121. Cyber warfare :
Author: Jason Andress, Steve Winterfeld ; Russ Rogers, technical editor ; foreword by Stephen Northcutt.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Handbooks, manuals, etc.,Information warfare, Handbooks, manuals, etc.
122. Cyber warfare : techniques, tactics and tools for security practitioners
Author: Andress, Jason.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Handbooks, manuals, etc ، Information warfare,Handbooks, manuals, etc ، Computer networks - Security measures
Classification :
U
163
.
A64
2011
123. Cyber warfare : techniques, tactics and tools for security practitioners
Author: / Jason Andress, Steve Winterfeld
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Information warfare–Handbooks, manuals, etc.,Computer networks–Security measures–_x000D_Handbooks, manuals, etc.,International courts
Classification :
U163
.
A64
2014
124. GFI network security and PCI compliance power tools
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: GFI Software (Firm) ; Handbooks, manuals, etc. ; Computer networks ; Security measures ; Handbooks, manuals, etc. ; Credit cards ; Security measures ; Standards ; Handbooks, manuals, etc. ;
125. HM116
Author: edited by Leila Monaghan & Jane E. Goodman.
Library: Library of Islamic Parliament (Tehran)
Subject:
126. Handbook of computer networks and cyber security
Author: Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Computer networks.,Computer security.
Classification :
TK5105
.
5
127. Handbook of database security
Author:
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Database security -- Handbooks, manuals, etc,Computer networks -- Security measures -- Handbooks, manuals, etc
Classification :
QA
76
.
9
.
D314
H26
2007
R
128. Handbook of database security : applications and trends
Author: edited by Michael Gertz, Sushil Jajodia
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Handbooks, manuals, etc ، Database security,Handbooks, manuals, etc ، Computer networks -- Security measures
Classification :
QA
76
.
9
.
D314H26
129. Handbook of deep learning applications /
Author: Valentina Emilia Balas, Sanjiban Sekhar Roy, Dharmendra Sharma, Pijush Samui, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Machine learning, Handbooks, manuals, etc.,Machine learning.
Classification :
Q325
.
5
.
H36
2019
130. Handbook of research on information security and assuranc
Author: / Jatinder N.D. Gupta, Sushil K. Sharma [editors]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Handbooks, manuals, etc,Electronic information resources--Access control--Handbooks, manuals, etc,Computer crimes--Prevention--Handbooks, manuals, etc
Classification :
TK
,
5105
.
59
,.
H353
,
2009
131. Handbook of research on information security and assurance
Author: / Jatinder N.D. Gupta, Sushil K. Sharma [editors]
Library: Insurance Research Institute Library (Tehran)
Subject: Computer networks, Security measures, Handbooks, manuals, etc,Electronic information resources, Access control, Handbooks, manuals, etc,Computer crimes, Prevention, Handbooks, manuals, etc
Classification :
TK5105
.
59
.
H
2009
132. Handbook of research on information security and assurance
Author: Jatinder N.D. Gupta, Sushil K. Sharma
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Handbooks, manuals, etc ، Computer networks - Security measures,Handbooks, manuals, etc ، Electronic information resources - Access control,Handbooks, manuals, etc ، Computer crimes - Prevention
Classification :
TK
5105
.
59
.
H353
2009
133. Handbook of research on information security and assurance
Author: Jatinder N.D. Gupta, Sushil K. Sharma ]editors[
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Handbooks, manuals, etc ، Computer networks -- Security measures,Access control -- Handbooks, manuals, etc ، Electronic information resources,Prevention -- Handbooks, manuals, etc ، Computer crimes
Classification :
TK
5105
.
59
.
H267
134. Handbook of research on information security and assurance
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Handbooks, manuals, etc ; Electronic information resources ; Access control ; Handbooks, manuals, etc ; Computer crimes ; Prevention ; Handbooks, manuals, etc ;
135. Handbook on securing cyber-physical critical infrastructure
Author: Sajal Das, Krishna Kant, Nan Zhang (editors)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Handbooks, manuals, etc,Computer security, Handbooks, manuals, etc
Classification :
TK5105
.
59
.
H3533
2012
136. How do rogue nations threaten human rights? -- North Korea represses freedom / Kay Seok -- Iran violates women's rights / Sam Brownback -- Sudanese government engages in genocide / Human Rights Watch -- United States violates human rights worldwide / Vernon Coleman -- Rogue nations undermine the United Nations' mission to promote human rights / Joseph Loconte -- U.S. invasions have not spread democracy in the Middle East / Phyllis Bennis -- How should the global community respond to rogue nations? -- Preemptive force is sometimes necessary to contain rogue nations / National Review -- Preemptive force threatens efforts to contain rogue states / Ivan Eland -- Missile defense system is necessary to protect against rogue nations / Dennis Ross -- Missile defense system is unnecessary / Gwynne Dyer -- Promoting globalization will reduce the threat posed by rogue states / Banning N. Garrett, Dennis M. Sherman -- Globalization
Author: Louise Gerdes, book editor.
Library: Library of Islamic Parliament (Tehran)
Subject:
137. How to cheat at securing a wireless network
Author: Chris Hurley... ]at al.[
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Security measures ، Wireless communication systems,Handbooks, manuals, etc ، Computer networks -- Security measures
Classification :
TK
5103
.
2
.
H69
138. How to cheat at securing a wireless network
Author: / Chris Hurley ... [et al.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures , Handbooks, manuals, etc,Wireless communication systems , Security measures,Electronic books. , local
Classification :
E-BOOK
139. Human-computer interaction and cybersecurity handbook /
Author: edited by Abbas Moallem
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention, Handbooks, manuals, etc.,Computer networks-- Security measures, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Technology and international relations.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Technology and international relations.
Classification :
TK5105
.
59
.
H86
2019eb