• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۹۸ پاسخ غیر تکراری از ۹۹ پاسخ تکراری در مدت زمان ۱,۹۸ ثانیه یافت شد.

61. Outsourcing information security [electronic resource]

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / C. Warren Axelrod

Library: Imam Reza International University library and information center (Khorasan Razavi)

Subject: Computer networks--Security measures--United States,Computers--Access control--United States,Data encryption (Computer science)

Classification :
EB
,
QA76
.
9
.
A25A88
2004

62. PKI :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Andrew Nash [and others].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Public key cryptography.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,Computers-- Access control.,Computers-- Access control.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Public key cryptography.,Public key cryptography.,Public-Key-Infrastruktur

Classification :
QA76
.
9
.
A25
P59
2001eb

63. PKI uncovered

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Andre Karamanian, Srinivas Tenneti, Francois Dessart

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: Public key infrastructure (Computer security),Computers, Access control,Computer networks, Security measures

Classification :
QA
،
76
.
9
،.
A25
,
K346
،
2011

64. Penetration tester's open source toolki

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Aaron W. Bayles, technical editor and contributor ... [et al.]

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computers--Access control,Computer networks--Security measures

Classification :
QA
,
76
.
9
,.
A25
,
P435
,
2007eb

65. Penetration tester's open source toolkit /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jeremy Faircloth ; Michael Rogers, technical editor.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Testing.,Computers-- Access control.,Penetration testing (Computer security),Computers-- Access control.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Networking.,COMPUTERS-- Security-- Online Safety & Privacy.,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25

66. Penetration tester's open source toolkit

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Penetration testing (Computer security) ; Computers ; Access control. ; Computer networks ; Security measures. ;

Classification :

67. Penetration tester's open source toolkit

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Aaron W. Bayles, technical editor and contributor ... [et al.]

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computers- Access control,Computer networks- Security measures

Classification :
QA76
.
9
.
A25
,
P435
2007

68. Perimeter defense mechanisms

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: EC-Council Press.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks -- Security measures -- Examinations -- Study guides.,Computers -- Access control -- Examinations -- Study guides.,Electronic data processing personnel -- Certification.

Classification :

69. Privacy solutions and security frameworks in information protection

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Hamid R. Nemati, [editor]

Library: Campus International Library of Kish University of Tehran (Hormozgan)

Subject: Computer networks -- Security measures,Data protection,Confidential communications,Computers -- Access control

Classification :
TK
5105
.
59
.
P7
2013

70. Proceedings of The IFIP TC 11 23rd International Information Security Conference

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / edited by Sushil Jajodia, Pierangela Samarati, Stelvio Cimato.

Library: Library of College of Science University of Tehran (Tehran)

Subject: Computer networks -- Security measures -- Congresses, Computers -- Access control -- Congresses, Computer security -- Congresses,Computer networks -- Access control -- Congresses,Data protection -- Congresses

Classification :
QA
76
.
9
.
A25I461
2008

71. Readings and Cases in Information Security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Michael E. Whitman, Herbert J. Mattord,Whitman, Michael E.

Library: Special Library of Law (Tehran)

Subject: Computer networks -- Moral and ethical aspects,Computers -- Access control,Computer networks -- Security measures,Computer security -- Case studies,Confidential communications -- Protection -- Case studies,Privacy, Right of,Information technology -- Law and legislation

Classification :
QA76
.
9
.
A25
W395
2011
,
DB6085

72. Security SAGE's guide to hardening the network infrastructure

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Steven AndrouAoes, Brian Kenyon

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer networks , Security measures , Handbook, manuals, etc,Computers , Access control , Handbook, manuals, etc,ETSPASTRAD,Ressources internet

Classification :
E-BOOK

73. Security in computing and communications :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Sabu M. Thampi, Pradeep K. Atrey, Chun-I Fan, Gregorio Martinez Perez (eds.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses,Computers-- Access control, Congresses

Classification :
TK5105
.
59
.
S73
2013

74. Security information and event management )SIEM( implementation

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: David R. Miller ... ]et al.[

Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)

Subject: Security measures ، Computer networks,Access control ، Computers,، Application logging )Computer science(

Classification :
TK
5105
.
59
.
S4425
2011

75. Security information and event management (SIEM) implementation /

پدیدآورنده : David R. Miller ... [et al.]&

موضوع : Computer networks- Security measures,Computers- Access control,Application logging (Computer science)

۲ نسخه از این کتاب در ۲ کتابخانه موجود است.

76. Security information and event management (SIEM) implementation

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / David R. Miller ... [et al.]

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer networks, Security measures,Computers, Access control,Application logging (Computer science)

Classification :
‭
TK5105
.
59
‬ ‭.
S4425
2011
‬

77. Security mechanisms for computer networks

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Sead Muftic and P. Christofferson ...]et al[

Library: CENTRAL LIBRARY UNIVERCITY OF HORMOZGAN (Hormozgan)

Subject: ، Computers- Access control,، Computer networks- Security measures

Classification :
QA
76
.
9
.
M98S43
1989

78. Security mechanisms for computer networks

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Sead Muftic, P. Christofferson ... [et all]

Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)

Subject: Computers - Access control,Computer networks - Security measures

Classification :
QA76
.
9
.
A25M84
1989

79. Snor

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / featuring Jay Beale and members of the Snort team, Andrew R. Baker, Joel Esler

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Snort (Computer file),Computer networks--Security measures,Computers--Access control,Computer security.

Classification :
TK
,
5105
.
59
,.
B42
,
2007

80. Snort

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / featuring Jay Beale and members of the Snort team, Andrew R. Baker, Joel Esler

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Computers- Access control,Computer security,Snort (Computer file)

Classification :
TK5105
.
59
.
B42
2007
  • »
  • 5
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival