1. Cisco IOS access lists
Author: / Jeff Sedayao
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Cisco IOS,Computer networks , Access control,Computer networks , Security measures,Electronic books. , local
Classification :
E-BOOK

2. Cisco secure Internet security solutions
Author: / Andrew G. Mason, Mark J. Newcomb
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Internet , Security measures,Electronic books. , local
Classification :
E-BOOK

3. Computer network security
Author: / Joseph Migga Kizza
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Electronic books. , local
Classification :
E-BOOK

4. Configuring SonicWALL firewalls
Author: / Chris Lathem et al
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Firewalls (Computer security),Computer networks , Security measures,Electronic books. , local
Classification :
E-BOOK

5. Decision and game theory for securit
Author: / Tansu Alpcan, Levente Buttyaan, John S. Baras (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures, Congresses,Decision making, Congresses,Game theory, Congresses,Electronic books., local

6. Hacker's challenge
Author: / Mike Schiffman
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Computer security,Electronic books. , local
Classification :
E-BOOK

7. Inside network perimeter security
Author: / Stephen Northcutt ... [et al.]
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Electronic books. , local
Classification :
E-BOOK

8. Network security assessment
Author: / Steve Manzuik, Andr├ش Gold, Chris Gatford
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures.,Computer security , Evaluation , Methodology.,Electronic books. , local 1
Classification :
E-BOOK

9. Network security foundations
Author: / Matthew Strebe
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Computer security,Electronic books. , local
Classification :
E-BOOK

10. Programming .NET security
Author: / Adam Freeman and Allen Jones
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Microsoft .NET,Electronic books. , local
Classification :
E-BOOK

11. Secure group communications over data networks
Author: / Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Computer security,Computer network protocols,Electronic books. , local
Classification :
E-BOOK

12. Special op
Author: / by Erik Pace Birkholz
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Firewalls (Computer security),Computer networks, Security measures,Computer network architectures,Electronic books., local
Classification :
TK5105
.
59
.
B498
2003


13. Special ops
Author: / by Erik Pace Birkholz
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: UNIX (Computer file),Oracle (Computer file),Computer networks , Security measures,Electronic books. , local
Classification :
E-BOOK
