• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۱۱ پاسخ غیر تکراری از ۱۱ پاسخ تکراری در مدت زمان ۱,۳۸ ثانیه یافت شد.

1. Check Point NG VPN-1/Firewall-1 :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jim Noble [and others].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Computer programs.,Computer security-- Computer programs.,Firewalls (Computer security),Computer networks-- Security measures-- Computer programs.,Computer security-- Computer programs.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Firewalls (Computer security)

Classification :
QA76
.
9
.
A25
N63
2003eb

2. Computer networks and Internets /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Douglas E. Comer, Department of Computer Sciences, Purdue University, West Lafayette, IN 47907.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks.,Internetworking (Telecommunication),Computer networks.,Internetworking (Telecommunication)

Classification :
TK5105
.
5
.
C5897
2015

3. Configuring Check Point NGX VPN-1/FireWall-1 /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Robert Stephens, Barry J. Stiefel, Stephen Watkins.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: FireWall-1.,Computer networks-- Security measures.,Firewalls (Computer security),Computer networks-- Security measures-- Computer programs.,Computer networks-- Security measures.,Computer security-- Computer programs.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Extranets (Computer networks),Firewalls (Computer security),Firewalls (Computer security)

Classification :
TK5105
.
59
.
S846
2005eb

4. Firewall policies and VPN configurations

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Anne Henmi, technical editor; Mark Lucas, Abhishek Singh, Chris Cantrell.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks -- Security measures.,COMPUTERS -- Internet -- Security.,Firewalls (Computer security)

Classification :
TK5105
.
59
A564
2006

5. Guide to computer network security /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Joseph Migga Kizza.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Business & Economics-- Information Management.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- System Administration-- Storage & Retrieval.,Data mining.,Information architecture.,Information retrieval.,Network hardware.

Classification :
TK5105
.
59

6. Hacking exposed :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Joel Scambray, Stuart McClure, George Kurtz.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer security.,Computerbeveiliging.,Computernetwerken.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Hacking.

Classification :
TK5105
.
59
.
M48
2001eb

7. How to cheat at managing information security /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Mark Osborne ; Paul M. Summitt, technical editor.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security-- Management.,Information technology-- Security measures.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Information technology-- Security measures.

Classification :
QA76
.
9
.
A25
O83
2006eb

8. How to cheat at securing Linux /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Mohan Krishnamurthy [and others].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Linux.,Linux.,Linux.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.

Classification :
TK5105
.
59
.
H683
2008eb

9. Introduction to network security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Neal Krawetz.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer network protocols -- Textbooks.,Computer networks -- Security measures -- Textbooks.,COMPUTERS -- Internet -- Security.

Classification :
TK5105
.
59
N435
9999

10. Intrusion detection and correlation :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Electronic countermeasures.,Intrusion detection systems (Computer security),Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Electronic countermeasures.,Electronic countermeasures.,Informatique.,Intrusion detection systems (Computer security)

Classification :
TK5105
.
59
.
K78
2005eb

11. Network security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jan L. Harrington.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Computer networks-- Security measures.,Computerbeveiliging.,Computernetwerken.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.

Classification :
TK5105
.
59
.
H357
2005eb
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival