1. AVIEN malware defense guide for the Enterprise /
Author: David Harley [and others] ; foreword by Robert S. Vibert.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Computer viruses.,Computer networks-- Security measures.,Computer security-- Management.,Computer viruses.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
A873
2007eb


2. Advanced monitoring in P2P botnets :
Author: Shankar Karuppayah.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control.,Computer networks-- Security measures.,Malware (Computer software),Peer-to-peer architecture (Computer networks),Computer networks-- Access control.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Networking-- General.,Malware (Computer software),Mathematical physics.,Network hardware.,Peer-to-peer architecture (Computer networks)
Classification :
TK5105
.
59
.
K37
2018


3. Check Point NG VPN-1/Firewall-1 :
Author: Jim Noble [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Computer programs.,Computer security-- Computer programs.,Firewalls (Computer security),Computer networks-- Security measures-- Computer programs.,Computer security-- Computer programs.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Firewalls (Computer security)
Classification :
QA76
.
9
.
A25
N63
2003eb


4. Computer networks and Internets /
Author: Douglas E. Comer, Department of Computer Sciences, Purdue University, West Lafayette, IN 47907.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Internetworking (Telecommunication),Computer networks.,Internetworking (Telecommunication)
Classification :
TK5105
.
5
.
C5897
2015


5. Computer security, privacy, and politics :
Author: Ramesh Subramanian, editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Government policy.,Computer security.,Computer networks-- Security measures.,Computer security-- Government policy.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
C6557
2008eb


6. Configuring Check Point NGX VPN-1/FireWall-1 /
Author: Robert Stephens, Barry J. Stiefel, Stephen Watkins.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: FireWall-1.,Computer networks-- Security measures.,Firewalls (Computer security),Computer networks-- Security measures-- Computer programs.,Computer networks-- Security measures.,Computer security-- Computer programs.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Extranets (Computer networks),Firewalls (Computer security),Firewalls (Computer security)
Classification :
TK5105
.
59
.
S846
2005eb


7. Cryptology and network security :
Author: Jan Camenisch, Panos Papadimitratos (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer Communication Networks.,Computers and Society.,Cryptology.,Information Systems and Communication Service.,Software Engineering/Programming and Operating Systems.,Computer networking & communications.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- Online Services-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Ethical & social aspects of IT.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25


8. Cyber Security.
Author: John G Voeller
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures.,COMPUTERS -- Internet -- Security.,Cyberspace -- Security measures.
Classification :
QA76
.
9
J646
2014


9. Cyber resilience of systems and networks /
Author: Alexander Kott, Igor Linkov, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Cyberspace-- Security measures.,Internet-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,COMPUTERS-- Security-- Networking.,Internet-- Security measures.,Reliability engineering.
Classification :
TK5105
.
59
.
C929
2019


10. Cybersecurity in Nigeria :
Author: Aamo Iorliam.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Nigeria.,Computer security-- Nigeria.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Online Safety & Privacy.,Nigeria., 7
Classification :
QA76
.
9
.
A25


11. Fuzzing for software security testing and quality assurance /
Author: Ari Takanen, Jared DeMott, Charlie Miller.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer software-- Development.,Logiciels-- Qualité-- Contrôle.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Sécurité informatique.,Computer networks-- Security measures.,Computer security.,Computer software-- Development.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
T335
2008eb


12. ISA server and beyond :
Author: Thomas W. Shinder, Debra Littlejohn Shinder ; Martin Grasdal, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Microsoft ISA server.,Microsoft ISA server.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
TK5105
.
59
.
S55
2002eb


13. (ISC)² CISSP certified information systems security professional official study guide /
Author: Mike Chapple, James Michael Stewart, Darril Gibson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Examinations, Study guides.,Electronic data processing personnel-- Certification.,Telecommunications engineers-- Certification.,Computer networks-- Security measures-- Examinations.,Computer security-- Examinations.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Electronic data processing personnel-- Certification.,Telecommunications engineers-- Certification.
Classification :
QA76
.
3
.
C4255
2018


14. IT governance :
Author: Alan Calder & Steve Watkins.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Business enterprises-- Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.
Classification :
QA76
.
9
.
A25
C342
2008eb


15. Information Technology -- New Generations :
Author: Shahram Latifi, editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science, Congresses.,Electrical engineering.,Information technology, Congresses.,Algorithms & data structures.,Computer science.,Computer security.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Electrical engineering.,Information retrieval.,Information technology.
Classification :
QA75
.
5


16. Introduction to computer and network security :
Author: Richard R. Brooks, Clemson University, South Carolina, USA
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Data encryption (Computer science),Data protection
Classification :
QA76
.
9
.
A25
B7745
2014


17. Joomla! web security :
Author: Tom Canavan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Joomla! (Computer file),Joomla! (Computer file),Joomla! (Computer file),Computer networks-- Security measures.,Web site development.,Web sites-- Authoring programs.,Web sites-- Security measures.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Web site development.,Web site development.,Web sites-- Authoring programs.,Web sites-- Authoring programs.,Web sites-- Security measures.,Web sites-- Security measures.
Classification :
TK5105
.
59
.
C36
2008


18. Learn Social Engineering :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Kali Linux.,Kali Linux.,Computer networks-- Security measures.,Penetration testing (Computer security),Social engineering.,Computer networks-- Security measures.,Computer security.,Computers-- Internet-- Security.,Computers-- Networking-- Security.,Computers-- Security-- General.,Network security.,Penetration testing (Computer security),Privacy & data protection.,Social engineering.
Classification :
TK5105
.
59
.
O953
2018eb


19. Managing Cisco network security /
Author: Eric Knipp [and others] ; Edgar Danielyan, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cisco Systems, Inc.,Cisco Systems, Inc.,Computer networks-- Management.,Computer networks-- Security measures.,Computer networks-- Management.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
TK5105
.
59
.
M36
2002eb


20. Managing and securing a Cisco structured wireless-aware network /
Author: David Wall [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Wireless LANs.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Wireless LANs.
Classification :
TK5105
.
59
M36
2004eb

