101. OpenAM
Author: Indira Thangasamy
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control,Computers-- Access control,Electronic commerce-- Security measures
Classification :
QA76
.
9
.
A25
T43
2011
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
102. Oracle Identity and Access Manager 11g for administrators
Author: Atul Kumar
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Database security
Classification :
QA76
.
9
.
A25
K863
2011
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
103. Outsourcing information security
Author: / C. Warren Axelrod
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks, Security measures, United States,Computers, Access control, United States,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
,
A88
2004
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
104. Outsourcing information security
Author: / C. Warren Axelrod
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures United States,Computers- Access control United States,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
,
A88
2004
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
105. Outsourcing information security [electronic resource]
Author: / C. Warren Axelrod
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Computer networks--Security measures--United States,Computers--Access control--United States,Data encryption (Computer science)
Classification :
EB
,
QA76
.
9
.
A25A88
2004
![](/design/images/bookmore.png)
106. PKI :
Author: Andrew Nash [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Public key cryptography.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,Computers-- Access control.,Computers-- Access control.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Public key cryptography.,Public key cryptography.,Public-Key-Infrastruktur
Classification :
QA76
.
9
.
A25
P59
2001eb
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
107. PKI uncovered
Author: Andre Karamanian, Srinivas Tenneti, Francois Dessart
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Public key infrastructure (Computer security),Computers, Access control,Computer networks, Security measures
Classification :
QA
،
76
.
9
،.
A25
,
K346
،
2011
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
108. Penetration tester's open source toolki
Author: / Aaron W. Bayles, technical editor and contributor ... [et al.]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computers--Access control,Computer networks--Security measures
Classification :
QA
,
76
.
9
,.
A25
,
P435
,
2007eb
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
109. Penetration tester's open source toolkit /
Author: Jeremy Faircloth ; Michael Rogers, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Testing.,Computers-- Access control.,Penetration testing (Computer security),Computers-- Access control.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Networking.,COMPUTERS-- Security-- Online Safety & Privacy.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
110. Penetration tester's open source toolkit
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Penetration testing (Computer security) ; Computers ; Access control. ; Computer networks ; Security measures. ;
![](/design/images/bookmore.png)
111. Penetration tester's open source toolkit
Author: / Aaron W. Bayles, technical editor and contributor ... [et al.]
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computers- Access control,Computer networks- Security measures
Classification :
QA76
.
9
.
A25
,
P435
2007
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
112. Penetration testing
Author: EC-Council/Press
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Study guides ، Penetration testing )Computer security( - Examinations,Study guides ، Computers - Access control Examinations,Study guides ، Computer networks - Security measures Examinations,Certification ، Electronic data processing personnel,Certification ، Telecommunications engineers
Classification :
QA
76
.
9
.
A25
P4355
2011
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
113. Perimeter defense mechanisms
Author: EC-Council Press.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Examinations -- Study guides.,Computers -- Access control -- Examinations -- Study guides.,Electronic data processing personnel -- Certification.
![](/design/images/bookmore.png)
114. Practical Microsoft Azure IaaS :
Author: Shijimol Ambi Karthikeyan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Windows Azure.,Windows Azure.,Cloud computing.,Microsoft Azure (Computing platform),Service-oriented architecture (Computer science),Cloud computing.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Information technology: general issues.,Microsoft Azure (Computing platform),Microsoft programming.,Network hardware.,Service-oriented architecture (Computer science)
Classification :
QA76
.
585
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
115. Practical intrusion analysis
Author: Ryan Trost.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Anomaly detection (Computer security),Computer networks-- Monitoring.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.
![](/design/images/bookmore.png)
116. Privacy-respecting intrusion detection
Author: Flegel, Ulrich
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Monitoring,، Computer security,، Computers -- Access control
Classification :
TK
5105
.
5
.
F563P7
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
117. Privacy solutions and security frameworks in information protection
Author: / Hamid R. Nemati, [editor]
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer networks -- Security measures,Data protection,Confidential communications,Computers -- Access control
Classification :
TK
5105
.
59
.
P7
2013
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
118. Proceedings of International Symposium on Sensor Networks, Systems and Security :
Author: Nageswara S.V. Rao, Richard R. Brooks, Chase Q. Wu, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Sensor networks, Congresses.,Communications engineering / telecommunications.,Computer security.,COMPUTERS / General.,Imaging systems & technology.,Network hardware.,Sensor networks.
Classification :
TK7872
.
D48
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
119. Proceedings of Tenth ACM Symposium on Access Control Models and Technologies : SACMAT 2005, June 1-3, 2005, Stockholm, Sweden
Author: sponsored by ACM SIGSAC
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer programming,Congresses ، Computers -- Access control,Congresses ، Computer security,Congresses ، Computer networks
Classification :
QA
76
.
6
.
A29
2005
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
120. Proceedings of The Ifip Tc 11 23rd International Information Security Conference :
Author: edited by Sushil Jajodia, Pierangela Samarati, Stelvio Cimato, Sushil Jajodia, Pierangela Samarati, Stelvio Cimato.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Computers -- Law and legislation.,Data protection.
![](/design/images/bookmore.png)