161. Detection of intrusions and malware, and vulnerability assessment : Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005 : proceedings
پدیدآورنده : Klaus Julisch, Christopher Kruegel )eds.(
کتابخانه: Library of Institute for Research in Fundamental Sciences (Tehran)
موضوع : Congresses ، Computers -- Access control,Evaluation -- Congresses ، Computers -- Access control,Congresses ، Computer networks -- Security measures,Congresses ، Computer security
رده :
QA
76
.
L28
Vol
.
3548
162. Distributed medium access control in wireless networks
پدیدآورنده : Ping Wang, Weihua Zhuang
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Wireless communication systems-- Security measures
رده :
TK5103
.
2
.
W36
2013
163. Electronic access control
پدیدآورنده : Honey, Gerard
کتابخانه: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
موضوع : ، Electronic security systems,، Buildings- Security measures,، Computer networks- Security measures
رده :
TH
9737
.
H65
164. Essential skills for hackers /
پدیدآورنده : Kevin Cardwell ; contributing editor, Henry Dalziel.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Access control.,Computer networks-- Security measures.,Computer security.,Hacking.
رده :
QA76
.
9
.
A25
C37
2016
165. Ethical hacking and countermeasures /
پدیدآورنده : EC-Council Council.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Secuity measures-- Examinations, Study guides.,Computers-- Access control-- Examinations, Study guides.,Electronic data processing personnel-- Certification.,Penetration testing (Computer security),Telecommunications engineers-- Certification.
رده :
QA76
.
9
.
A25
E865
2010
166. Firewalls 24seven
پدیدآورنده : / Matthew Strebe, Charles Perkins
کتابخانه: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
موضوع : Computer networks , Security measures,Computers , Access control,Firewalls (Computer security)
رده :
E-BOOK
167. Formal correctness of security protocols
پدیدآورنده : Bella, Giampaolo
کتابخانه: Central Library of Sharif University of Technology (Tehran)
موضوع : ، Computer security,، Computers-- Access control,، Cryptography,، Computer networks-- Security measures
رده :
QA
76
.
9
.
A25
.
B44
2007
168. Formal correctness of security protocols /Giampaolo Bella.
پدیدآورنده : مولف
کتابخانه: Campus International Library of Kish University of Tehran (Hormozgan)
موضوع : Computer networks -- Security measures,Computer networks -- Access control,Computer network protocols
169. Formal models and techniques for analyzing security protocols
پدیدآورنده : edited by Veronique Cortier and Steve Kremer
کتابخانه: Central Library of Hamedan University of Technology (Hamedan)
موضوع : ، Computer security,Access control ، Computers,Security measures ، Computer networks,Access control ، Electronic information resources
رده :
QA
76
.
9
.
A25
F6563
170. Formal models and techniques for analyzing security protocols /
پدیدآورنده : edited by Véronique Cortier and Steve Kremer
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures,Computer security,Computers-- Access control,Electronic information resources-- Access control
رده :
QA76
.
9
.
A25
F654
2011
171. From database to cyber security :
پدیدآورنده : Pierangela Samarati, Indrajit Ray, Indrakshi Ray (eds.).
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer security.,Databases.,Computer security.,Databases.
رده :
QA76
.
9
.
A25
172. Future of trust in computing
پدیدآورنده : David Gawrock... [et al.] (eds.)
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses,Data protection, Congresses
رده :
QA76
.
9
.
A25
F888
2008eb
173. Global security, safety, and sustainability
پدیدآورنده : Hamid Jahankhani, Ali G. Hessami, Feng Hsu (eds.)
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses,Data protection, Congresses,Internet-- Security measures, Congresses
رده :
QA76
.
9
.
A25
I344
2009eb
174. Guide to computer network security /
پدیدآورنده : Joseph Migga Kizza.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures.,Business & Economics-- Information Management.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- System Administration-- Storage & Retrieval.,Data mining.,Information architecture.,Information retrieval.,Network hardware.
رده :
TK5105
.
59
175. Guide to computer network security
پدیدآورنده : Joseph Migga Kizza
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Access control,Computer networks-- Security measures
رده :
TK5105
.
59
176. Hack proofing Windows 2000 /
پدیدآورنده : Chad Todd ; Norris L. Johnson, Jr., technical editor.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer Science.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Engineering & Applied Sciences.
رده :
QA76
.
9
.
A25
T63
2001eb
177. Hacker's underground handbook :
پدیدآورنده : David Melnichuk.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks -- Access control.,Computer networks -- Security measures.,Hackers.
رده :
QA76
.
9
.
A25
D385
2010
178. Handbook of research on information and cyber security in the fourth industrial revolution /
پدیدآورنده : Ziska Fields, University of KwaZulu-Natal, South Africa.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer crimes-- Prevention.,Computer networks-- Security measures.,Confidential communications-- Protection.,Electronic information resources-- Access control.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Electronic information resources-- Access control.
رده :
TK5105
.
59
.
P744
2018e
179. Handbook of research on information security and assurance
پدیدآورنده : / Jatinder N.D. Gupta, Sushil K. Sharma [editors]
کتابخانه: Insurance Research Institute Library (Tehran)
موضوع : Computer networks, Security measures, Handbooks, manuals, etc,Electronic information resources, Access control, Handbooks, manuals, etc,Computer crimes, Prevention, Handbooks, manuals, etc
رده :
TK5105
.
59
.
H
2009
180. Handbook of research on information security and assurance
پدیدآورنده : Jatinder N.D. Gupta, Sushil K. Sharma
کتابخانه: Library of Razi Metallurgical Research Center (Tehran)
موضوع : Handbooks, manuals, etc ، Computer networks - Security measures,Handbooks, manuals, etc ، Electronic information resources - Access control,Handbooks, manuals, etc ، Computer crimes - Prevention
رده :
TK
5105
.
59
.
H353
2009