21. Detection of intrusions and malware, and vulnerability assessment
پدیدآورنده : Ulrich Flegel, Danilo Bruschi (eds.)
کتابخانه: Central Library and Information Center of Shahed University (Tehran)
موضوع : Computers, Access control, Congresses,Computers, Access control, Evaluation, Congresses,Computer networks, Security measures, Congresses,Computer security, Congresses,Malware (Computer software), Congresses,Eindringerkennung, Kongress, Como <2009>,Kryptoanalyse, Kongress, Como <2009>,Malware, Kongress, Como <2009>,Softwareschwachstelle, Kongress, Como <2009>,Zugriffskontrolle, Kongress, Como <2009>,Como (2009), swd,Kongress., swd,Eindringerkennung., swd,Kryptoanalyse., swd,Malware., swd,Softwareschwachstelle., swd,Zugriffskontrolle., swd
رده :
QA
،
76
.
9
،.
A25
,
D563
،
2009
22. Detection of intrusions and malware, and vulnerability assessment
پدیدآورنده : / Klaus Julisch, Christopher Kruegel (eds.)
کتابخانه: Central Library and Document Center of Shahid Chamran University (Khuzestan)
موضوع : Computers--Access control--Congresses,Computers--Access control--Evaluation--Congresses,Computer networks--Security measures--Congresses,Computer security--Congresses,Intrusions,Malware,Vulnerability assessment,DIMVA
رده :
QA
,
76
.
9
,.
A25
,
D563
,
2005
23. Detection of intrusions and malware, and vulnerability assessment : Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005 : proceedings
پدیدآورنده : Klaus Julisch, Christopher Kruegel )eds.(
کتابخانه: Library of Institute for Research in Fundamental Sciences (Tehran)
موضوع : Congresses ، Computers -- Access control,Evaluation -- Congresses ، Computers -- Access control,Congresses ، Computer networks -- Security measures,Congresses ، Computer security
رده :
QA
76
.
L28
Vol
.
3548
24. Ethical hacking and countermeasures /
پدیدآورنده : EC-Council Council.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Secuity measures-- Examinations, Study guides.,Computers-- Access control-- Examinations, Study guides.,Electronic data processing personnel-- Certification.,Penetration testing (Computer security),Telecommunications engineers-- Certification.
رده :
QA76
.
9
.
A25
E865
2010
25. Firewalls 24seven
پدیدآورنده : / Matthew Strebe, Charles Perkins
کتابخانه: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
موضوع : Computer networks , Security measures,Computers , Access control,Firewalls (Computer security)
رده :
E-BOOK
26. Formal correctness of security protocols
پدیدآورنده : Bella, Giampaolo
کتابخانه: Central Library of Sharif University of Technology (Tehran)
موضوع : ، Computer security,، Computers-- Access control,، Cryptography,، Computer networks-- Security measures
رده :
QA
76
.
9
.
A25
.
B44
2007
27. Formal models and techniques for analyzing security protocols
پدیدآورنده : edited by Veronique Cortier and Steve Kremer
کتابخانه: Central Library of Hamedan University of Technology (Hamedan)
موضوع : ، Computer security,Access control ، Computers,Security measures ، Computer networks,Access control ، Electronic information resources
رده :
QA
76
.
9
.
A25
F6563
28. Formal models and techniques for analyzing security protocols /
پدیدآورنده : edited by Véronique Cortier and Steve Kremer
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures,Computer security,Computers-- Access control,Electronic information resources-- Access control
رده :
QA76
.
9
.
A25
F654
2011
29. Guide to computer network security /
پدیدآورنده : Joseph Migga Kizza.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures.,Business & Economics-- Information Management.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- System Administration-- Storage & Retrieval.,Data mining.,Information architecture.,Information retrieval.,Network hardware.
رده :
TK5105
.
59
30. Hack proofing Windows 2000 /
پدیدآورنده : Chad Todd ; Norris L. Johnson, Jr., technical editor.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer Science.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Engineering & Applied Sciences.
رده :
QA76
.
9
.
A25
T63
2001eb
31. Hands-on security in DevOps :
پدیدآورنده : Tony Hsu.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Access control.,Computer networks-- Security measures.,Information technology-- Management.,Computer networks-- Access control.,Computer networks-- Security measures.,COMPUTERS-- Security-- General.,Information technology-- Management.
رده :
HD30
.
2
32. How to cheat at securing Linux /
پدیدآورنده : Mohan Krishnamurthy [and others].
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Linux.,Linux.,Linux.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
رده :
TK5105
.
59
.
H683
2008eb
33. Identity and access management
پدیدآورنده : Ertem Osmanoglu
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures,Computer security,Computers-- Access control,False personation-- Prevention
رده :
QA76
.
9
.
A25
O783
2013
34. Information processing and security system
پدیدآورنده : / edited by Khalid Saeed, Jerzy Peja??
کتابخانه: Central Library and Document Center of Shahid Chamran University (Khuzestan)
موضوع : Computer networks--Security measures,Information storage and retrieval systems--Security measures,Computers--Access control
رده :
TK
,
5105
.
59
,.
I525
,
2005
35. Information processing and security systems
پدیدآورنده :
کتابخانه: Central Library and Documents Center of Mazandaran University (Mazandaran)
موضوع : Computer networks ; Security measures. ; Information storage and retrieval systems ; Security measures. ; Computers ; Access control. ;
36. Information security and privacy :
پدیدآورنده : Julian Jang-Jaccard, Fuchun Guo (eds.).
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computers-- Access control, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Data encryption (Computer science)
رده :
QA76
.
9
.
A25
A279
2019eb
37. Instant penetration testing
پدیدآورنده : Vyacheslav Fadyushin
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures,Computers-- Access control,Penetration testing (Computer security)
رده :
QA76
.
9
.
A25
F33
2013
38. Integrated security systems design : a complete reference for building enterprise-wide digital security systems
پدیدآورنده : Norman, Thomas L.
کتابخانه: Library of Institute for Research in Fundamental Sciences (Tehran)
موضوع : ، Computer networks -- Security measures,، Computers -- Access control,Security measures ، Information storage and retrieval systems
رده :
TK
5105
.
5
.
N67I5
2014
39. Internet and Intranet security
پدیدآورنده : Oppliger, Rolf
کتابخانه: Central Library of Amirkabir University of Technology (Tehran)
موضوع : Internet )Computer network( - Security measures , Intranets )Computer networks( - Security measures , Computers - Access control , TCP/IP )Computer network protocol(
رده :
TK
5105
.
875
.
I57
O67
1998
40. Internet and Intranet security
پدیدآورنده : / Rolf Oppliger
کتابخانه: Central Library and Document Center of Shahid Chamran University (Khuzestan)
موضوع : Internet- Security measures,Intranets (Computer networks)- Security measures,Computers- Access control,TCP/IP (Computer network protocol)
رده :
TK5105
.
875
.
I57
,
O67
1998