143. Pluggable authentication modules
Author: Kenneth Geisshirt
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Software,Computer security, Software
Classification :
QA76
.
76
.
O63
.
G458
2007


144. Pro PHP security
Author: Chris Snyder, Thomas Myer, Michael Southwell
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: PHP (Computer program language), Handbooks, manuals, etc,Web site development, Security measures, Handbooks, manuals, etc,Web sites, Security measures, Handbooks, manuals, etc,PHP (Computer language), sears,Internet software., sears,Computer networks, Security measures., sears
Classification :
QA
،
76
.
73
،.
P224
,
S59
،
2010


145. Pro Spring security /
Author: Carlo Scarioni ; technical reviewer, Manuel Jordan Elera
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Application software-- Development.,Application software-- Security measures.,Computer networks-- Security measures.,Java (Computer program language),Web site development.
Classification :
QA76
.
76
.
D47
S32
2013eb


146. Pro Spring security /
Author: Carlo Scarioni ; technical reviewer, Manuel Jordan Elera
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Application software-- Development.,Application software-- Security measures.,Computer networks-- Security measures.,Java (Computer program language),Web site development.
Classification :
QA76
.
76
.
D47
S32
2013eb


147. Risks and Security of Internet and Systems :
Author: edited by Nora Cuppens, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquin Garcia-Alfaro.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Internet-- Security measures, Congresses.,Artificial intelligence.,Artificial intelligence.,Coding theory & cryptology.,Computer science.,Computers-- Expert Systems.,Computers-- Information Technology.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Computers, Special purpose.,Computers.,Data encryption (Computer science),Expert systems-- knowledge-based systems.,Information retrieval.,Information technology: general issues.,Software engineering.,Software Engineering.
Classification :
QA76
.
758
I58
2017


148. SELinux by exampl
Author: / Frank Mayer, Karl MacMillan, David Caplan
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Linux.,Operating systems (Computers),Computer networks--Security measures
Classification :
QA
,
76
.
76
,.
O63
,
M3738
,
2006


150. Secure group communications over data networks
Author: / Xukai Zou, Byrav Ramamurthy, Spyros S. Magliveras
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Computer security,Computer network protocols,Electronic books. , local
Classification :
E-BOOK

151. Security and trust management :
Author: Sokratis K. Katsikas, Cristina Alcaraz (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer programming-- software development.,Computer security.,Computer security.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Computers-- Programming-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Information retrieval.,Information technology: general issues.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25
S76
2018


152. Security for service oriented architectures
Author: Williams, Walter,Walter Williams
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Service-oriented architecture )Computer science(,Security measures ، Computer networks,، Computer security,، COMPUTERS / Software Development & Engineering / General,، COMPUTERS / Security / General,، COMPUTERS / Internet / General
Classification :
TK
5105
.
5828
.
W5


153. Security intelligence :
Author: Qing Li, Gregory Clark
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Electronic information resources-- Access control.,Computer networks-- Security measures. World Wide Web-- Security measures.,Computer science.,Network security.
Classification :
TK5105
.
59


154. Security software developmen
Author: / Douglas A. Ashbaugh
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Application software--Development,Computer networks--Security measures,Electronic books.
Classification :
QA
,
76
.
9
,.
A25
,
A8246
,
2009eb


155. Security software development :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Application software ; Development. ; Computer networks ; Security measures. ; Application software ; Development. ; fast ; (OCoLC)fst00811707 ; Computer networks ; Security measures. ; fast ; (OCoLC)fst00872341 ; Computer security. ;

156. Security software development
Author: / Douglas A. Ashbaugh
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security.,Application software--Development,Computer networks--Security measures

157. Security software development. assessing and managing security risks
Author: Ashbaugh, Douglas A.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Application software- Development,، Computer networks- Security measures
Classification :
QA
76
.
9
.
A25
A8246
2009


158. Special op
Author: / by Erik Pace Birkholz
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Firewalls (Computer security),Computer networks, Security measures,Computer network architectures,Electronic books., local
Classification :
TK5105
.
59
.
B498
2003


159. The art of software security assessment
Author: / Mark Dowd, John McDonald, and Justin Schuh
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer software- Development,Computer networks- Security measures
Classification :
QA76
.
9
.
A25
,
D75
2007


160. The official (ISC)² CISSP CBK reference /
Author: John Warsinkse ; with Mark Graff, Kevin Henry, Christopher Hoover, Ben Malisow, Sean Murphy, C. Paul Oakes, George Pajari, Jeff T. Parker, David Seidl, Mike Vasquez.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Administrative agencies-- Information resources management-- Security measures-- United States-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations, Study guides.,Computers-- Access control-- Examinations, Study guides.,Telecommunications engineers-- Certification-- United States.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer networks-- Security measures-- Examinations.,Telecommunications engineers-- Certification.,United States., 7
Classification :
TK5105
.
59

