201. Handbook of research on information security and assurance
Author: Jatinder N.D. Gupta, Sushil K. Sharma ]editors[
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Handbooks, manuals, etc ، Computer networks -- Security measures,Access control -- Handbooks, manuals, etc ، Electronic information resources,Prevention -- Handbooks, manuals, etc ، Computer crimes
Classification :
TK
5105
.
59
.
H267
202. Handbook of research on information security and assurance
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Handbooks, manuals, etc ; Electronic information resources ; Access control ; Handbooks, manuals, etc ; Computer crimes ; Prevention ; Handbooks, manuals, etc ;
203. Handbook of wireless networks and mobile computing
Author: edited by Ivan Stojmenoviعc
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Handbooks, manuals, etc ، Wireless communication systems,Handbooks, manuals, etc ، Mobile communication systems,، Computer networks
Classification :
TK
5103
.
2
.
H269
204. Handbook on securing cyber-physical critical infrastructure
Author: Sajal Das, Krishna Kant, Nan Zhang (editors)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Handbooks, manuals, etc,Computer security, Handbooks, manuals, etc
Classification :
TK5105
.
59
.
H3533
2012
205. High speed LAN technology handbook
Author: Chowdhury, Dhiman Deb
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Handbooks, manuals, etc ، Local area networks )Computer networks(
Classification :
TK
5105
.
7
.
C47
2000
206. High speed LAN technology handbook
Author: Chowdhury, Dhiman Deb
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Handbooks, manuals, etc ، Local area networks )Computer networks(
Classification :
TK
5105
.
7
.
C47
207. High speed Lan technology handbook
Author: / Dhiman Deb Chowdury
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Local area networks (Computer networks)- Handbooks, Manuals, etc
Classification :
TK5105
.
7
.
C47
2000
208. How do rogue nations threaten human rights? -- North Korea represses freedom / Kay Seok -- Iran violates women's rights / Sam Brownback -- Sudanese government engages in genocide / Human Rights Watch -- United States violates human rights worldwide / Vernon Coleman -- Rogue nations undermine the United Nations' mission to promote human rights / Joseph Loconte -- U.S. invasions have not spread democracy in the Middle East / Phyllis Bennis -- How should the global community respond to rogue nations? -- Preemptive force is sometimes necessary to contain rogue nations / National Review -- Preemptive force threatens efforts to contain rogue states / Ivan Eland -- Missile defense system is necessary to protect against rogue nations / Dennis Ross -- Missile defense system is unnecessary / Gwynne Dyer -- Promoting globalization will reduce the threat posed by rogue states / Banning N. Garrett, Dennis M. Sherman -- Globalization
Author: Louise Gerdes, book editor.
Library: Library of Islamic Parliament (Tehran)
Subject:
209. How to cheat at securing a wireless network
Author: Chris Hurley... ]at al.[
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Security measures ، Wireless communication systems,Handbooks, manuals, etc ، Computer networks -- Security measures
Classification :
TK
5103
.
2
.
H69
210. How to cheat at securing a wireless network
Author: / Chris Hurley ... [et al.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures , Handbooks, manuals, etc,Wireless communication systems , Security measures,Electronic books. , local
Classification :
E-BOOK
211. Human-computer interaction and cybersecurity handbook /
Author: edited by Abbas Moallem
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention, Handbooks, manuals, etc.,Computer networks-- Security measures, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Technology and international relations.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Technology and international relations.
Classification :
TK5105
.
59
.
H86
2019eb
212. IP network design guide
Author: Murhammer, Martin
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، TCP/IP )Computer network protocol(,، TCP/IP )Computer network protocol( -- Handbooks, manuals, etc,، Computer networks -- Design
Classification :
TK
5105
.
5
.
I9
1999
213. IT-Risiko-Management mit System :
Author: Hans-Peter K"nigs
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Handbooks, manuals, etc.,Information storage and retrieval systems -- Security measures -- Handbooks, manuals, etc.,Risk assessment.
214. IT risk management guide :
Author: Gerard Blokdijk, Claire Engle & Jackie Brewster.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises -- Computer networks -- Security measures -- Handbooks, manuals, etc.,Computer security -- Management -- Handbooks, manuals, etc.,Electronic data processing departments -- Security measures -- Handbooks, manuals, etc.
Classification :
HF5548
.
37
G473
2008