141. Protected internet, intranet, & virtual private networks
Author: Alexander Moldovyan ... ]et al.
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Computer networks , Security measures,، Internet , Security measures,، Intranets )Computer networks( , Security measures,، Extranets )Computer networks( , Security measures,، Business enterprises , Computer networks , Security measures,، ETSPASTRAD,، Ressources internet
Classification :
TK
5105
.
59
.
P76
2003b


142. Rewired :
Author: edited by Ryan Ellis, Vivek Mohan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Government policy.,Internet governance.,Computer networks-- Security measures.,Computer security-- Government policy.,Internet governance.
Classification :
QA76
.
9
.
A25
R436
2019


143. Rewired cybersecurity governance
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Government policy. ; Internet governance. ; Computer networks ; Security measures. ;

144. Rewired cybersecurity governance
Author: edited by Ryan Ellis, Vivek Mohan.
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security,Internet governance.,Computer networks,Government policy.,Security measures.
Classification :
QA76
.
9
.
A25
2019


145. Risk management solutions for Sarbanes-Oxley section 404 IT compliance
Author: Quarterman, John S.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Computer networks Security measures ، Business enterprises,Security measures ، Internet,، Computer security,Access control ، Computers
Classification :
HD
30
.
38
.
Q37


146. Risks and Security of Internet and Systems :
Author: edited by Nora Cuppens, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquin Garcia-Alfaro.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Internet-- Security measures, Congresses.,Artificial intelligence.,Artificial intelligence.,Coding theory & cryptology.,Computer science.,Computers-- Expert Systems.,Computers-- Information Technology.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Computers, Special purpose.,Computers.,Data encryption (Computer science),Expert systems-- knowledge-based systems.,Information retrieval.,Information technology: general issues.,Software engineering.,Software Engineering.
Classification :
QA76
.
758
I58
2017


147. Risks and Security of Internet and Systems
Author: \ Javier Lopez, Indrajit Ray, Bruno Crispo (eds.).
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Internet -- Security measures -- Congresses.,Computer networks -- Security measures -- Congresses.,اینترنت -- تدابیر ایمنی -- کنگره ها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
TK
5105
.
875
.
I57R5
2015
E-Book
,


148. Risks and security of internet and systems :
Author: Akka Zemmari, Mohamed Mosbah, Nora Cuppens-Boulahia, Frédéric Cuppens (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Internet-- Security measures, Congresses.,Computer networks-- Security measures.,Computer security.,Internet-- Security measures.
Classification :
TK5105
.
59


149. Scalable and secure Internet services and architecture
Author: / Cheng-Zhong Xu
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Internet.,Computer networks--Scalability,Computer networks--Security measures
Classification :
TK5105
.
59
.
X8
2005


150. Scrappy information security /
Author: by Michael Seese.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Internet-- Security measures.,Computer networks-- Security measures.,Computer security.,Internet-- Security measures.
Classification :
QA76
.
9
.
A25
S453
2009


151. Secure Internet practices :
Author: Patrick McBride [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures.,Computer networks-- Security measures.,Internet-- Security measures.,Gestion-- Informatique-- Sécurité-- Mesures.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Business-- Data processing-- Security measures.,Computer networks-- Security measures.,Internet-- Security measures.
Classification :
TK5105
.
59
.
S435
2002


152. Secure Internet practices : best practices for securing systems in the Internet and e-Business age
Author:
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: ، Computer networks--Security measures,، Internet--Security measures,، Business--Data processing--Security measures
Classification :
TK
5105
.
59
.
S43
2002


153. Secure Internet practices : best practices for securing systems in the Internet and e-Business age
Author: Patrick McBride...]et al.[
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,Security measures ، Internet,Data processing -- Security measures ، Business
Classification :
TK
5105
.
59
.
S4


154. Secure Internet practices : best practices for securing systems in the Internet and e-Business age
Author: Patricia McBride ... ]et al.[
Library: Central Library and Documentation Center (Kerman)
Subject: ، Computer networks - Security measures,، Internet - Security measures,Security measures ، Business - Data processing
Classification :
TK
5105
.
59
.
S435
2002


155. Securing the information infrastructur
Author: / Joseph M. Kizza, Florence M. Kizza
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Cyberterrorism.,Internet--Security measures,Computer networks--Security measures,Information superhighway--Security measures
Classification :
HV
,
6773
,.
K59
,
2008eb


156. Securing the information infrastructure /
Author: Joseph M. Kizza, Florence M. Kizza.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Cyberterrorism.,Information superhighway-- Security measures.,Internet-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Computersicherheit,Cyberterrorism.,Datensicherung,Information superhighway-- Security measures.,Internet-- Security measures.,Internet.
Classification :
HV6773
.
K59
2008eb


157. Securing the information infrastructure
Author: Kizza, Joseph Migga.
Library: Library of Niroo Research Institue (Tehran)
Subject: ، Cyberterrorism,Security measures ، Internet,Security measures ، Computer networks,Security measures ، Information superhighway
Classification :
HV
6773
.
K59
2008


158. Securing the information infrastructure
Author: Joseph M. Kizza, Florence M. Kizza.
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Cyberterrorism,Internet -- Security measures,Computer networks -- Security measures,Information superhighway -- Security
Classification :
HV
،
6773
،.
K59
،
2008


159. Securing the information infrastructure
Author: / Joseph M. Kizza, Florence M. Kizza.
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Cyberterrorism.,Internet--Security measures.,Computer networks--Security measures,Information superhighway--Security measures.
Classification :
HV
6773
.
K59
2008


160. Securite Internet
Author: / Solange Ghernaouti-Helie
Library: Faculty of Law and Political Sciences (Tehran)
Subject: Local area networks (Computer networks) -- Security measures,Internet -- Security measures,Data protection,Protection de l`information (informatique),Coupe-feu (securite informatique),Systemes informatiques -- Mesures de surete,Virus informatiques,Reseaux locaux (informatique) -- Mesures de surete,Internet -- Mesures de surete
Classification :
TK5105
.
87
.
G5S4

