221. Hacking exposed: network security secrets & solutions
Author: McClure, Stuart
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Microsoft Windows )Computer file(,، Computer security,Security measures ، Computer networks,، Data protection
Classification :
QA
76
.
9
.
A25
M428
2005


222. Hacking exposed :network security secrets & solutions
پدیدآورنده : McClure, Stuart
موضوع : ، Computer security,Security measures ، Computer networks,، Data protection
۲ نسخه از این کتاب در ۲ کتابخانه موجود است.
223. Handbook of computer networks and cyber security
Author: Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Computer networks.,Computer security.
Classification :
TK5105
.
5


224. Handbook of research on digital crime, cyberspace security, and information assurance /
Author: Maria Manuela Cruz-Cunha, Polytechnic Institute of Cavado and Ave, Portugal, Irene Maria Portela, Polytechnic Institute of C�avado and Ave, Portugal.
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computer crimes.,Computer security.,Computer networks-- Security measures.,Data protection.,Information technology.
Classification :
HV6773
.
H375
2015


225. Hands-on cybersecurity with Blockchain :
Author: Rajneesh Gupta.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Blockchains (Databases),Computer networks-- Security measures.,Computer security.,Database security.,Denial of service attacks.,Blockchains (Databases),Computer networks-- Security measures.,Computer security.,Computer security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Online Safety & Privacy.,Data capture & analysis.,Database security.,Denial of service attacks.,Network security.
Classification :
QA76
.
9
.
A25
G87
2018


226. Honeypots :a new paradigm to information security
Author: Joshi, R. C.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Hackers,، Firewalls )Computer security(,Security measures ، Computer networks,Security measures ، Wireless communication systems
Classification :
QA
76
.
9
.
A25
J66
2011


227. How do rogue nations threaten human rights? -- North Korea represses freedom / Kay Seok -- Iran violates women's rights / Sam Brownback -- Sudanese government engages in genocide / Human Rights Watch -- United States violates human rights worldwide / Vernon Coleman -- Rogue nations undermine the United Nations' mission to promote human rights / Joseph Loconte -- U.S. invasions have not spread democracy in the Middle East / Phyllis Bennis -- How should the global community respond to rogue nations? -- Preemptive force is sometimes necessary to contain rogue nations / National Review -- Preemptive force threatens efforts to contain rogue states / Ivan Eland -- Missile defense system is necessary to protect against rogue nations / Dennis Ross -- Missile defense system is unnecessary / Gwynne Dyer -- Promoting globalization will reduce the threat posed by rogue states / Banning N. Garrett, Dennis M. Sherman -- Globalization
Author: Louise Gerdes, book editor.
Library: Library of Islamic Parliament (Tehran)
Subject:

228. IT Governance data security&BS 7799/ISO 17799
Author: / Alan Calder&Steve Watkins
Library: Library and knowledge management of the management schools of Tehran University (Tehran)
Subject: Computer security.,Data protection.,Business enterprises-Computer networks-Security measures
Classification :
005
.
8
C145i


229. IT governance :
Author: Alan Calder & Steve Watkins.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Business enterprises-- Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.
Classification :
QA76
.
9
.
A25
C342
2008eb


230. IT governance : a manager's guide to data security and ISO 27001/ISO 27002
Author: Calder, Alan
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Data protection,Computer networks Security measures ، Business enterprises
Classification :
QA
76
.
9
.
A25
C342
2008


231. Implementing the ISO/IEC 27001 information security management system standard
Author: / Edward Humphreys
Library: Central Library of Imam Khomeini International University of Qazvin (Qazvin)
Subject: Computer security- Management- Standards,Computer networks- Security measures- Standards,Data protection- Standards,Information technology- Standards
Classification :
QA76
.
9
.
A25
,
H855
2007


232. Implementing the ISO/IEC 27001 information security management system standard
Author: Edward Humphreys
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computer security -- Management -- Standards,Computer networks -- Security measures -- Standards,Data protection -- Standards,Information technology -- Standards
Classification :
QA
،
76
.
9
،.
A25
,
H855
،
2007


233. Implementing the ISO/IEC 27001 information security management system standard
Author: Humphreys, Edward.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Management - Standards ، Computer security,Security measures - Standards ، Computer networks,Standards ، Data protection,Standards ، Information technology
Classification :
QA
76
.
9
.
A25
H855
2007


234. 20090601 ,Includes bibliographical references and index. 0
Author: 20090602 ,20090602 0
Library: Library of Islamic Parliament (Tehran)
Subject:

235. Includes bibliographical references and index. 0
Author: Seán Duffy, editor ; associate editors, Ailbhe MacShamhráin, James Moynes.
Library: Library of Islamic Parliament (Tehran)
Subject:

236. Includes bibliographical references (p. 49-51). 0,B
Author: Zeren Tanındı. ,/ Katie Normington.
Library: Library of Islamic Parliament (Tehran)
Subject:

237. Includes bibliographical references (p. 375) and index. 0
Author: Brian M. Fagan.
Library: Library of Islamic Parliament (Tehran)
Subject:

238. Includes bibliographical references (p. 225-231) and index. 0
Author: Andrew Green.
Library: Library of Islamic Parliament (Tehran)
Subject:

239. Information Security and Assurance
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data protection -- Congresses,Computer security -- Congresses,Computer networks -- Security measures -- Congresses,حفاظت دادهها -- کنگرهها,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
E-Book
,

240. Information Systems Security :
Author: Sushil Jajodia, Chandan Mazumdar (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
I25
2011

