1. Network security bible
Author: Eric Cole, Ronald Krutz, and James W. Conley
Library: Central Library and Document Center of Shahid Madani University of Azarbayjan (East Azarbaijan)
Subject: Computer security,Computer networks, Security measures
Classification :
QA
,
76
.
9
,..
A25
C598
,
2005


2. Network security bible /
Author: Eric Cole, Ronald Krutz, James W. Conley.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.
Classification :
QA76
.
9
.
A25
C5985
2009


3. Network security bible [electronic resource]
Author: / Eric Cole, Ronald Krutz, and James W. Conley
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Computer security,Computer networks--Security measures
Classification :
EB
,
QA76
.
9
.
A25C5985
2005
