321. Security technology, disaster recovery and business continuit
Author: / Tai-hoon Kim ... [et al.], (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Computer networks--Security measures--Congresses,Computer networks--Access control--Congresses,Data protection--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
S374
,
2010


322. Security technology, disaster recovery and business continuity
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ; Computer networks ; Security measures ; Congresses. ; Computer networks ; Access control ; Congresses. ; Data protection ; Congresses. ;

323. Security threat mitigation and response
Author: / Dale Tesch and Greg Abelar
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer networks- Access control,Computer security- Evaluation,Electronic countermeasures,Firewalls (Computer security),Internet- Security measures
Classification :
TK5105
.
59
.
T47
2007


324. Snor
Author: / featuring Jay Beale and members of the Snort team, Andrew R. Baker, Joel Esler
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Snort (Computer file),Computer networks--Security measures,Computers--Access control,Computer security.
Classification :
TK
,
5105
.
59
,.
B42
,
2007


325. Snort
Author: / featuring Jay Beale and members of the Snort team, Andrew R. Baker, Joel Esler
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computers- Access control,Computer security,Snort (Computer file)
Classification :
TK5105
.
59
.
B42
2007


326. Snort
Author: / featuring Jay Beale and members of the Snort team, Andrew R. Baker, Joel Esler
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks- Security measures,Computers- Access control,Computer security,Snort (Computer file)
Classification :
E-BOOK

327. Snort 2.1 Intrusion Detection
Author: Featuring the Snort Development Team Andrew R. Baker, Brian Caswell, Mike Poor
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Computer networks- Security measures,Computers- Access control,Computer security,Snort (Computer file)
Classification :
TK
,
5105
.
59
,.
B42S7
,
2004


328. Snort cookbook
Author: / Angela Orebaugh, Simon Biles and Jacob Babbin
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computers- Access control
Classification :
TK5105
.
59
.
O785
2005


329. Snort for Dummies
Author: \ by Charlie Scott, Paul Wolfe, and Bert Hayes
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks--Security measures,Computer security,Computers--Access control,شبکههای کامپیوتری -- تدابیر ایمنی,امنیت رایانهای,کامپیوترها -- کنترل دستیابی
Classification :
E-Book
,

330. Snort for dummies
Author: / by Charlie Scott, Paul Wolfe, and Bert Hayes
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computers- Access control
Classification :
TK5105
.
59
.
S388
2004


331. Snort for dummies
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ; Computer security. ; Computers ; Access control. ; Snort (Software) ; fast ; (OCoLC)fst01792875 ; Intrusion detection systems (Computer security) ; fast ; (OCoLC)fst01762593 ;

332. Solving Cyber Risk :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,BUSINESS & ECONOMICS-- Insurance-- Risk Assessment & Management.,Computer security.,Data protection.
Classification :
QA76
.
9
.
A25
C577
2018


333. Spring Security 3.x cookbook
Author: Anjana Mankale
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Application software-- Access control,Application software-- Security measures,Computer networks-- Security measures,Java (Computer program language)
Classification :
QA76
.
76
.
A65
M36
2013


334. Sudo mastery :
Author: by Michael W. Lucas.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Access control.,Computer networks -- Security measures.,Data encryption (Computer science)
Classification :
TK5105
.
59
B965
2013


335. Tableaux de bord de la sécurité réseau /
Author: Cédric Llorens, Laurent Levier, Denis Valois ; avec la contribution de Olivier Salvatori.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computers-- Access control.,Réseaux d'ordinateurs-- Sécurité-- Mesures, Cas, Études de.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Computer networks-- Security measures.,Computers-- Access control.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
L56
2006eb


336. The Browser Hacker's Handbook /
Author: Wade Alcorn, Christian Frichot, Michele Orrù.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Browsers (Computer programs)-- Security measures.,Computer networks-- Access control.,Computer networks-- Security measures.
Classification :
QA76
.
9
.
A25
.
A384
2014
.
A393
2014


337. The Stephen Cobb complete book of PC and LAN security
Author: / by Stephen Cobb,Cobb
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Local area networks (Computer networks) -- Security measures,Computers -- Access control
Classification :
TK
5105
.
7
.
C62
1992


338. The Stephen Cobb complete book of PC and LAN security
Author: / Stephen Cobb
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Local area networks (Computer networks),Computer - Access control,-- Security measures
Classification :
005
.
8
C653S


339. The antivirus hacker's handbook /
Author: Joxean Koret, Elias Bachaalany
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control,Computer networks-- Security measures, Handbooks, manuals, etc,Computer security, Handbooks, manuals, etc
Classification :
QA76
.
9
.
A25


340. The basics of digital privacy :
Author: Denny Cherry ; technical editor, Thomas LaRock
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control
Classification :
QA76
.
9
.
A25
C438
2014

