• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۷ پاسخ غیر تکراری از ۷ پاسخ تکراری در مدت زمان ۲,۹۴ ثانیه یافت شد.

1. Big data, emerging technologies and intelligence

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Miah Hammond-Errey.,Hammond-Errey, Miah,

Library: Library of College of Science University of Tehran (Tehran)

Subject: Intelligence service,National security,Cyber intelligence (Computer security),Electronic surveillance,Big data.,Australia.,Australia.,Australia.,Australia.

Classification :

2. Emerging Trends in ICT Security.

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Cyberterrorism-- Prevention.,Electronic surveillance.,Information technology-- Security measures.

Classification :
QA76
.
9
.
A25

3. Introduction to intelligent surveillance :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Wei Qi Yan.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Electronic surveillance.,Computer security.,Electronic surveillance.

Classification :
TK7882
.
E2

4. Introduction to intelligent surveillance

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Yan, Wei Qi

Library: Central Library and Documentation Center (Kerman)

Subject: ، Electronic surveillance,، Computer security,، Computer science,، Computer networks,، Pattern perception

Classification :
TK
7882
.
E2
Y32
2016

5. Secrets of computer espionage

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Joel McNamara

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer security,Computer networks- Security measures,Electronic surveillance

Classification :
QA76
.
9
.
A25
,
M436
2003

6. Security and privacy.

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Joseph Savirimuthu.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security-- Law and legislation.,Data protection-- Law and legislation.,Electronic surveillance-- Law and legislation.,Privacy, Right of.,Computer security-- Law and legislation.,Data protection-- Law and legislation.,Electronic surveillance-- Law and legislation.,Privacy, Right of.

Classification :
K3264
.
C65
S43
2016

7. Wireless reconnaissance in penetration testing

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Matthew Neely, Alex Hamerstone, Chris Sanyk

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Electronic surveillance,Penetration testing (Computer security),Wireless communication systems-- Security measures

Classification :
TK7882
.
E2
N44
2013
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival