1. A technical guide to IPSec virtual private networks /
Author: James S. Tiller.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Extranets (Computer networks)-- Security measures.,IPSec (Computer network protocol),COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,IPSec (Computer network protocol)
Classification :
TK5105
.
875
.
E87
T55
2001eb
2. AVIEN malware defense guide for the Enterprise /
Author: David Harley [and others] ; foreword by Robert S. Vibert.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Computer viruses.,Computer networks-- Security measures.,Computer security-- Management.,Computer viruses.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
A873
2007eb
3. Check Point NG VPN-1/Firewall-1 :
Author: Jim Noble [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Computer programs.,Computer security-- Computer programs.,Firewalls (Computer security),Computer networks-- Security measures-- Computer programs.,Computer security-- Computer programs.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Firewalls (Computer security)
Classification :
QA76
.
9
.
A25
N63
2003eb
4. Computer security, privacy, and politics :
Author: Ramesh Subramanian, editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Government policy.,Computer security.,Computer networks-- Security measures.,Computer security-- Government policy.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
C6557
2008eb
5. Configuring Check Point NGX VPN-1/FireWall-1 /
Author: Robert Stephens, Barry J. Stiefel, Stephen Watkins.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: FireWall-1.,Computer networks-- Security measures.,Firewalls (Computer security),Computer networks-- Security measures-- Computer programs.,Computer networks-- Security measures.,Computer security-- Computer programs.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Extranets (Computer networks),Firewalls (Computer security),Firewalls (Computer security)
Classification :
TK5105
.
59
.
S846
2005eb
6. Cryptology and network security :
Author: Jan Camenisch, Panos Papadimitratos (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer Communication Networks.,Computers and Society.,Cryptology.,Information Systems and Communication Service.,Software Engineering/Programming and Operating Systems.,Computer networking & communications.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- Online Services-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Ethical & social aspects of IT.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25
7. Cyber-security and global information assurance :
Author: Kenneth J. Knapp [editor].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Cyberspace-- Security measures.,Data protection.,Information technology-- Security measures.,Computer networks-- Security measures.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25
C918
2009eb
8. Cyber threat intelligence /
Author: Ali Dehghantanha, Mauro Conti, Tooska Dargahi, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Internet-- Security measures.,Artificial intelligence.,Computer networking & communications.,Computer security.,Computer security.,COMPUTERS-- Security-- General.,Internet-- Security measures.,Network hardware.
Classification :
QA76
.
9
.
A25
9. Cybersecurity in Nigeria :
Author: Aamo Iorliam.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Nigeria.,Computer security-- Nigeria.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Online Safety & Privacy.,Nigeria., 7
Classification :
QA76
.
9
.
A25
10. Cybersecurity today and tomorrow :
Author: Computer Science and Telecommunications Board, Division of Engineering and Physical Sciences, National Research Council.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- United States.,Computer networks-- Security measures.,Computer security-- United States.,Computer security.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,United States., 7
Classification :
TK5105
.
59
.
C93
2002eb
11. Eliciting the requirements for intelligent systems in law enforcement /
Author: Jeffrey L. Goldberg [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Case studies.,Internet-- Security measures, Case studies.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Internet-- Security measures.
Classification :
TK5105
.
59
.
E45
2004eb
12. Fuzzing for software security testing and quality assurance /
Author: Ari Takanen, Jared DeMott, Charlie Miller.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer software-- Development.,Logiciels-- Qualité-- Contrôle.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Sécurité informatique.,Computer networks-- Security measures.,Computer security.,Computer software-- Development.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
T335
2008eb
13. Hack proofing Windows 2000 /
Author: Chad Todd ; Norris L. Johnson, Jr., technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer Science.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Engineering & Applied Sciences.
Classification :
QA76
.
9
.
A25
T63
2001eb
14. Hacking exposed :
Author: Joel Scambray, Stuart McClure, George Kurtz.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer security.,Computerbeveiliging.,Computernetwerken.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Hacking.
Classification :
TK5105
.
59
.
M48
2001eb
15. Hands-on cybersecurity with Blockchain :
Author: Rajneesh Gupta.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Blockchains (Databases),Computer networks-- Security measures.,Computer security.,Database security.,Denial of service attacks.,Blockchains (Databases),Computer networks-- Security measures.,Computer security.,Computer security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Online Safety & Privacy.,Data capture & analysis.,Database security.,Denial of service attacks.,Network security.
Classification :
QA76
.
9
.
A25
G87
2018
16. How to cheat at managing information security /
Author: Mark Osborne ; Paul M. Summitt, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management.,Information technology-- Security measures.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25
O83
2006eb
17. How to cheat at securing Linux /
Author: Mohan Krishnamurthy [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Linux.,Linux.,Linux.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
TK5105
.
59
.
H683
2008eb
18. Human-computer interaction and cybersecurity handbook /
Author: edited by Abbas Moallem
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention, Handbooks, manuals, etc.,Computer networks-- Security measures, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Technology and international relations.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Technology and international relations.
Classification :
TK5105
.
59
.
H86
2019eb
19. ISA server and beyond :
Author: Thomas W. Shinder, Debra Littlejohn Shinder ; Martin Grasdal, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Microsoft ISA server.,Microsoft ISA server.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
TK5105
.
59
.
S55
2002eb
20. (ISC)² CISSP certified information systems security professional official study guide /
Author: Mike Chapple, James Michael Stewart, Darril Gibson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Examinations, Study guides.,Electronic data processing personnel-- Certification.,Telecommunications engineers-- Certification.,Computer networks-- Security measures-- Examinations.,Computer security-- Examinations.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Electronic data processing personnel-- Certification.,Telecommunications engineers-- Certification.
Classification :
QA76
.
3
.
C4255
2018