161. Sécurité informatique :
Author: Laurent Bloch, Christophe Wolfhugel ; préfaces de Christian Queinnec et Hervé Schauer ; avec la contribution de Nat Makarévitch.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Internet-- Sécurité,Réseaux d'ordinateurs-- Sécurité,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
TK5105
.
59
.
B56
2007eb


162. Security for cloud storage systems
Author: Yang ; Kan,Kan Yang; Xiaohua Jia
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: Security measures ، Cloud computing,Security measures ، Computer networks,Internet / Security ، COMPUTERS
Classification :
TK

163. Security for multihop wireless networks /
Author: Shafiullah Khan and Jaime Lloret Mauri
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Ad hoc networks (Computer networks)-- Security measures,Wireless communication systems-- Security measures,Wireless Internet-- Security measures,Wireless sensor networks-- Security measures
Classification :
TK5103
.
2


164. Security for service oriented architectures
Author: Williams, Walter,Walter Williams
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Service-oriented architecture )Computer science(,Security measures ، Computer networks,، Computer security,، COMPUTERS / Software Development & Engineering / General,، COMPUTERS / Security / General,، COMPUTERS / Internet / General
Classification :
TK
5105
.
5828
.
W5


165. Security log management :
Author: Jacob Babbin [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
TK5105
.
59
.
B333
2006eb


166. The Executive guide to information security: threats, challenges, and solutions
Author: Mark Egan with Tim Mather
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection
Classification :
HF
،
5548
.
32
،.
E325
،
2005


167. The Internet security guidebook
Author: / Juanita Ellis, Tim Speed
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer networks -- Security measures,Internet (Computer network) -- Security measures,Electronic commerce -- Security measures
Classification :
TK
5105
.
59
.
E44
2001


168. The Internet security guidebook : from planning to deployment
Author: Juanita Ellis, Tim Speed
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,Security measures ، Internet,Security measures ، Electronic commerce
Classification :
TK
5105
.
59
.
E43


169. The NAT handbook : implementing and managing network address translation
Author: Dutcher, Bill
Library: Central Library and Documentation Center (Kerman)
Subject: ، Directory services )Computer network technology(,، Internet addresses,، Computer networks - Security measures
Classification :
TK
5105
.
595
.
D88
2001


170. The internet of risky things :
Author: Sean Smith.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Embedded Internet devices.,Internet of things-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Hardware.,COMPUTERS-- Internet.,COMPUTERS-- Security-- Online Safety & Privacy.,Embedded Internet devices.,TECHNOLOGY & ENGINEERING-- Industrial Technology.,TECHNOLOGY & ENGINEERING-- Mobile & Wireless Communications.,TECHNOLOGY & ENGINEERING-- Remote Sensing & Geographic Information Systems.,TECHNOLOGY & ENGINEERING-- Robotics.,TECHNOLOGY & ENGINEERING-- Sensors.
Classification :
TK5105
.
8857
.
S65
2017


171. The second economy :
Author: Steve Grobman, Allison Cerra ; foreword by Christopher Young
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Internet-- Security measures
Classification :
QA76
.
9
.
A25
G78
2016


172. The second economy :
Author: Steve Grobman, Allison Cerra ; foreword by Christopher Young
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Internet-- Security measures.
Classification :
QA76
.
9
.
A25


173. Trust and new technologies marketing and management on the Internet and mobile media
Author: editors, Teemu Kautonen, Heikki Karjaluoto
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Electronic commerce , Security measures,، Internet marketing , Security measures,، Business enterprises , Computer networks , Security measures,، Electronic commerce , Management,، Consumentengedrag , gtt,، Vertrouwen. , gtt,، Internet. , gtt,، Draadloze communicatie. , gtt
Classification :
HF
5415
.
1265
T78
2008


174. Trust in cyberspace /
Author: Fred B. Schneider, editor ; Committee on Information Systems Trustworthiness, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Internet-- Security measures.,Telecommunication policy-- United States.,Computer Security.,Internet.,Public Policy.,Telecommunications.,BUSINESS & ECONOMICS-- Industries-- Media & Communications.,Computer networks-- Security measures.,COMPUTERS.,Electrical & Computer Engineering.,Engineering & Applied Sciences.,Internet / Security.,Internet-- Security measures.,Internet.,Sicherheit,TECHNOLOGY & ENGINEERING-- Telecommunications.,Telecommunication policy.,Telecommunications.,Telekommunikationspolitik,Verteiltes System,United States.,USA., 7, 7
Classification :
TK5105
.
59
.
T78
1999eb


175. Trustworthy Internet
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Congresses. ; Internet ; Security measures ; Congresses. ; Wireless communication systems ; Security measures ; Congresses. ; Data protection ; Congresses. ; Privacy, Right of ; Congresses. ; Digital communications

176. Trustworthy Internet
Author: \ Nicola Blefari-Melazzi, Giuseppe Bianchi, Luca Salgarelli, editors.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks-- Security measures, Congresses.,Internet-- Security measures, Congresses.,Wireless communication systems-- Security measures, Congresses.,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,اینترنت -- تدابیر ایمنی -- کنگره ها,ارتباطات بیسیم -- تدابیر ایمنی -- کنگره ها
Classification :
TK
5105
.
59
.
T7
2010
E-Book
,


177. Trustworthy Internet
Author: / Nicola Blefari-Melazzi, Giuseppe Bianchi, Luca Salgarelli, editors
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Congresses,Internet--Security measures--Congresses,Wireless communication systems--Security measures--Congresses,Data protection--Congresses,Privacy, Right of--Congresses,Digital communications--Congresses
Classification :
TK
,
5105
.
59
,.
T79
,
2010


178. Using the Internet safely for seniors for dummies /
Author: Linda Criddle, Nancy C. Muir.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Internet and older people.,Internet.,Computer networks-- Security measures.,Internet and older people.,Internet.
Classification :
TK5105
.
875
.
I57
C72
2009


179. VPN applications guide : real solutions for enterprise networks
Author: McDysan, David E.
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Extranets (Computer networks) ► Business enterprises- Computer networks ► Internet ► Computer networks- Security measures
Classification :
M478v

180. VPN applications guide : real solutions for enterprise networks
Author: David McDysan
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Extranets )Computer networks(,Computer networks ، Business enterprises,، Internet,، Computer networks -- Security measures
Classification :
TK
5105
.
875
.
E87M33

