881. The misuse of information systems :
Author: John P. D'Arcy.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
D335
2007eb
882. The network security test lab :
Author: Michael Gregg
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security-- Evaluation
Classification :
TK5105
.
59
883. The official (ISC)² CISSP CBK reference /
Author: John Warsinkse ; with Mark Graff, Kevin Henry, Christopher Hoover, Ben Malisow, Sean Murphy, C. Paul Oakes, George Pajari, Jeff T. Parker, David Seidl, Mike Vasquez.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Administrative agencies-- Information resources management-- Security measures-- United States-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations, Study guides.,Computers-- Access control-- Examinations, Study guides.,Telecommunications engineers-- Certification-- United States.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer networks-- Security measures-- Examinations.,Telecommunications engineers-- Certification.,United States., 7
Classification :
TK5105
.
59
884. The roots of reading comprehension instruction / P. David Pearson -- The development of children's reading comprehension / Scott G. Paris and Ellen E. Hamilton -- In search of the "simple view" of reading comprehension / James V. Hoffman -- Identifying and describing constructively responsive comprehension strategies in new and traditional forms of reading / Peter Afflerbach and Byeong-Young Cho -- Helping readers make sense of print : research that supports a whole language pedagogy / Kenneth S. Goodman and Yetta M. Goodman -- The role of cognitive flexibility in reading comprehension : past, present, and future / Kelly B. Cartwright -- Ways of meaning making : sociocultural perspectives on reading comprehension / James Gavelek and Patrick Bresnahan -- Transactional theory and critical theory in reading comprehension / James S. Damico, Gerald Campano, and Jerome C. Harste -- Grounding reading comprehension in the neuroscience literatures / George G. Hruby -- Text comprehension : a retrospective, perspective, and prospective / Emily Fox and Patricia A. Alexander -- Disciplinary comprehension / Cynthia Shanahan -- The agency and artistry of meaning makers within and across digital spaces / Robert J. Tierney -- Comprehension and computer technology : past results, current knowledge, and future promises / Michael L. Kamil and Helen Kim Chou -- Motivation and reading comprehension / Samuel D. Miller and Beverly S. Faircloth -- Vocabulary and reading comprehension : the nexus of meaning / James F. Baumann -- Cognitive strategy instruction / Janice A. Dole, Jeffery D. Nokes, and Dina Drits -- Metacognitive processes and reading comprehension / Linda Baker and Lisa Carter Beall -- Self-regulated comprehension / Dixie D. Massey -- Formal and informal measures of reading comprehension / Lauren Leslie and Joanne Caldwell -- Assessing comprehension of young children / Katherine A. Dougherty Stahl -- Approaches to teaching reading comprehension / Taffy E. Raphael ... [et al.] -- Comprehension and discussion of text / Janice F. Almasi and Keli Garas-York -- Comprehension instruction in kindergarten through grade three / Cathy Collins Block and Jan Lacina -- Developing higher order comprehension in the middle grades / Ruth Wharton-McDonald and Shannon Swiger -- Improving adolescent comprehension : developing comprehension strategies in the content areas / Mark W. Conley -- Comprehension difficulties among struggling readers / Richard L. Allington and Ann McGill-Franzen -- Reading comprehension and diversity in historical perspective : literacy, power, and native Hawaiians / Kathryn H. Au and Julie Kaomea -- Culturally relevant pedagogy and reading comprehension / Colleen M. Fairbanks ... [et al.] -- Reading comprehension and English language learners / Kathryn Prater -- Family literacy and reading comprehension / Patricia A. Edwards and Jennifer D. Turner -- Improving comprehension instruction through quality professional development / Misty Sailors -- Public policy and the future of reading comprehension research / Cathy Roller -- Where to from here? : themes, trends, and questions / Gerald G. Duffy ... [et al.]. 0
Author: edited by Susan E. Israel, Gerald G. Duffy.
Library: Library of Islamic Parliament (Tehran)
Subject:
885. The second economy :
Author: Steve Grobman, Allison Cerra ; foreword by Christopher Young
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Internet-- Security measures.
Classification :
QA76
.
9
.
