1. Cyber warfare
Author: Jason Andress, Steve Winterfeld ; technical editor Lillian Ablon ; foreword by Stephen Northcutt
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Information warfare
Classification :
U163
.
A64
2014
2. Cyber warfare
Author: Jason Andress, Steve Winterfeld ; technical editor Lillian Ablon ; foreword by Stephen Northcutt
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Information warfare
Classification :
U163
.
A64
2014
3. Cyber warfare :
Author: Jason Andress, Steve Winterfeld ; Russ Rogers, technical editor ; foreword by Stephen Northcutt.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Handbooks, manuals, etc.,Information warfare, Handbooks, manuals, etc.
4. IT ethics handbook
Author: / Stephen Northcutt
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computers--Access control
Classification :
QA
,
76
.
9
,.
A25
,
I59
,
2004
5. Inside network perimeter security
Author: / Stephen Northcutt ... [et al.]
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Electronic books. , local
Classification :
E-BOOK
6. Inside network perimeter security
Author: / Stephen Northcutt ... [et al.]
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures
Classification :
TK5105
.
59
.
I53
2005
7. Inside network perimeter security: the definitive guide to firewalls, VPNs, routers, and intrusion detection systems
Author: primary authors, Stephen Northcutt...]et al.[; contributing authors, Mark Edmead...]et al.[
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Security measures ، Computer networks
Classification :
TK
5105
.
59
.
I53
2003
8. Intrusion signatures and analysis
Author: /stephen Northcutt ... [et. al].
Library: National Library and Archives of Islamic Republic of Iran (Tehran)
Subject:
9. Network intrusion detection
Author: Northcutt, Stephen
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Computer networks,Security measures ، Internet,، Computer security
Classification :
TK
5105
.
59
.
N475
2003
10. Network intrusion detection
Author: / Stephen Northcutt, Judy Novak
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Security measures,Security measures
Classification :
E-BOOK
11. Network intrusion detection
Author: / Stephen Northcutt, Judy Novak
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Internet- Security measures,Computer security
Classification :
TK5105
.
59
.
N475
2003
12. Network intrusion detection
Author: Northcutt, Stephen
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Security measures ، Computer networks,Security measures ، Internet,، Computer security
Classification :
TK
5105
.
59
.
N475
2003
13. Network intrusion detection
Author: / Stephen Northcutt,Northcutt
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Electric networks,Electric networks analysis
Classification :
TK
3226
.
N6
1999
14. Network intrusion detection
Author: / Stephen Northcutt
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Security measures,Security measures
Classification :
E-BOOK
15. Network intrusion detection: an analyst's handbook
Author: Northcutt, Stephen
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer networks,، Computer security,، Computer network architectures
Classification :
TK
5105
.
59
.
N67
1999
16. Network intrusion detection: an analyst's handbook
Author: Northcutt, Stephen
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,Security measures ، Internet,، Computer security
Classification :
TK
5105
.
59
.
N67