341. The hacker's handboo
Author: / Susan Young, Dave Aitel
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Computer networks--Access control,Hackers.
Classification :
TK
,
5105
.
59
,.
Y68
,
2004


342. The hacker's handbook: the strategy behind breaking into and defending networks
Author: Young, Susan )Susan Elizabeth(
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer networks-- Security measures,، Computer networks-- Access control,، Computer hackers
Classification :
TK
5105
.
59
.
Y68
2004


343. The modelling and analysis of security protocols :
Author: P.Y.A. Ryan and S.A. Schneider, with M.H. Goldsmith, G. Lowe and A.W. Roscoe
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols,Computer networks-- Security measures,Computer security-- Mathematical models,Computer software-- Verification,Computers-- Access control,Cryptography
Classification :
TK5105
.
59
.
R93
2001


344. The official (ISC)² CISSP CBK reference /
Author: John Warsinkse ; with Mark Graff, Kevin Henry, Christopher Hoover, Ben Malisow, Sean Murphy, C. Paul Oakes, George Pajari, Jeff T. Parker, David Seidl, Mike Vasquez.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Administrative agencies-- Information resources management-- Security measures-- United States-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations, Study guides.,Computers-- Access control-- Examinations, Study guides.,Telecommunications engineers-- Certification-- United States.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer networks-- Security measures-- Examinations.,Telecommunications engineers-- Certification.,United States., 7
Classification :
TK5105
.
59


345. The state of the art in intrusion prevention and detection
Author: edited by Al-Sakib Khan Pathan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures.,Computer security.,Computers -- Access control.
Classification :
QA76
.
9
.
A25
E358
9999


346. Transactions on data hiding and multimedia security VI /
Author: Yun Q. Shi [and others] (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Data protection,Multimedia systems-- Security measures,Algorithm Analysis and Problem Complexity,Computer Science,Computers and Society,Data Encryption,Pattern Recognition,Systems and Data Security
Classification :
QA76
.
9
.
A25
T73
2011


347. Transparent user authentication
Author: / Nathan Clarke
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures,Computers, Access control,Data protection
Classification :
E-BOOK

348. Transparent user authentication biometrics, RFID and behavioural profiling
Author: Clarke, Nathan.,Nathan Clarke
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Computer networks, Security measures,، Computers, Access control,، Data protection
Classification :
TK
5105
.
59
.
C575
2011


349. Trust management VII :
Author: Carmen Fernández-Gago [and others] (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
C376
2013


350. Trust on the world wide web :
Author: Jennifer Golbeck.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,World Wide Web-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,World Wide Web-- Security measures.
Classification :
QA76
.
9
.
A25
G625
2008eb


351. Trust, privacy and security in digital business
Author: / Costas Lambrinoudakis, G?�nther Pernul, A Min Tjoa (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Public key infrastructure (Computer security)--Congresses,Data transmission systems--Security measures--Congresses,Electronic commerce--Security measures--Congresses,Business enterprises--Computer networks--Security measures--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
T74
,
2007


352. Trusted computing and information security :
Author: Huanguo Zhang, Bo Zhao, Fei Yan (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25


353. Trusted computing platforms
Author: / Siani Pearson, editor
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security- Standards,Computer networks- Security measures,Electronic information resources- Access control
Classification :
QA76
.
9
.
A25
,
T75
2003


354. Tutorial computer and network security
Author: Abrams, Marshall D.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Access control ، Computers,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
A27
1987


355. UTM security with Fortinet
Author: Kenneth Tam ... [et al.]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control,Computer networks-- Security measures
Classification :
TK5105
.
59
.
U86
2013


356. Understanding the insider threat :
Author: Richard C. Brackney, Robert H. Anderson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- United States, Congresses.,Computer security-- United States, Congresses.,Computers-- Access control-- United States, Congresses.,Electronic information resources-- Access control-- United States, Congresses.,Intelligence service-- Computer networks-- Security measures-- United States.,Intelligence service-- United States-- Data processing.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Electronic information resources-- Access control.,Intelligence service-- Computer networks-- Security measures.,Intelligence service-- Data processing.,POLITICAL SCIENCE-- Political Freedom & Security-- General.,POLITICAL SCIENCE-- Political Freedom & Security-- Terrorism.,United States., 7
Classification :
QA76
.
9
.
A25
B696
2004


357. Web security :
Author: Hanqing Wu and Liz Zhao
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Popular works,Computer security,Internet-- Security measures,World Wide Web-- Security measures
Classification :
TK5105
.
59
.
H3536
2014


358. Windows Server 2003 networking recipes
Author: Robbie Allen, Laura E. Hunter, and Bradley J. Dinerman
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Microsoft Windows server,Computer networks-- Access control,Computer networks-- Security measures,Internet

359. 802.1X port-based authenticatio
Author: / Edwin Lyle Brown
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Standards,Computers--Access control--Standards,Computer network protocols.
Classification :
TK
,
5105
.
59
,.
B765
,
2007


360. 802.1X port-based authentication
Author: / Edwin Lyle Brown
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks- Security measures- Standards,Computers- Access control- Standards,Computer network protocols
Classification :
E-BOOK