A25
886. The second economy :
Author: Steve Grobman, Allison Cerra ; foreword by Christopher Young
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes,Computer networks-- Security measures,Computer security,Cyberspace-- Security measures,Cyberterrorism
Classification :
TK5105
.
59
887. The secure information society
Author: Jörg Krüger, Bertram Nickolay, Sandro Gaycken, editors
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Law and legislation,Computer networks-- Security measures,Computer security,Computer security-- Government policy,Computer security-- Law and legislation
Classification :
QA76
.
9
.
A25
S43
2013
888. The superpowers -- "The Arabs are coming!" -- "Jihad!" -- The co-opted caliphate and the stumbling Jihad -- The year 711 -- Picking up the pieces after Rome -- The myth of Poitiers -- The fall and rise of the Umayyads -- Saving the popes -- An empire of force and faith -- Carolingian Jihads: Roncesvalles and Saxony -- The great mosque -- The first Europe, briefly -- Equipoise--delicate and doomed -- Disequilibrium Pelayo's revenge -- Knowledge transmitted, rationa
Author: David Levering Lewis.
Library: Library of Islamic Parliament (Tehran)
Subject:
889. The tangled Web :
Author: Michal Zalewski.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Browsers (Computer programs),Computer networks-- Security measures.,Computer security.
Classification :
TK
5105
.
59
.
Z354
2012
890. Theoretical and experimental methods for defending against DDoS attacks
Author: Mohammad Reza Khalifeh Soltanian, Iraj Sadegh Amiri (University of Malaya, Kuala Lumpur, Malaysia) ; Matthew Neely, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Denial of service attacks.
891. Theoretical and experimental methods for defending against DDoS attacks
Author: Khalifeh Soltanian, Mohammad Reza
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,، Denial of service attacks
Classification :
TK
5105
.
59
.
K45T4
892. Threat modeling
Author: Adam Shostack
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computer software-- Development
Classification :
QA76
.
9
.
A25
S495
2014
893. Toward a safer and more secure cyberspace /
Author: Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Cyberterrorism-- Prevention.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Cyberterrorism-- Prevention.
Classification :
QA76
.
9
.
A25
T695
2007eb
894. Transactions on computational science XVIII
Author: Marina L. Gavrilova, C.J. Kenneth Tan, Arjan Kuijper (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer science,Sensor networks
Classification :
QA76
.
T73
2013
895. Transformational security awareness :
Author: Perry Carpenter.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,BUSINESS & ECONOMICS-- Production & Operations Management.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Operating Systems-- General.
Classification :
QA76
.
9
.
A25
C37
2019eb
896. Transforming cybersecurity using COBIT 5
Author: [by ISACA].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises -- Computer networks -- Security measures.,COBIT (Information technology management standard),Computer security.
897. Tribe of Hackers :
Author: Marcus J. Carey & Jennifer Jin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,Computers.,Data protection.,Risk management.,Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Security-- Cryptography.,Computers.,Data protection.,Risk management.
Classification :
HF5548
.
37
C37
2019eb
898. Trust in cyberspace /
Author: Fred B. Schneider, editor ; Committee on Information Systems Trustworthiness, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Internet-- Security measures.,Telecommunication policy-- United States.,Computer Security.,Internet.,Public Policy.,Telecommunications.,BUSINESS & ECONOMICS-- Industries-- Media & Communications.,Computer networks-- Security measures.,COMPUTERS.,Electrical & Computer Engineering.,Engineering & Applied Sciences.,Internet / Security.,Internet-- Security measures.,Internet.,Sicherheit,TECHNOLOGY & ENGINEERING-- Telecommunications.,Telecommunication policy.,Telecommunications.,Telekommunikationspolitik,Verteiltes System,United States.,USA., 7, 7
Classification :
TK5105
.
59
.
T78
1999eb
899. Trust management VII :
Author: Carmen Fernández-Gago [and others] (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
C376
2013
900. Trust on the world wide web :
Author: Jennifer Golbeck.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,World Wide Web-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,World Wide Web-- Security measures.
Classification :
QA76
.
9
.
A25
G625
2008eb