21. Cisco IOS access lists
Author: / Jeff Sedayao
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Cisco IOS,Computer networks , Access control,Computer networks , Security measures,Electronic books. , local
Classification :
E-BOOK

22. Cisco IOS access lists
Author: / Jeff Sedayao
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: CISCO IOS.,Computer networks--Security measures,Computer networks--Access control
Classification :
TK
,
5105
.
59
,.
S444
,
2001


23. Cisco IOS access lists
Author: Jeff Sedayao
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Computer networks- Security measures,Cisco IOS,Computer networks- Access control
Classification :
TK
,
5105
.
59
,.
S444
,
2001


24. Cisco IOS access lists
Author: / Jeff Sedayao
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Cisco IOS,Computer networks- Access control
Classification :
TK5105
.
59
.
S444
2001


25. Cisco NAC appliance
Author: / Jamey Heary
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks- Security measures,Computers- Access control
Classification :
E-BOOK

26. Cisco NAC appliance
Author: / Jamey Heary
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computers- Access control
Classification :
TK5105
.
59
.
H42
2008


27. Cisco NAC appliance
Author: / Jamey Heary
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computers , Access control,Computer networks , Security measures,Electronic books. , lcsh
Classification :
E-BOOK

28. Cisco Network Admission Control
Author: Denise Helfrich ... ]et al.[
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Access control ، Computer networks,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
C525


29. Cisco Network Admission Control
Author: Frahim, Jazib.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Access control ، Computer networks,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
F7347
2007


30. Cisco network admission control
Author: Denise Helfrich... ]et al.[
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Access control ، Computer networks,، Computer networks -- Security measures
Classification :
QA
76
.
9
.
A25C558


31. Client-side attacks and defense
Author: Robert Shimonski, Sean-Philip Oriyano
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control,Computer networks-- Security measures
Classification :
TK5105
.
597
.
S55
2012


32. Communications and multimedia security. volume 3, IFIP Joint TC6/TC11 Working Conference on Communications and Multimedia Security, 22-23 Sept. 1997, Athens, Greece
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Congresses ، Computer security,Congresses ، Telecommunication-- Security measures,Congresses ، Multimedia systems-- Security measures,Congresses ، Computer networks-- Security measures,Congresses ، Telecommunication-- Access control,Congresses ، Multimedia systems-- Access control,Congresses ، Computer networks-- Access control
Classification :
QA
76
.
9
.
A25
.
I455
1997


33. Computer network security
Author: / Igor Kotenko, Victor Skormin (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures, Congresses,Computer networks, Access control, Congresses
Classification :
QA76
.
9
.
A25I58
2010


34. Cryptology and network security
Author: Juan A. Garay, Atsuko Miyaji, Akira Otsuka (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Cryptography, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I5534
2009eb


35. Data security technologies in SAS 9.1.3.
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: SAS (Computer file),SAS (Computer file),Computer networks-- Security measures.,Computers-- Access control.,Data protection.,Computer networks-- Security measures.,Computers-- Access control.,Data protection.
Classification :
QA76
.
9
.
A25
D3532
2005


36. Detection of intrusions and malware, and vulnerability assessmen
Author: / Christian Kreibich, Marko Jahnke (Eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures, Congresses,Computer networks, Access control, Congresses,Electronic books
Classification :
TK5105
.
59
.
D56
2010


37. Detection of intrusions and malware, and vulnerability assessment :
Author: Thorsten Holz, Herbert Bos (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Computers-- Access control-- Evaluation, Congresses,Computers-- Access control, Congresses,Malware (Computer software), Congresses
Classification :
QA76
.
9
.
A25


38. Detection of intrusions and malware, and vulnerability assessment
Author: / Klaus Julisch, Christopher Kruegel (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computers--Access control--Congresses,Computers--Access control--Evaluation--Congresses,Computer networks--Security measures--Congresses,Computer security--Congresses,Intrusions,Malware,Vulnerability assessment,DIMVA
Classification :
QA
,
76
.
9
,.
A25
,
D563
,
2005


39. Detection of intrusions and malware, and vulnerability assessment
Author: / Christian Kreibich, Marko Jahnke (Eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures, Congresses,Computer networks, Access control, Congresses
Classification :
TK5105
.
59
.
D56
2010


40. Detection of intrusions and malware, and vulnerability assessment
Author: Ulrich Flegel, Danilo Bruschi (eds.)
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computers, Access control, Congresses,Computers, Access control, Evaluation, Congresses,Computer networks, Security measures, Congresses,Computer security, Congresses,Malware (Computer software), Congresses,Eindringerkennung, Kongress, Como <2009>,Kryptoanalyse, Kongress, Como <2009>,Malware, Kongress, Como <2009>,Softwareschwachstelle, Kongress, Como <2009>,Zugriffskontrolle, Kongress, Como <2009>,Como (2009), swd,Kongress., swd,Eindringerkennung., swd,Kryptoanalyse., swd,Malware., swd,Softwareschwachstelle., swd,Zugriffskontrolle., swd
Classification :
QA
،
76
.
9
،.
A25
,
D563
،
2009

