2441. The CISSP prep guide : mastering CISSP and CAP
Author: Krutz, Ronald L.
Library: Library of College of Science University of Tehran (Tehran)
Subject: Certification ، Electronic data processing personnel,Examinations -- Study guides ، Computer networks,Examinations -- Study guides ، Computer networks -- Security measures
Classification :
QA
76
.
3
.
K78
2006


2442. The CompTIA Security + certification guide
Author: / Gregory White...[et al.]
Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)
Subject: Electronic data processing personnel, Certification,Computer security, Examinations, Study guides,Computer networks, Security measures, Examinations, Study guides
Classification :
QA76
.
3
.
C65


2443. The E-Privacy imperative
Author: / Mark S. Merkow, James Breithaupt
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Electronic commerce,Electronic commerce- Security measures,Business enterprises- Computer networks- Security measures,Privacy, Right of
Classification :
HF5548
.
32
.
M47
2002


2444. The E-Privacy imperative
Author: / Mark S. Merkow, James Breithaupt
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Electronic commerce,Electronic commerce- Security measures,Business enterprises- Computer networks- Security measures,Privacy, Right of
Classification :
HF5548
.
32
.
M47
2002


2445. The E-Privacy imperative protect your customers' Internet privacy and ensure your company's survival in the electronic age
Author: Merkow, Mark S.,Mark S. Merkow, James Breithaupt
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Electronic commerce,، Electronic commerce- Security measures,، Business enterprises- Computer networks- Security measures,، Privacy, Right of
Classification :
HF
5548
.
32
.
M47
2002


2446. The Executive guide to information security: threats, challenges, and solutions
Author: Mark Egan with Tim Mather
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection
Classification :
HF
،
5548
.
32
،.
E325
،
2005


2447. <The> Future of Identity in the Information Society
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses,Computer networks -- Security measures -- Congresses,Privacy, Right of -- Congresses,کامپیوترها -- ایمنی اطلاعات -- کنگرهها,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها, حق صیانت از حریم شخصی -- کنگرهها
Classification :
E-Book
,

2448. The Internet security guidebook : from planning to deployment
Author: Ellis, Juanita
Library: Library of College of Science University of Tehran (Tehran)
Subject: ، Computer networks -- Security measures,Security measures ، Internet )Computer network(,Security measures ، Electronic commerce
Classification :
TK
5105
.
59
.
E44
2001


2449. The Internet security guidebook : from planning to deployment
Author: Ellis, Juanita
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,Security measures ، Internet,Security measures ، Electronic commerce
Classification :
TK
5105
.
59
.
E43


2450. The NAT handbook : implementing and managing network address translation
Author: Dutcher, Bill
Library: Central Library and Documentation Center (Kerman)
Subject: ، Directory services )Computer network technology(,، Internet addresses,، Computer networks - Security measures
Classification :
TK
5105
.
595
.
D88
2001


2451. The NCSA guide to PC and LAN security
Author: Cobb, Stephen
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer security , Local area networks )Computer networks( - Security measures
Classification :
QA
76
.
9
.
A25
C56
1996


2452. The NCSA guide to PC and LAN security
Author: Cobb, Stephen
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Computer security,Security measures ، Local area networks )Computer networks(
Classification :
QA
76
.
9
.
A25
C56
1996


2453. The NICE cyber security framework :
Author: Izzat Alsmadi.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25


2454. The Practice of Network Security Monitoring :
Author: by Richard Bejtlich.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Electronic countermeasures.
Classification :
TK
5105
.
59
.
B436
2013


2455. The SSCP prep guide :
Author: / Debra S. Isaac, Michael J. Issac
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures , Examinations , Study guides,Electronic data processing personnel , Examinations , Study guides
Classification :
E-BOOK

2456. The Stephen Cobb complete book of PC and LAN security
Author: / by Stephen Cobb,Cobb
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Local area networks (Computer networks) -- Security measures,Computers -- Access control
Classification :
TK
5105
.
7
.
C62
1992


2457. The Stephen Cobb complete book of PC and LAN security
Author: / Stephen Cobb
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Local area networks (Computer networks),Computer - Access control,-- Security measures
Classification :
005
.
8
C653S


2458. The Tao of network security monitoring
Author: / Richard Bejtlich
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks- Security measures
Classification :
E-BOOK

2459. The Tao of network security monitoring
Author: / Richard Bejtlich
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures
Classification :
TK5105
.
59
.
B44
2005


2460. The antivirus hacker's handbook /
Author: Joxean Koret, Elias Bachaalany
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control,Computer networks-- Security measures, Handbooks, manuals, etc,Computer security, Handbooks, manuals, etc
Classification :
QA76
.
9
.
A25

