341. Metasploit Penetration Testing Cookbook :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Computers-- Access control.,Data protection.,Information technology-- Security measures.,Computer networking & communications.,Computer networks-- Security measures.,Computer security-- Management.,Computer security.,Computers-- Access control.,Computers-- Networking-- Security.,Computers-- Security-- General.,Computers-- System Administration-- General.,Data protection.,Information technology-- Security measures.,Network security.
Classification :
QA76
.
9
.
A25
.
T459
2018eb


342. Microsoft Office Outlook 2007 inside out /
Author: Jim Boyce, Beth Sheresh, Doug Sheresh.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Microsoft Outlook.,Microsoft Outlook.,Microsoft Outlook.,Microsoft Outlook.,Business-- Computer programs.,Electronic mail systems-- Computer programs.,Personal information management-- Computer programs.,Time management-- Computer programs.,Computer Communication Networks.,Electronic Mail.,Business & Economics.,Business-- Computer programs.,Business-- Computer programs.,Commerce.,COMPUTERS-- Enterprise Applications-- General.,Electronic mail systems-- Computer programs.,Electronic mail systems-- Computer programs.,Marketing & Sales.,Personal information management-- Computer programs.,Personal information management-- Computer programs.,Time management-- Computer programs.,Time management-- Computer programs.
Classification :
HF5548
.
4
.
M5255
B69
2007eb


343. Microsoft System center configuration manager 2007 administrator's companion
Author: Steven D. Kaczmarek with the Microsoft System center configuration manager team.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Management.,COMPUTERS -- Data Transmission Systems -- General.,Microsoft System center configuration manager.
Classification :
TK5105
.
5
S748
2008


344. Microsoft Windows 2000 security /
Author: Rashi Gupta with NIIT.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Microsoft Windows (Computer file),Microsoft Windows (Computer file),Computer security.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
G87
2003eb


345. Migrating to MariaDB :
Author: William Wood.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: MariaDB.,MariaDB.,Database management-- Computer programs.,Open source software.,Database management-- Computer programs.,Open source software.
Classification :
QA76
.
9
.
D3
W66
2016


346. Mobile, Secure, and Programmable Networking :
Author: Éric Renault, Selma Boumerdassi, Cherkaoui Leghris, Samia Bouzefrane (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks, Congresses.,Mobile computing, Congresses.,Computer networks.,Mobile computing.
Classification :
TK5105
.
5
.
M76
2019


347. Network Scanning Cookbook /
Author: Jetty, Sairam.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.

348. Network and System Security :
Author: edited by Javier Lopez, Xinyi Huang, Ravi Sandhu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer Communication Networks.,Computer science.,Data protection.

349. Network security bible /
Author: Eric Cole, Ronald Krutz, James W. Conley.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.
Classification :
QA76
.
9
.
A25
C5985
2009


351. Niʻmatnāmah-yi Nāṣiruddīn Shāhī.,0415325293 (Paperba
Author: translated by Norah M. Titley. ,edited by Frederick W. Kagan and Christian Kubik.
Library: Library of Islamic Parliament (Tehran)
Subject:

352. Office 365 Essentials :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Microsoft Office.,Microsoft Office.,Business-- Computer programs.,Information technology-- Management.,Business-- Computer programs.,COMPUTERS-- Enterprise Applications-- General.,Information technology-- Management.
Classification :
HF5548
.
4
.
M525
.
S558
2018eb


353. Official (ISC)2 guide to the ISSMP CBK
Author: edited by Harold F. Tipton
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management-- Examinations, Study guides,Data protection-- Examinations, Study guides,Electronic data processing departments-- Security measures-- Examinations, Study guides,Electronic data processing personnel-- Certification
Classification :
QA76
.
9
.
A25
O344
2012


354. Online consumer protection :
Author: Kuanchin Chen, Adam Fadlalla [editors].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Consumer protection.,Disclosure of information.,Electronic commerce-- Security measures.,Electronic information resources-- Access control.,Ethical relativism.,Privacy, Right of.,BUSINESS & ECONOMICS-- Commercial Policy.,BUSINESS & ECONOMICS-- Consumer Behavior.,Computer crimes.,Consumer protection.,Disclosure of information.,Electronic commerce-- Security measures.,Electronic information resources-- Access control.,Ethical relativism.,Privacy, Right of.
Classification :
HC79
.
C63
O54
2009eb


355. Oracle high availability, disaster recovery, and cloud services :
Author: Y.V. Ravi Kumar, Nassyam Basha, Krishna Kumar K.M., Bal Mukund Sharma and Konstantin Kerekovski.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Oracle (Computer file),Oracle (Computer file),Cloud computing.,Relational databases.,Cloud computing.,COMPUTERS-- Databases-- General.,Relational databases.
Classification :
QA76
.
9
.
D3


356. Outsourcing IT, the legal aspects :
Author: Rachel Burnett.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer contracts-- Great Britain.,Computer contracts.,Contracting out-- Great Britain.,Contracting out.,Information technology-- Great Britain.,Information technology.,Computer contracts.,Contracting out.,Information technology.,LAW-- Military.,Great Britain., 7
Classification :
KD1642
.
C65
B87
2009eb


357. Outsourcing IT, the legal aspects
Author: / Rachel Burnett,Burnett, Rachel.
Library: Special Library of Law (Tehran)
Subject: Computer contracts -- Great Britain,Contracting out -- Great Britain,Information technology -- Great Britain
Classification :
KD1642
.
C65
2009
,
DB4237


360. PRACTICAL HANDBOOK OF WAREHOUSING.
Author: KENNETH B ACKERMAN
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject:
Classification :
HF5485
.
K466
1991

