2561. Trustworthy Internet
Author: / Nicola Blefari-Melazzi, Giuseppe Bianchi, Luca Salgarelli, editors
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Congresses,Internet--Security measures--Congresses,Wireless communication systems--Security measures--Congresses,Data protection--Congresses,Privacy, Right of--Congresses,Digital communications--Congresses
Classification :
TK
,
5105
.
59
,.
T79
,
2010


2562. Trustworthy computing and services
Author: Yuyu Yuan, Xu Wu, Yueming Lu (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I83
2012


2563. Trustworthy execution on mobile devices
Author: Vasudevan, Amit,Amit Vasudevan, Jonathan M. McCune, James Newsome
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Computer security,، Mobile computing,Security measures ، Mobile communication systems,، Computer Science,، Systems and Data Security,، Computer Communication Networks,، Data Encryption,، Communications Engineering, Networks
Classification :
QA76
.
9
.
A25


2564. Tutorial computer and network security
Author: Abrams, Marshall D.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Access control ، Computers,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
A27
1987


2565. Tutorial computer and network security
Author: Abrams, Marshall D.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Computer security,، Computer networks- Security measures
Classification :
QA
76
.
9
.
A25
A27


2566. UTM security with Fortinet
Author: Kenneth Tam ... [et al.]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control,Computer networks-- Security measures
Classification :
TK5105
.
59
.
U86
2013


2567. Unauthorised access: physical penetration testing for IT security teams
Author: Allsopp, Wil.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,Security measures ، Computer networks,Testing ، Computer software,Reliability ، Computer software
Classification :
QA
76
.
9
.
A25
A456
2009


2568. Understand, manage, and measure cyber risk :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Cyber intelligence (Computer security) ; Computer networks ; Security measures ;

2569. Understanding PKI
Author: / Carlisle Adams, Steve Lloyd
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Public key infrastructure (Computer security),Computer networks- Security measures,Business enterprises- Computer networks- Security measures
Classification :
QA76
.
9
.
A25
,
A346
2003


2570. Understanding Voice over IP security /
Author: Alan B. Johnston, David M. Piscitello.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Internet telephony-- Security measures.,TCP/IP (Computer network protocol)-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Computersicherheit,Internettelefonie
Classification :
TK5105
.
8865
.
J64
2006eb


2571. Understanding cyber risk :
Author: Thomas R. Koehler.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Business intelligence.,Computer crimes-- Prevention.,Data protection.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Business enterprises-- Computer networks-- Security measures.,Business intelligence.,Computer crimes-- Prevention.,Data protection.
Classification :
HF5548
.
37
.
K64
2018


2572. Understanding intrusion detection through visualization
Author: / by Stefan Axelsson, David Sands
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Information visualization.,Computer security.
Classification :
TK
,
5105
.
59
,.
A95
,
2006


2573. Understanding network hacks :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ;

2574. Understanding the insider threat :
Author: Richard C. Brackney, Robert H. Anderson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- United States, Congresses.,Computer security-- United States, Congresses.,Computers-- Access control-- United States, Congresses.,Electronic information resources-- Access control-- United States, Congresses.,Intelligence service-- Computer networks-- Security measures-- United States.,Intelligence service-- United States-- Data processing.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Electronic information resources-- Access control.,Intelligence service-- Computer networks-- Security measures.,Intelligence service-- Data processing.,POLITICAL SCIENCE-- Political Freedom & Security-- General.,POLITICAL SCIENCE-- Political Freedom & Security-- Terrorism.,United States., 7
Classification :
QA76
.
9
.
A25
B696
2004


2575. Unix secure shell
Author: Carasik, Anne H
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، UNIX )Computer file(,، UNIX shells,، Computer networks-- Management,، Data encryption )Computer science(,، Computer networks-- Security measures
Classification :
QA
76
.
76
.
O63
.
C37
1999


2576. Using the Internet safely for seniors for dummies /
Author: Linda Criddle, Nancy C. Muir.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Internet and older people.,Internet.,Computer networks-- Security measures.,Internet and older people.,Internet.
Classification :
TK5105
.
875
.
I57
C72
2009


2577. Utility security :the new paradigm
Author: Seger, Karl A
Library: Library of Niroo Research Institue (Tehran)
Subject: Security measures ، Electric power plants,Security measures ، Computer networks,Security measures ، Public utilities,Prevention ، Terrorism
Classification :
TK
1025
.
S44
2003


2578. VPN applications guide : real solutions for enterprise networks
Author: McDysan, David E.
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Extranets )Computer networks(,Computer networks ، Business enterprises,، Internet,، Computer networks -- Security measures
Classification :
TK
5105
.
875
.
E87M33


2579. VPN applications guide: real solutions for enterprise networks
Author: McDysan, David E.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Extranets )Computer networks(,Computer networks ، Business enterprises,، Internet )Computer network(,Security measures ، Computer networks
Classification :
TK
5105
.
875
.
E87
M37
2000


2580. Vehicle safety communications
Author: Luca Delgrossi, Tao Zhang
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Automobiles-- Collision avoidance systems,Automobiles-- Safety appliances,Vehicular ad hoc networks (Computer networks)-- Safety measures
Classification :
TE228
.
37

