41. Detecting cloud virtual network isolation security for data leakage
پدیدآورنده : Al Nasseri, Haifa Mohamed
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Cloud computing ; Virtual network ; Security ; Virtual network isolation ; DeepDive ; Penetration testing ; Cloud virtual network ; QA76.585A6 ; Computer networks--Security measures ; Virtual computer systems
42. Digital forensics for network, Internet, and cloud computing :
پدیدآورنده : Terrence V. Lillard [and others] ; technical editor, Jim Murray.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Cloud computing-- Security measures.,Computer crimes-- Investigation.,Computer networks-- Security measures.,Computer security.,Computer crimes-- Investigation.,Computer networks-- Security measures.,Computer security.,LAW-- Forensic Science.
رده :
HV8079
.
C65
D54
2010
43. Digital forensics for network, Internet, and cloud computing :a forensic evidence guide for moving targets and data
پدیدآورنده : Terrence V. Lillard ... ]et al.[ ; technical editor, Jim Murray
موضوع : Investigation ، Computer crimes,، Computer security,Security measures ، Computer networks,Security measures ، Cloud computing
۲ نسخه از این کتاب در ۲ کتابخانه موجود است.
44. Emerging Trends in ICT Security.
پدیدآورنده :
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer crimes-- Prevention.,Cyberterrorism-- Prevention.,Electronic surveillance.,Information technology-- Security measures.
رده :
QA76
.
9
.
A25
45. Encyclopedia of database systems /
پدیدآورنده : M. Tamer Ozsu, Ling Liu, editors.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Database management, Encyclopedias.,Databases, Encyclopedias.,Database management.,Databases.
رده :
QA76
.
9
.
D32
46. From database to cyber security :
پدیدآورنده : Pierangela Samarati, Indrajit Ray, Indrakshi Ray (eds.).
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer security.,Databases.,Computer security.,Databases.
رده :
QA76
.
9
.
A25
47. Guide to Security Assurance for Cloud Computing
پدیدآورنده : \ Shao Ying Zhu , Richard Hill, Marcello Trovati Editors
کتابخانه: Library of Foreign Languages and Islamic Sources (Qom)
موضوع : Cloud computing -- Security measures.,محاسبات ابری -- تدابیر ایمنی
رده :
QA
76
.
585
.
G8
2015
E-Book
,
48. Guide to computer network security /
پدیدآورنده : Joseph Migga Kizza.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures.,Business & Economics-- Information Management.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- System Administration-- Storage & Retrieval.,Data mining.,Information architecture.,Information retrieval.,Network hardware.
رده :
TK5105
.
59
49. Guide to computer network security
پدیدآورنده : Joseph Migga Kizza
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Access control,Computer networks-- Security measures
رده :
TK5105
.
59
50. Handbook of Research on Securing Cloud-based Databases with Biometric Applications
پدیدآورنده : \ Ganesh Chandra Deka, Ministry of Labour and Employment, India, Sambit Bakshi, National Institute of Technology Rourkela, India [editors].
کتابخانه: Library of Foreign Languages and Islamic Sources (Qom)
موضوع : Biometric identification -- Handbooks, manuals, etc.,Cloud computing -- Security measures -- Handbooks, manuals, etc.,Biometric identification-- Research, Handbooks, manuals, etc.,تشخیص هویت زیستسنجی-- دستنامه ها ,محاسبات ابری -- تدابیر ایمنی -- دستنامه ها,تشخیص هویت زیستسنجی -- تحقیق -- دستنامهها
رده :
TK7882
.
B56
H36
2015
51. Handbook of computer networks and cyber security
پدیدآورنده : Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta, editors.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Computer networks.,Computer security.
رده :
TK5105
.
5
52. Handbook of research on information and cyber security in the fourth industrial revolution /
پدیدآورنده : Ziska Fields, University of KwaZulu-Natal, South Africa.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer crimes-- Prevention.,Computer networks-- Security measures.,Confidential communications-- Protection.,Electronic information resources-- Access control.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Electronic information resources-- Access control.
رده :
TK5105
.
59
.
P744
2018e
53. Handbook of research on security considerations in cloud computing /
پدیدآورنده : Kashif Munir, Mubarak S. Al-Mutairi, and Lawan A. Mohammed, editors
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Cloud computing-- Security measures, Handbooks, manuals, etc
رده :
QA76
.
585
.
H3646
2015
54. Hands-on AWS penetration testing with Kali Linux :
پدیدآورنده : Karl Gilbert, Benjamin Caudill.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Amazon Web Services (Firm),Amazon Web Services (Firm),Kali Linux.,Kali Linux.,Cloud computing.,Computer networks-- Security measures.,Penetration testing (Computer security),Cloud computing.,Computer networks-- Security measures.,Penetration testing (Computer security)
رده :
QA76
.
9
.
A25
55. ICT and critical infrastructure :proceedings of the 48th Annual Convention of Computer Society of India
پدیدآورنده : Suresh Chandra Satapathy, P. S. Avadhani, Siba K. Udgata, Sadasivuni Lakshminarayana, editors ; Hosted by CSI Vishakapatnam Chapter
کتابخانه: Library and Documentation Center of Kurdistan University (Kurdistan)
موضوع : Congresses ، Computer science,Congresses ، Information technology,Congresses ، Computer networks,Congresses ، Computer security,Congresses ، Computer networks - Security measures,، Engineering,، Computational Intelligence,، Artificial Intelligence )incl. Robotics(
رده :
QA75
.
5
56. (ISC)2 CCSP Certified Cloud Security Professional :
پدیدآورنده : Ben Malisow.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Cloud computing-- Security measures-- Examinations, Study guides.
رده :
QA76
.
585
57. ISSE 2011 Securing Electronic Business Processes :
پدیدآورنده : Norbert Pohlmann, Helmut Reimer, Wolfgang Schneider (eds.).
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Business-- Data processing, Congresses.,Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Information technology-- Security measures, Congresses.,Business-- Data processing.,Computer networks-- Security measures.,Computer security.,Information technology-- Security measures.
رده :
QA76
.
9
.
A25
.
I54
2011eb
58. Innovative security solutions for information technology and communications :
پدیدآورنده : Jean-Louis Lanet, Cristian Toma (eds.).
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Information technology-- Security measures, Congresses.,Computer networks-- Security measures.,Computer security.,Information technology-- Security measures.
رده :
QA76
.
9
.
A25
59. Intel® trusted execution technology for server platforms :
پدیدآورنده : William Futral, James Greene
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Client/server computing-- Security measures,Data encryption (Computer science),Database security.,Computer Science,Data Encryption,Database Management
رده :
QA76
.
9
.
A25
60. Intelligent computing & optimization /
پدیدآورنده : Pandian Vasant, Ivan Zelinka, Gerhard-Wilhelm Weber, editors.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Artificial intelligence, Congresses.,Computer networks-- Security measures, Congresses.,Artificial Intelligence (incl. Robotics).,Computational Intelligence.,Artificial intelligence.,Artificial intelligence.,Computer networks-- Security measures.,COMPUTERS / General
رده :
Q334