• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۲ پاسخ غیر تکراری از ۲ پاسخ تکراری در مدت زمان ۰,۶۴ ثانیه یافت شد.

1. Network attacks and exploitation :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Matthew Monte

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business enterprises-- Computer networks-- Security measures.,Computer crimes-- Prevention.,Computer security.,Corporations-- Security measures.

Classification :
HF5548
.
37
M665
2015eb

2. Network attacks & exploitation :a framework

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Monte, Matthew

Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)

Subject: ، Computer security,Prevention ، Computer crimes,Prevention ، Computer crimes,، Computer security

Classification :
TK
5105
.
59
.
M64
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival