• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۳۸ پاسخ غیر تکراری از ۳۸ پاسخ تکراری در مدت زمان ۱,۷۸ ثانیه یافت شد.

21. Routledge companion to global cyber-security strategy /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Scott N. Romaniuk and Mary Manjikian.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention-- Government policy.,Computer networks-- Security measures-- Government policy.,Computer security-- Government policy.,Cyberspace-- Security measures-- Government policy.,Cyberterrorism-- Prevention-- Government policy.,Internet-- Security measures-- Government policy.,Computer networks-- Security measures-- Government policy,Computer security-- Government policy,COMPUTERS / Internet / Security,HISTORY / Military / Strategy,POLITICAL SCIENCE / Political Freedom & Security / International Security

Classification :
UA163
.
R68
2021

22. Security and privacy in social network

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Yaniv Altshuler ... [et al., editors]

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Online social networks, Security measures,Data encryption (Computer science),Data protection,Computer crimes, Prevention,Electronic books

Classification :
E-BOOK

23. Security awareness :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Mark Ciampa, Ph. D.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Confidential communications-- Protection.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computers and IT.,Computers and IT.

Classification :
TK5105
.
59
.
C53
2017

24. Seven deadliest social network attacks

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Carl Timm, Richard Perez ; technical editor, Adam Ely

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: Web 2.0, Security measures,Online social networks, Security measures,Computer networks, Security measures,Computer security,Malware (Computer software), Prevention,Computer crimes, Prevention

Classification :
TK
،
5105
.
88817
،.
T56
،
2010

25. Spring Security 3.1

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Robert Winch, Peter Mularien

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention,Computer networks-- Security measures,Malware (Computer software)-- Prevention,Web sites-- Design,Web sites-- Security measures

Classification :
TK5105
.
59
.
W563
2012

26. Syngress force emerging threat analysis

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer crimes ; Prevention. ; Computer networks ; Security measures. ; Computer security. ;

Classification :

27. Syngress force emerging threat analysis :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: David Maynor ... [et al.]

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention,Computer networks-- Security measures,Computer security

Classification :

28. Targeted cyber attacks

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Aditya K. Sood, Richard Enbody ; technical editor Peter Loshin

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention,Computer networks-- Security measures,Cyberspace-- Security measures

Classification :
TK5105
.
59
.
S66
2014

29. The basics of web hacking

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Josh Pauli ; Scott White, technical editor.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Hackers.,Penetration testing (Computer security),Web applications-- Security measures.,Web sites-- Security measures.

Classification :

30. The basics of web hacking

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Josh Pauli

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention,Computer hackers,Computer networks-- Security measures,Penetration testing (Computer security),Web applications-- Security measures,Web sites-- Security measures

Classification :
TK5105
.
59
.
P385
2013

31. The hacker playbook :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Peter Kim

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention,Computer networks-- Security measures,Computer programming,Computer software-- Testing,Hackers,Penetration testing (Computer security), Handbooks, manuals, etc

Classification :

32. The hacker playbook 3 :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Peter Kim.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25
K56
2018

33. The hacker playbook 2 :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Peter Kim.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.

Classification :

34. Understanding cyber risk :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Thomas R. Koehler.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business enterprises-- Computer networks-- Security measures.,Business intelligence.,Computer crimes-- Prevention.,Data protection.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Business enterprises-- Computer networks-- Security measures.,Business intelligence.,Computer crimes-- Prevention.,Data protection.

Classification :
HF5548
.
37
.
K64
2018

35. Vulnerability analysis and defense for the Interne

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / by Abhishek Singh (editor)

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer security.,Computer networks--Security measures--Evaluation,Computer crimes--Prevention

Classification :
QA
,
76
.
9
,.
A25
,
V848
,
2008

36. Vulnerability analysis and defense for the Internet

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer security. ; Computer networks ; Security measures ; Evaluation. ; Computer crimes ; Prevention. ;

Classification :

37. Vulnerability analysis and defense for the Internet

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: by Abhishek Singh (editor) ; [with contributions by] Baibhav Singh and Hirosh Joseph.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Computer networks-- Security measures-- Evaluation.,Computer security.

Classification :

38. Web Application Defender's Cookbook :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer security.,Hackers.

Classification :
QA76
.
9
.
A25
B37
2013eb
  • »
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival