1. Check Point NG VPN-1/Firewall-1 :
Author: Jim Noble [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Computer programs.,Computer security-- Computer programs.,Firewalls (Computer security),Computer networks-- Security measures-- Computer programs.,Computer security-- Computer programs.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Firewalls (Computer security)
Classification :
QA76
.
9
.
A25
N63
2003eb


2. Computer networks and Internets /
Author: Douglas E. Comer, Department of Computer Sciences, Purdue University, West Lafayette, IN 47907.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Internetworking (Telecommunication),Computer networks.,Internetworking (Telecommunication)
Classification :
TK5105
.
5
.
C5897
2015


3. Configuring Check Point NGX VPN-1/FireWall-1 /
Author: Robert Stephens, Barry J. Stiefel, Stephen Watkins.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: FireWall-1.,Computer networks-- Security measures.,Firewalls (Computer security),Computer networks-- Security measures-- Computer programs.,Computer networks-- Security measures.,Computer security-- Computer programs.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Extranets (Computer networks),Firewalls (Computer security),Firewalls (Computer security)
Classification :
TK5105
.
59
.
S846
2005eb


4. Firewall policies and VPN configurations
Author: Anne Henmi, technical editor; Mark Lucas, Abhishek Singh, Chris Cantrell.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures.,COMPUTERS -- Internet -- Security.,Firewalls (Computer security)
Classification :
TK5105
.
59
A564
2006


5. Guide to computer network security /
Author: Joseph Migga Kizza.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Business & Economics-- Information Management.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- System Administration-- Storage & Retrieval.,Data mining.,Information architecture.,Information retrieval.,Network hardware.
Classification :
TK5105
.
59


6. Hacking exposed :
Author: Joel Scambray, Stuart McClure, George Kurtz.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer security.,Computerbeveiliging.,Computernetwerken.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Hacking.
Classification :
TK5105
.
59
.
M48
2001eb


7. How to cheat at managing information security /
Author: Mark Osborne ; Paul M. Summitt, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management.,Information technology-- Security measures.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25
O83
2006eb


8. How to cheat at securing Linux /
Author: Mohan Krishnamurthy [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Linux.,Linux.,Linux.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
TK5105
.
59
.
H683
2008eb


9. Introduction to network security
Author: Neal Krawetz.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols -- Textbooks.,Computer networks -- Security measures -- Textbooks.,COMPUTERS -- Internet -- Security.
Classification :
TK5105
.
59
N435
9999


10. Intrusion detection and correlation :
Author: by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Electronic countermeasures.,Intrusion detection systems (Computer security),Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Electronic countermeasures.,Electronic countermeasures.,Informatique.,Intrusion detection systems (Computer security)
Classification :
TK5105
.
59
.
K78
2005eb


11. Network security :
Author: Jan L. Harrington.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Computer networks-- Security measures.,Computerbeveiliging.,Computernetwerken.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
TK5105
.
59
.
H357
2005eb

