83. BL,BL
پدیدآورنده : / Marshall G.S. Hodgson. ,20090530 0
کتابخانه: Library of Islamic Parliament (Tehran)
موضوع :
84. Breaches of contracts and claims by third parties / Stephen Waddams -- Policy issues in defective property cases / Stephen Todd -- Defective structures and economic loss in the United States : law and policy / David F. Partlett -- Harm screening under negligence law / Israel Gilead -- Acts ,Notre Dame, Ind. :
پدیدآورنده : edited by Jason W. Neyers, Erika Chamberlain and Stephen G. A. Pitel. ,Alexandra Cuffel.
کتابخانه: Library of Islamic Parliament (Tehran)
موضوع :
85. Cognitive Informatics and Soft Computing :
پدیدآورنده : Pradeep Kumar Mallick, Valentina Emilia Balas, Akash Kumar Bhoi, Ahmed F. Zobaa, editors.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computational intelligence, Congresses.,Soft computing, Congresses.,Computational intelligence.,COMPUTERS-- General.,Soft computing.
رده :
Q342
86. Cyber Security.
پدیدآورنده : John G Voeller
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks -- Security measures.,COMPUTERS -- Internet -- Security.,Cyberspace -- Security measures.
رده :
QA76
.
9
J646
2014
87. Forced migration, human rights and security /
پدیدآورنده : edited by Jane McAd
کتابخانه: Library of Islamic Parliament (Tehran)
موضوع :
88. Hacking web apps :
پدیدآورنده : Mike Shema
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Application software-- Security measures,Computer crimes-- Prevention,Computer networks-- Security measures,Computer security,Web site development-- Security measures
رده :
TK5105
.
59
.
S5234
2012
89. Hacking web apps : detecting and preventing web application security problems
پدیدآورنده : Shema, Mike.
کتابخانه: Library of Razi Metallurgical Research Center (Tehran)
موضوع : Security measures ، Computer networks,Security measures ، Web site development,Security measures ، Application software,، Computer security,Prevention ، Computer crimes
رده :
TK
5105
.
59
.
S5234
2012
90. How do rogue nations threaten human rights? -- North Korea represses freedom / Kay Seok -- Iran violates women's rights / Sam Brownback -- Sudanese government engages in genocide / Human Rights Watch -- United States violates human rights worldwide / Vernon Coleman -- Rogue nations undermine the United Nations' mission to promote human rights / Joseph Loconte -- U.S. invasions have not spread democracy in the Middle East / Phyllis Bennis -- How should the global community respond to rogue nations? -- Preemptive force is sometimes necessary to contain rogue nations / National Review -- Preemptive force threatens efforts to contain rogue states / Ivan Eland -- Missile defense system is necessary to protect against rogue nations / Dennis Ross -- Missile defense system is unnecessary / Gwynne Dyer -- Promoting globalization will reduce the threat posed by rogue states / Banning N. Garrett, Dennis M. Sherman -- Globalization
پدیدآورنده : Louise Gerdes, book editor.
کتابخانه: Library of Islamic Parliament (Tehran)
موضوع :
91. (ISC)² CISSP certified information systems security professional official study guide /
پدیدآورنده : Mike Chapple, James Michael Stewart, Darril Gibson.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Examinations, Study guides.,Electronic data processing personnel-- Certification.,Telecommunications engineers-- Certification.,Computer networks-- Security measures-- Examinations.,Computer security-- Examinations.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Electronic data processing personnel-- Certification.,Telecommunications engineers-- Certification.
رده :
QA76
.
3
.
C4255
2018