1. A technical guide to IPSec virtual private networks /
Author: James S. Tiller.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Extranets (Computer networks)-- Security measures.,IPSec (Computer network protocol),COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,IPSec (Computer network protocol)
Classification :
TK5105
.
875
.
E87
T55
2001eb


2. A technical guide to IPSec virtual private networks
Author: Tiller, James S.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Extranets )Computer networks(,، IPSec )Computer network protocol(
Classification :
TK
5105
.
875
.
E87
T55
2001


3. Adaptive Security Management Architecture
Author: / Tiller, James S.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: COMPUTER SCIENCE, INFORMATION TECHNOLOGY
Classification :
E-BOOK

4. Adaptive security management architecture
Author: /james s. tiller
Library: National Library and Archives of Islamic Republic of Iran (Tehran)
Subject:

5. Adaptive security management architecture
Author: / James S. Tiller
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures
Classification :
E-BOOK

6. CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits
Author: / Tiller, James S.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: COMPUTER SCIENCE, INFORMATION TECHNOLOGY
Classification :
E-BOOK

7. Information security management handbook.
Author: edited by Rich O'Hanley, James S. Tiller.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management.,Data protection.

8. Information security management handbook vol.7
Author: edited by Richard O Hanley, James S. Tiller
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: Handbooks, manuals, etc ، Computer security - Management,Handbooks, manuals, etc ، Data protection
Classification :
QA76
.
9
.
A25

