vacca
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Security measures ، Cloud computing,Security measures ، Computer networks,، Data protection,، Computer security
Classification :
QA
76
.
585
.
C5825


147. Cold war history
Author: edited by Frédéric Bozo ... [ et al.].
Library: Library of Islamic Parliament (Tehran)
Subject:

148. Collaborative computer security and trust managemen
Author: / Jean-Marc Seigneur, Adam Slagell
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Public key infrastructure (Computer security),Data protection.,Computer networks--Security measures,Computer crimes--Prevention
Classification :
QA
,
76
.
9
,.
A25
,
C6145
,
2010


149. Collaborative computer security and trust management
Author: ]edited by[ Jean-Marc Seigneur, Adam Slagell
Library: Central Library and Documentation Center (Semnan)
Subject: ، Computer security,، Public key infrastructure )Computer security(,، Data protection,Security measures ، Computer networks,Prevention ، Computer crimes
Classification :
QA
76
.
9
.
A25
C6145
2010


150. Collaborative computer security and trust management
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Public key infrastructure (Computer security) ; Data protection ; Computer networks ; Security measures ; Computer crimes ; Prevention ;

151. Collaborative computer security and trust management
Author: / [edited by] Jean-Marc Seigneur, Adam Slagell.
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer security,Public key infrastructure (Computer security),Data protection,Computer networks--Security measures,Computer crimes--Prevention.
Classification :
QA
76
.
9
.
A25
C614
2010


152. Collaborative computer security and trust management
Author: ]edited by[ Jean-Marc Seigneur, Adam Slagell
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,، Public key infrastructure )Computer security(,، Data protection,Security measures ، Computer networks,Prevention ، Computer crimes
Classification :
QA
76
.
9
.
A25
C6145
2010


153. Communication and multimedia security
Author: / Antonio Lioy, Daniele Mazzocchi, eds
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Congresses,Telecommunication systems--Security measures--Congresses,Computer security--Congresses
Classification :
TK
,
5105
.
59
,.
C577
,
2003
QA
,
76
,.
L4
,
no
.
2828


154. Communication and multimedia security : advanced techniques for network and data protection : 7th IFIP-TC6TC11 international conference, CMS 2003, Torino, Italy, October 2-3, 2003 : proceedings
Author: Antonio Lioy, Daniele Mazzocchi, )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer networks -- Security measures,Security measures -- Congresses ، Telecommunication systems,Congresses ، Computer security
Classification :
QA
76
.
L28
Vol
.
2828


155. CompTIA security+ guide to network security fundamentals /
Author: Mark Ciampa.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides.,Data protection.,Computer networks-- Security measures-- Examinations.,Data protection.
Classification :
TK5105
.
59
.
C52
2018


156. Computer and information security handbook
Author: edited by John R. Vacca
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Computer networks -- Security measures,، Data protection
Classification :
QA
76
.
9
.
A25C625
2017


157. Computer security :
Author: Sokratis K. Katsikas, Frédéric Cuppens, Nora Cuppens, Costas Lambrinoudakis, Annie Antón, Stefanos Gritzalis, John Mylopoulos, Christos Kalloniatis (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25


158. Computer security - ESORICS 2012
Author: Sara Foresti, Moti Yung, Fabio Martinelli (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
E98
2012eb


159. Contemporary computing :
Author: Sanjay Ranka [and others] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science, Congresses.,Soft computing, Congresses.,Computer science.,Computer science.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Informatique.,Soft computing.,Soft computing.
Classification :
QA75
.
5
.
I584
2009


160. Counter hack
Author: Skoudis, Ed
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer networks- Security measures►Data protection
Classification :
5105
.
59
.
S46
