• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۳۸ پاسخ غیر تکراری از ۳۸ پاسخ تکراری در مدت زمان ۰,۶۱ ثانیه یافت شد.

1. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: \ S.V. Raghavan and E. Dawson, editors.

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Denial of service attacks.,Computer networks-- Security measures.,Computer crimes-- Prevention.,حمله‌های منجر به قطع سرویس‌دهی ,شبکه‌های کامپیوتری -- تدابیر ایمنی,جرایم کامپیوتری -- پیشگیری

Classification :
TK
5105
.
59
.
I5
2011
E-Book
,

2. An investigation into the detection and mitigation of Denial of Service (DoS) attacks

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Denial of service attacks. ; Computer networks ; Security measures. ; Computer crimes ; Prevention. ;

Classification :

3. An investigation into the detection and mitigation of Denial of Service (DoS) attacks

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / S.V. Raghavan and E. Dawson, editors

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Denial of service attacks.,Computer networks--Security measures,Computer crimes--Prevention

Classification :
TK
,
5105
.
59
,.
I57
,
2011

4. Cyber security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jack Caravelli and Nigel Jones.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Computer networks-- Security measures-- Government policy.,Security, International.,BUSINESS & ECONOMICS / Industrial Management,BUSINESS & ECONOMICS / Management,BUSINESS & ECONOMICS / Management Science,BUSINESS & ECONOMICS / Organizational Behavior,Computer crimes-- Prevention.,Computer networks-- Security measures-- Government policy.,Security, International.

Classification :
TK5105
.
59
.
C364
2019eb

5. Cyber security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jack Caravelli and Nigel Jones,Caravelli, Jack,

Library: Faculty of Law and Political Sciences (Tehran)

Subject: Computer networks,Computer crimes,Security, International.,Government policy.,Security measures,Prevention.

Classification :
TK5105
.
59
.
C36

6. Cyber security awareness for CEOs and management

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: David Willson ; contributing editor, Henry Dalziel.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business enterprises-- Computer networks-- Security measures.,Computer crimes-- Prevention.,Computer security.,Corporations-- Security measures.,Data protection.

Classification :

7. Cyber threat!: how to manage the growing risk of cyber attacks

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Ulsch, N. MacDonnell

Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)

Subject: Security measures ، Corporations,Computer networks Security measures ، Business enterprises,Prevention ، Computer crimes,، Computer security,Security measures ، Computer networks,، BUSINESS & ECONOMICS / Information Management

Classification :
HD
30
.
2
.
U47

8. Cybersecurity

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Thomas J. Mowbray ; technical editor, Rob Shimonski.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer security.,Cyberspace-- Security measures.,Information technology-- Security measures.

Classification :

9. Cybersecurity, cyberanalysis, and warning /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Kerry T. Norwood and Sandra P. Catwell, editors.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Automatic data collection systems.,Computer crimes-- United States-- Prevention.,Computer networks-- Security measures-- United States.,Cyberterrorism-- United States-- Prevention.,Electronic government information-- Access control-- United States.,Electronic government information-- Protection-- Government policy-- United States.,Automatic data collection systems.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Cyberterrorism-- Prevention.,Electronic government information-- Access control.,POLITICAL SCIENCE-- Public Affairs & Administration.,United States., 7

Classification :
TK5105
.
59

10. Hacking web apps :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Mike Shema

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Application software-- Security measures,Computer crimes-- Prevention,Computer networks-- Security measures,Computer security,Web site development-- Security measures

Classification :
TK5105
.
59
.
S5234
2012

11. Handbook of research on information and cyber security in the fourth industrial revolution /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Ziska Fields, University of KwaZulu-Natal, South Africa.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Confidential communications-- Protection.,Electronic information resources-- Access control.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Electronic information resources-- Access control.

Classification :
TK5105
.
59
.
P744
2018e

12. Handbook of research on information security and assurance

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jatinder N.D. Gupta, Sushil K. Sharma [editors].

Library: Campus International Library of Kish University of Tehran (Hormozgan)

Subject: Computer networks -- Security measures,Electronic information resources--Access control,Computer crimes--Prevention

Classification :
TK
5105
.
59
.
H353
2009
R

13. How to define and build an effective cyber threat intelligence capability

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Henry Dalziel ; [contributing editors, Eric Olson, James Carnall].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- United States-- Prevention.,Computer networks-- Security measures-- United States.,Cyber intelligence (Computer security)-- United States.,Cyberterrorism-- United States-- Prevention.,National security-- United States.

Classification :

14. Human-computer interaction and cybersecurity handbook /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Abbas Moallem

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention, Handbooks, manuals, etc.,Computer networks-- Security measures, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Technology and international relations.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Technology and international relations.

Classification :
TK5105
.
59
.
H86
2019eb

15. Internet denial of service

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jelena Mirkovic ... [et al.]

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Internet- Security measures,Computer crimes- Prevention

Classification :
TK5105
.
59
.
I5455
2004

16. Internet denial of service: attack and defense mechanisms

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jelena Mirkovic...]et al.[

Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)

Subject: Security measures ، Computer networks,Security measures ، Internet,Prevention ، Computer crimes

Classification :
TK
5105
.
59
.
I5455
2005

17. Managing a network vulnerability assessment

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Thomas R. Peltier, Justin Peltier, and John A. Blackley

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Risk assessment,Computer crimes- Prevention

Classification :
TK5105
.
59
.
P453
2003

18. Network attacks and exploitation :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Matthew Monte

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business enterprises-- Computer networks-- Security measures.,Computer crimes-- Prevention.,Computer security.,Corporations-- Security measures.

Classification :
HF5548
.
37
M665
2015eb

19. Practical cyber intelligence :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Wilson Bautista Jr.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Cyber intelligence (Computer security),Cyberterrorism-- Prevention.,Information technology-- Security measures.,Coding theory & cryptology.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer science.,COMPUTERS / Security / General,Cyber intelligence (Computer security),Cybernetics & systems theory.,Cyberterrorism-- Prevention.,Data encryption.,Information technology-- Security measures.

Classification :
HV6773

20. Preventing ransomware :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Abhijit Mohanta, Mounir Hahad, Kumaraguru Velmurugan.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Computer crimes.,Computer networks-- Security measures.,Computer security.,Malware (Computer software),Coding theory & cryptology.,Computer crimes-- Prevention.,Computer crimes.,Computer networks-- Security measures.,Computer security.,Computer security.,Computer viruses, Trojans & worms.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Viruses & Malware.,Data encryption.,Malware (Computer software)

Classification :
QA76
.
9
.
A25
M64
2018
  • »
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival