• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۴ پاسخ غیر تکراری از ۴ پاسخ تکراری در مدت زمان ۰,۹۲ ثانیه یافت شد.

1. Hacking exposed

Author: / Stuart McClure, Joel Scambray, George Kurtz,McClure

Library: Central Library and Documents Center of Tehran University (Tehran)

Subject: Computer security,Computer networks -- Secrity measures,Data protection

Classification :
QA76
.
9
.
A25M428
مشاهده در قفسه مجازی RIS Bibtex ISO

2. Introduction to cryptography

Author: / Hans Delfs, Helmut Knebl,Delfs

Library: Central Library and Documents Center of Tehran University (Tehran)

Subject: Computer security,Crytography,Computer networks -- Secrity measures

Classification :
QA
76
.
9
.
A25D447
مشاهده در قفسه مجازی RIS Bibtex ISO

3. Network defense and countermeasures

Author: / Chuck Easttom,Easttom

Library: Central Library and Documents Center of Tehran University (Tehran)

Subject: Computer networks -- Secrity measures

Classification :
TK
5105
.
59
.
E26
مشاهده در قفسه مجازی RIS Bibtex ISO

4. Security politicies and procedures; Principles and practices

Author: / Sari Stern Greene,Greene

Library: Central Library and Documents Center of Tehran University (Tehran)

Subject: Industries -- Security measures,Computer networks -- Secrity measures

Classification :
HV
8290
.
G745
مشاهده در قفسه مجازی RIS Bibtex ISO
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival