• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۹۷ پاسخ غیر تکراری از ۹۸ پاسخ تکراری در مدت زمان ۰,۵۰ ثانیه یافت شد.

41. Intrusion detection with Snort

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jack Koziol

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Computer security,Computers- Access control

Classification :
TK5105
.
59
.
K69
2003

42. Intrusion detection with Snort /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jack Koziol.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.

Classification :
TK5105
.
59
.
K69
2003eb

43. Intrusion detection with Snort

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jack Koziol

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer networks--Security measures,Computer security.,Computers--Access control

Classification :
TK
,
5105
.
59
,.
K69
,
2003

44. Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Himanshu Sharma

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Penetration testing )Computer security(,، Computer security,، Computers -- Access control,، Computer networks -- Security measures

Classification :
QA
76
.
9
.
A25S522

45. Kali Linux network scanning cookbook

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Justin Hutchens

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25
H883
2014

46. Managing security with Snort and IDS tools

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Kerry Cox and Christopher Gerg

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Snort (Computer file),Computer security,Computers- Access control,Computer networks- Security measures

Classification :
E-BOOK

47. Managing security with Snort and IDS tools

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Kerry Cox and Christopher Gerg

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Snort (Computer file),Computer security,Computers- Access control,Computer networks- Security measures

Classification :
TK5105
.
59
.
C65
2004

48. Metasploit

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: by David Kennedy ... [et al.]

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Testing,Computers-- Access control,Open source software,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25
M4865
2011

49. Metasploit Penetration Testing Cookbook :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Management.,Computers-- Access control.,Data protection.,Information technology-- Security measures.,Computer networking & communications.,Computer networks-- Security measures.,Computer security-- Management.,Computer security.,Computers-- Access control.,Computers-- Networking-- Security.,Computers-- Security-- General.,Computers-- System Administration-- General.,Data protection.,Information technology-- Security measures.,Network security.

Classification :
QA76
.
9
.
A25
.
T459
2018eb

50. Metasploit penetration testing cookbook

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Testing,Computers-- Access control,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25
S56
2012

51. Metasploit penetration testing cookbook

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Monika Agarwal, Abhinav Singh

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Testing,Computers-- Access control,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25
A34
2013

52. Network security assessment

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Chris McNab

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computers- Access control- Evaluation,Computer networks- Security measures- Evaluation

Classification :
QA76
.
9
.
A25
,
M4355
2008

53. Network security assessment

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Chris McNab

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computers- Access control- Evaluation,Computer networks- Security measures- Evaluation

Classification :
QA76
.
9
.
A25
,
M4355
2004

54. Network security tools

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Dhanjani, Nitesh

Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)

Subject: ، Computer security,Security measures ، Computer networks,Access control ، Computers

Classification :
QA
76
.
9
.
A25
D523
2005

55. Network security tools

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Nitesh Dhanjani and Justin Clarke

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Computer security,، Computer networks -- Security measures,، Computers -- Access control

Classification :
QA
76
.
9
.
A25D486

56. Network security tools

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Nitesh Dhanjani and Justin Clarke

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer security,Computer networks- Security measures,Computers- Access control

Classification :
QA76
.
9
.
A25
,
D523
2005

57. OpenAM

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Indira Thangasamy

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Access control,Computers-- Access control,Electronic commerce-- Security measures

Classification :
QA76
.
9
.
A25
T43
2011

58. Oracle Identity and Access Manager 11g for administrators

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Atul Kumar

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Database security

Classification :
QA76
.
9
.
A25
K863
2011

59. Outsourcing information security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / C. Warren Axelrod

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks, Security measures, United States,Computers, Access control, United States,Data encryption (Computer science)

Classification :
QA76
.
9
.
A25
,
A88
2004

60. Outsourcing information security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / C. Warren Axelrod

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures United States,Computers- Access control United States,Data encryption (Computer science)

Classification :
QA76
.
9
.
A25
,
A88
2004
  • »
  • 5
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival