221. Intrusion detection systems with Snort
Author: / Rafeeq Ur Rehman
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computers- Access control
Classification :
TK5105
.
59
.
R44
2003


222. Intrusion detection systems with Snort
Author: / Rafeeq Ur Rehman
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computers- Access control
Classification :
TK5105
.
59
.
R44
2003


223. Intrusion detection systems with Snort
Author: / Rafeeq Ur Rehman
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks- Security measures,Computers- Access control
Classification :
E-BOOK

224. Intrusion detection systems with Snort
Author: / Rafeeq Ur Rehman
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computers- Access control
Classification :
TK5105
.
59
.
R44
2003


225. Intrusion detection systems with Snort :
Author: Rafeeq Ur Rehman.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computers-- Access control.

226. Intrusion detection with Snort
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Computer security ; Computers ; Access control ;

227. Intrusion detection with Snort
Author: / Jack Koziol
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computers- Access control
Classification :
TK5105
.
59
.
K69
2003


228. Intrusion detection with Snort
Author: / Jack Koziol
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Computer security.,Computers--Access control
Classification :
TK
,
5105
.
59
,.
K69
,
2003


229. Intrusion detection with Snort /
Author: Jack Koziol.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
TK5105
.
59
.
K69
2003eb


230. Intrusion prevention fundamentals
Author: / Earl Carter, Jonathan Hogue
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer networks- Access control,Computer security,intrusion prevention system
Classification :
TK5105
.
59
.
C385
2006


231. JZ6045,<The> hidden face of Eve :
Author: by Lars Kirchhoff. ,William E. Landis, Robin L. Chandler, editors.
Library: Library of Islamic Parliament (Tehran)
Subject:

232. Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions
Author: Sharma, Himanshu
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Penetration testing )Computer security(,، Computer security,، Computers -- Access control,، Computer networks -- Security measures
Classification :
QA
76
.
9
.
A25S522


233. Kali Linux network scanning cookbook
Author: Justin Hutchens
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
H883
2014


234. Keep your kids safe on the Internet /
Author: Simon Johnson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network resources-- Evaluation.,Computer networks-- Access control.,Computer networks-- Security measures.,Internet-- Access control.,Internet and children.,Internet-- Security measures.,Internet-- Access control.,Computer network resources-- Evaluation.,Computer networks-- Access control.,Computer networks-- Security measures.,Internet-- Access control.,Internet and children.,Internet-- Security measures.
Classification :
HQ784
.
I58
J66
2004


235. Kerberos :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ; Computer networks ; Access control. ;

236. Kerberos :
Author: / Jason Garman
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Computer networks , Access control
Classification :
E-BOOK

237. Kerberos
Author: / Jason Garman
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer networks- Access control
Classification :
TK5105
.
59
.
G375
2003


238. Kerberos
Author: / Jason Garman,On cover: Cross-platform authentication & single-sign-on..
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Access control,Computer networks--Security measures
Classification :
QA
,
76
.
9
,.
A25
,
G37
,
2003


240. Make a shield from wisdom :
Author: 20090507 0
Library: Library of Islamic Parliament (Tehran)
Subject:
