• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۲۲ پاسخ غیر تکراری از ۲۲ پاسخ تکراری در مدت زمان ۰,۹۸ ثانیه یافت شد.

1. Adversarial machine learning

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Machine learning. ; Computer security. ; COMPUTERS / Security / General. ; bisacsh ;

Classification :

2. An Introduction to Information Security and ISO 27001 : A Pocket Guide

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Watkins, Steve G.

Library: Library of Razi Metallurgical Research Center (Tehran)

Subject: ، Computer security,، Network security,، COMPUTERS / Security / General

Classification :
HD
30
.
38
.
W3
2008

3. Computer forensics and digital investigation with Encase Forensic v7 /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Suzanne Widup.

Library: Central Library and Documents Center of Tehran University (Tehran)

Subject: Computer crimes-- Investigation.,Computer crimes-- Investigation-- Computer programs.,COMPUTERS / Security / General.

Classification :
HV8079
.
C65
W52
2014

4. Cyber-security and information warfare /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Nicholas J. Daras, editor.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Information warfare.,Computer security.,COMPUTERS / Security / General,Information warfare.

Classification :
QA76
.
9
.
A25

5. Cybersecurity in Germany /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Martin Schallbruch, Isabel Skierka.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security-- Germany.,Computer security.,Computer security.,COMPUTERS-- Security-- General.,Ethical & social aspects of IT.,Public administration.,Germany., 7

Classification :
QA76
.
9
.
A25

6. Data mining and machine learning in cybersecurity

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Dua, Sumeet.

Library: Central Library and Documents Center of Al-Zahra University (Tehran)

Subject: ، Data mining,، Machine learning,، Computer security,، Computers- Database Management - Data Mining,، Computers- Software Development & Engineering-Systems Analysis & Design,، Computers -Security - General

Classification :
QA
76
.
9
.
D343
D825
2011

7. Der IT Security Manager :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Heinrich Kersten, Gerhard Klett ; herausgegeben von Heinrich Kersten und Klaus-Dieter Wolfenstetter.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks -- Security measures.,COMPUTERS / Security / General.,Data protection.

Classification :
QA76
.
9
.
A25
H456
9999

8. Fault tolerant architectures for cryptography and hardware security /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Sikhar Patranabis, Debdeep Mukhopadhyay, editors.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Fault-tolerant computing.,Computer security.,COMPUTERS-- Security-- General.,Fault-tolerant computing.

Classification :
QA76
.
9
.
F38

9. Firewalls don't stop dragons :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Carey Parker.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Computer security.,COMPUTERS-- Security-- General.

Classification :
QA76
.
9
.
A25
P357
2018eb

10. Grundlagen und Anwendung von Information Security Awareness :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Kristin Weber, Andreas E. Schütz und Tobias Fertig.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Data protection.,Computer security.,COMPUTERS-- Security-- General.,Data protection.

Classification :
QA76
.
9
.
A25

11. Handbook of Image-based Security Techniques /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Shivendra Shivani, Suneeta Agarwal, Jasjit S. Suri.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Cryptography.,Image processing.,Computer security.,COMPUTERS-- Security-- General.,Cryptography.,Image processing.

Classification :
QA76
.
9
.
A25

12. Hands-on machine learning for cybersecurity :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Soma Halder, Sinan Ozdemir.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Machine learning.,Computer security.,COMPUTERS / Security / General,Machine learning.

Classification :
QA76
.
9
.
A25

13. Information Security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Ali Ismail Awad and Michael Fairhurst.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Data protection.,Security systems.,Computer security.,COMPUTERS-- Security-- General.,Data protection.,security of data.,Security systems.

Classification :
QA76
.
9
.
A25
I56
2018eb

14. Information security across federal agencies :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Shane Palmer, editor.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Cyber intelligence (Computer security)-- United States.,COMPUTERS-- Security-- General.,Cyber intelligence (Computer security),United States., 7

Classification :
KF27
.
I546
2016

15. OpenVPN Cookbook - Second Edition.

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Extranets (Computer networks),COMPUTERS-- Networking-- General.,COMPUTERS-- Security-- General.,COMPUTERS-- System Administration-- General.,Extranets (Computer networks)

Classification :
T55
.
4-60
.
8

16. Penetration testing with Raspberry Pi :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Kali Linux.,Kali Linux.,Penetration testing (Computer security),Raspberry Pi (Computer),COMPUTERS-- Hardware-- General.,COMPUTERS-- Microprocessors.,COMPUTERS-- Security-- Networking.,Penetration testing (Computer security),Raspberry Pi (Computer)

Classification :
QA76
.
9
.
A25
M37
2016eb

17. Proceedings of International Symposium on Sensor Networks, Systems and Security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Nageswara S.V. Rao, Richard R. Brooks, Chase Q. Wu, editors.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Sensor networks, Congresses.,Communications engineering / telecommunications.,Computer security.,COMPUTERS / General.,Imaging systems & technology.,Network hardware.,Sensor networks.

Classification :
TK7872
.
D48

18. Professional Red teaming :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jacob G. Oakley.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Computer security.,COMPUTERS-- Security-- General.

Classification :
QA76
.
9
.
A25

19. Security for service oriented architectures

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Williams, Walter,Walter Williams

Library: Library and Documentation Center of Kurdistan University (Kurdistan)

Subject: ، Service-oriented architecture )Computer science(,Security measures ، Computer networks,، Computer security,، COMPUTERS / Software Development & Engineering / General,، COMPUTERS / Security / General,، COMPUTERS / Internet / General

Classification :
TK
5105
.
5828
.
W5

20. Security in the digital world :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Graham Day.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Data protection.,Computer security.,COMPUTERS-- Security-- General.,Data protection.

Classification :
QA76
.
9
.
A25
  • »
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival