1. BackTrack 4
Author: Shakeel Ali, Tedi Heriyanto.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Evaluation.
Classification :
TK5105
.
59
.
A45
2011eb


2. Detection of intrusions and malware, and vulnerability assessment :
Author: Thorsten Holz, Herbert Bos (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Computers-- Access control-- Evaluation, Congresses,Computers-- Access control, Congresses,Malware (Computer software), Congresses
Classification :
QA76
.
9
.
A25


3. Detection of intrusions and malware, and vulnerability assessment
Author: / Klaus Julisch, Christopher Kruegel (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computers--Access control--Congresses,Computers--Access control--Evaluation--Congresses,Computer networks--Security measures--Congresses,Computer security--Congresses,Intrusions,Malware,Vulnerability assessment,DIMVA
Classification :
QA
,
76
.
9
,.
A25
,
D563
,
2005


4. Detection of intrusions and malware, and vulnerability assessment
Author: Ulrich Flegel, Danilo Bruschi (eds.)
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computers, Access control, Congresses,Computers, Access control, Evaluation, Congresses,Computer networks, Security measures, Congresses,Computer security, Congresses,Malware (Computer software), Congresses,Eindringerkennung, Kongress, Como <2009>,Kryptoanalyse, Kongress, Como <2009>,Malware, Kongress, Como <2009>,Softwareschwachstelle, Kongress, Como <2009>,Zugriffskontrolle, Kongress, Como <2009>,Como (2009), swd,Kongress., swd,Eindringerkennung., swd,Kryptoanalyse., swd,Malware., swd,Softwareschwachstelle., swd,Zugriffskontrolle., swd
Classification :
QA
،
76
.
9
،.
A25
,
D563
،
2009


5. Inside network security assessment
Author: / Michael Gregg, David Kim
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security- Evaluation- Methodology,Computer networks- Security measures
Classification :
QA76
.
9
.
A25
,
G7495
2006


6. Inside network security assessment: guarding your IT infrastructure
Author: Gregg, Michael C.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Evaluation - Methodology ، Computer security,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
G7495
2006


7. Keep your kids safe on the Internet /
Author: Simon Johnson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network resources-- Evaluation.,Computer networks-- Access control.,Computer networks-- Security measures.,Internet-- Access control.,Internet and children.,Internet-- Security measures.,Internet-- Access control.,Computer network resources-- Evaluation.,Computer networks-- Access control.,Computer networks-- Security measures.,Internet-- Access control.,Internet and children.,Internet-- Security measures.
Classification :
HQ784
.
I58
J66
2004


8. Network security assessmen
Author: / Steve Manzuik, Andr?� Gold, Chris Gatford
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Computer security--Evaluation--Methodology
Classification :
TK
,
5105
.
59
,.
M38
,
2007eb


9. Network security assessment
Author: / Chris McNab
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computers- Access control- Evaluation,Computer networks- Security measures- Evaluation
Classification :
QA76
.
9
.
A25
,
M4355
2008


10. Network security assessment
Author: / Steve Manzuik, Andr├ش Gold, Chris Gatford
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures.,Computer security , Evaluation , Methodology.,Electronic books. , local 1
Classification :
E-BOOK

11. Network security assessment
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ; Computer security ; Evaluation ; Methodology. ;

12. Network security assessment
Author: / Chris McNab
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computers- Access control- Evaluation,Computer networks- Security measures- Evaluation
Classification :
QA76
.
9
.
A25
,
M4355
2004


13. Network security assessment :
Author: Steve Manzuik, André Gold, Chris Gatford.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Evaluation-- Methodology.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
TK5105
.
59
.
M38
2007eb


14. Network security auditing
Author: / Chris Jackson
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Computer networks -- Security measures -- Evaluation.
Classification :
TK
5105
.
59
.
J325
2010


15. Network security auditing
Author: Jackson, Chris
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Security measures Evaluation ، Computer networks
Classification :
TK
5105
.
59
.
J325
2010


16. Network security evaluation using the NSA IEM
Author: Russ Rogers, technical editor and contributor; Bryan Cunningham ... ]et al.[
Library: Central Library and Documentation Center (Kerman)
Subject: Evaluation ، Computer networks - Security measures,Evaluation ، Computer security,Evaluation ، Information resources management
Classification :
TK
5105
.
59
.
N33
2005


17. Penetration testing and network defense
Author: / Andrew Whitaker, Daniel P. Newman
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security- Evaluation,ethical hacking
Classification :
TK5105
.
59
.
W53
2006


18. Security monitoring with Cisco security MAR
Author: / Gary Halleen, Greg Kellogg
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Computer security--Evaluation
Classification :
TK
,
5105
.
59
,.
H345
,
2007eb


19. Security monitoring with Cisco security MARS
Author: / Gary Halleen, Greg Kellogg
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Computer security , Evaluation,Electronic books. , lcsh
Classification :
E-BOOK
