61. Outsourcing information security [electronic resource]
Author: / C. Warren Axelrod
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Computer networks--Security measures--United States,Computers--Access control--United States,Data encryption (Computer science)
Classification :
EB
,
QA76
.
9
.
A25A88
2004

62. PKI :
Author: Andrew Nash [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Public key cryptography.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,Computers-- Access control.,Computers-- Access control.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Public key cryptography.,Public key cryptography.,Public-Key-Infrastruktur
Classification :
QA76
.
9
.
A25
P59
2001eb


63. PKI uncovered
Author: Andre Karamanian, Srinivas Tenneti, Francois Dessart
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Public key infrastructure (Computer security),Computers, Access control,Computer networks, Security measures
Classification :
QA
،
76
.
9
،.
A25
,
K346
،
2011


64. Penetration tester's open source toolki
Author: / Aaron W. Bayles, technical editor and contributor ... [et al.]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computers--Access control,Computer networks--Security measures
Classification :
QA
,
76
.
9
,.
A25
,
P435
,
2007eb


65. Penetration tester's open source toolkit /
Author: Jeremy Faircloth ; Michael Rogers, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Testing.,Computers-- Access control.,Penetration testing (Computer security),Computers-- Access control.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Networking.,COMPUTERS-- Security-- Online Safety & Privacy.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25


66. Penetration tester's open source toolkit
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Penetration testing (Computer security) ; Computers ; Access control. ; Computer networks ; Security measures. ;

67. Penetration tester's open source toolkit
Author: / Aaron W. Bayles, technical editor and contributor ... [et al.]
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computers- Access control,Computer networks- Security measures
Classification :
QA76
.
9
.
A25
,
P435
2007


68. Perimeter defense mechanisms
Author: EC-Council Press.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Examinations -- Study guides.,Computers -- Access control -- Examinations -- Study guides.,Electronic data processing personnel -- Certification.

69. Privacy solutions and security frameworks in information protection
Author: / Hamid R. Nemati, [editor]
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer networks -- Security measures,Data protection,Confidential communications,Computers -- Access control
Classification :
TK
5105
.
59
.
P7
2013


70. Proceedings of The IFIP TC 11 23rd International Information Security Conference
Author: / edited by Sushil Jajodia, Pierangela Samarati, Stelvio Cimato.
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer networks -- Security measures -- Congresses, Computers -- Access control -- Congresses, Computer security -- Congresses,Computer networks -- Access control -- Congresses,Data protection -- Congresses
Classification :
QA
76
.
9
.
A25I461
2008


71. Readings and Cases in Information Security
Author: / Michael E. Whitman, Herbert J. Mattord,Whitman, Michael E.
Library: Special Library of Law (Tehran)
Subject: Computer networks -- Moral and ethical aspects,Computers -- Access control,Computer networks -- Security measures,Computer security -- Case studies,Confidential communications -- Protection -- Case studies,Privacy, Right of,Information technology -- Law and legislation
Classification :
QA76
.
9
.
A25
W395
2011
,
DB6085


72. Security SAGE's guide to hardening the network infrastructure
Author: / Steven AndrouAoes, Brian Kenyon
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures , Handbook, manuals, etc,Computers , Access control , Handbook, manuals, etc,ETSPASTRAD,Ressources internet
Classification :
E-BOOK

73. Security in computing and communications :
Author: Sabu M. Thampi, Pradeep K. Atrey, Chun-I Fan, Gregorio Martinez Perez (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computers-- Access control, Congresses
Classification :
TK5105
.
59
.
S73
2013


74. Security information and event management )SIEM( implementation
Author: David R. Miller ... ]et al.[
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Computer networks,Access control ، Computers,، Application logging )Computer science(
Classification :
TK
5105
.
59
.
S4425
2011


75. Security information and event management (SIEM) implementation /
پدیدآورنده : David R. Miller ... [et al.]&
موضوع : Computer networks- Security measures,Computers- Access control,Application logging (Computer science)
۲ نسخه از این کتاب در ۲ کتابخانه موجود است.
76. Security information and event management (SIEM) implementation
Author: / David R. Miller ... [et al.]
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks, Security measures,Computers, Access control,Application logging (Computer science)
Classification :
TK5105
.
59
.
S4425
2011


77. Security mechanisms for computer networks
Author: Sead Muftic and P. Christofferson ...]et al[
Library: CENTRAL LIBRARY UNIVERCITY OF HORMOZGAN (Hormozgan)
Subject: ، Computers- Access control,، Computer networks- Security measures
Classification :
QA
76
.
9
.
M98S43
1989


78. Security mechanisms for computer networks
Author: / Sead Muftic, P. Christofferson ... [et all]
Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)
Subject: Computers - Access control,Computer networks - Security measures
Classification :
QA76
.
9
.
A25M84
1989


79. Snor
Author: / featuring Jay Beale and members of the Snort team, Andrew R. Baker, Joel Esler
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Snort (Computer file),Computer networks--Security measures,Computers--Access control,Computer security.
Classification :
TK
,
5105
.
59
,.
B42
,
2007


80. Snort
Author: / featuring Jay Beale and members of the Snort team, Andrew R. Baker, Joel Esler
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computers- Access control,Computer security,Snort (Computer file)
Classification :
TK5105
.
59
.
B42
2007

