321. Hacking exposed VoIP: voice over IP security secrets & solutions
Author: Endler, David
Library: (Semnan)
Subject: Security measures ، Internet telephony,Security measures ، Computer networks
Classification :
TK
5105
.
8865
.
E5H3


322. Hacking exposed VoIP : voice over IP security secrets & solutions
Author: David Endler, Mark Collier
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Security measures ، Internet telephony,، Computer networks -- Security measures
Classification :
TK
5105
.
8865
.
E53H2


323. Handbook of research on practices and outcomes in e-learning :
Author: [edited by] Harrison Hao Yang, Steve Chi-Yin Yuen.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Blogs.,Information technology.,Internet in education.,Online social networks.,Virtual computer systems.,Wikis (Computer science),World Wide Web.,Aufsatzsammlung,Blogs.,COMPUTERS-- Educational Software.,E-Learning,Information technology.,Internet in education.,Online social networks.,Virtual computer systems.,Wikis (Computer science),World Wide Web.
Classification :
LB1044
.
87
.
H345
2010eb


324. Handbook of research on social interaction technologies and collaboration software
Author: / Tatyana Dumova, Richard Fiordo
Library: Library of Entrepreneurship (Tehran)
Subject: Information technology -- Social aspects,Online social networks,Internet -- Social aspects,Groupware (Computer software) -- Social aspects
Classification :
HM
851
.
H3486
2010


325. Handbook of research on social interaction technologies and collaboration software
Author: / [edited by] Tatyana Dumova, Richard Fiordo
Library: Library and knowledge management of the management schools of Tehran University (Tehran)
Subject: Information technology, Social aspects,Online social networks,Internet, Social aspects,Groupware (Computer software), Social aspects
Classification :
303
.
4833
S678
2010


326. Here comes everybody
Author: / Clay Shirky
Library: Library of Entrepreneurship (Tehran)
Subject: Information technology -- Social aspects,Computer networks -- Social aspects,Internet -- Social aspects,Online social networks
Classification :
HM
851
.
S54
2008


327. How to be an Internet stock investor
Author: Newton, David
Library: (Semnan)
Subject: ، Electronic trading of securities,، Investments- Computer networks,، Internet )Computer network(
Classification :
HG
4515
.
95
.
N4H6


328. How to be an Internet stock investoressential guides to today's most popular investment strategies
Author: Newton, David
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Electronic trading of securities,، Investments-- Computer networks,، Internet
Classification :
HG
4515
.
95
.
N497
2000


329. How to be an internet stock investor
Author: / David B. Newton
Library: Tehran University, technical faculty libraries 1 (Tehran)
Subject: Electronic trading of securities,Investments - - Computer Networks,Internet (Computer Network)
Classification :
HG
4515
.
95
.
N497
2000


330. How to cheat at Voip security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Internet telephony ; Security measures. ; Computer networks ; Security measures. ;

331. How to cheat at Voip security
Author: / Thomas Porter, Michael Gough
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Internet telephony , Security measures
Classification :
E-BOOK

332. How to cheat at Voip security
Author: / Thomas Porter, Michael Gough
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Internet telephony--Security measures,Computer networks--Security measures
Classification :
TK
,
5105
.
8865
,.
P67
,
2007


333. How to cheat at Voip security
Author: Thomas Porter, Michael Gough
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Security measures ، Internet telephony,، Computer networks -- Security measures
Classification :
TK
5105
.
8865
.
P67H6


334. How to cheat at Voip security /
Author: Thomas Porter, Michael Gough
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Internet telephony-- Security measures
Classification :
TK5105
.
8865
.
P67
2007


335. How to cheat at securing Linux /
Author: Mohan Krishnamurthy [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Linux.,Linux.,Linux.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
TK5105
.
59
.
H683
2008eb


336. How to make money online with eBay, Yahoo!, and Google
Author: / Peter Kent, Jill Finlayson
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Electronic commerce,Internet marketing,Business enterprises- Computer networks
Classification :
HF5548
.
32
.
K4665
2006


337. Html 3 manual of style
Author: / Larry Aronson
Library: Central library of medical university of Isfahan (Esfahan)
Subject: Computer networks,Internet (computer networks)
Classification :
TK5105
.
5
.
A7
1995


338. ICCCE 2018 :
Author: Amit Kumar, Stefan Mozar, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks, Congresses.,Cooperating objects (Computer systems), Congresses.,Internet of things, Congresses.,Artificial Intelligence (incl. Robotics).,Communications Engineering, Networks.,Computer Imaging, Vision, Pattern Recognition and Graphics.,Engineering.,Microwaves, RF and Optical Engineering.,Signal, Image and Speech Processing.,Wireless and Mobile Communication.,Artificial intelligence.,Communications engineering / telecommunications.,Computer networks.,Computer vision.,COMPUTERS / Computer Literacy.,COMPUTERS / Computer Science.,COMPUTERS / Data Processing.,COMPUTERS / Hardware / General.,COMPUTERS / Information Technology.,COMPUTERS / Machine Theory.,COMPUTERS / Reference.,Cooperating objects (Computer systems),Imaging systems & technology.,Internet of things.,Microwave technology.,WAP (wireless) technology.
Classification :
TK5105
.
5


339. ICT futures :
Author: edited by Paul Warren, John Davies and David Brown
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Forecasting,Electronic commerce-- Forecasting,Internet-- Social aspects-- Forecasting,Telecommunication-- Technological innovations-- Forecasting,Web sites-- Forecasting
Classification :
TK5102
.
5
.
I295
2008


340. ICT futures
Author: / edited by Paul Warren, John Davies and David Brown
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Telecommunication --Technology,Computer networks -- Security measures -- Forecasting,Electronic commerce -- Forecasting,Internet -- Social aspects -- Forecasting,Web sites--Forecasting.
Classification :
TK
5102
.
5
.
I295
2008

