181. How open source ate software :
Author: Gordon Haff.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Open source software.,Computer programming-- software development.,COMPUTERS-- Software Development & Engineering-- General.,Open source software.
Classification :
QA76
.
76
.
S46
182. How to cheat at Microsoft Vista administration
Author: / Jan Kanclirz Jr., technical editor
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Microsoft Windows (Computer file) Handbooks, manuals, etc,Operating systems (Computers) Handbooks, manuals, etc
Classification :
QA76
.
76
.
O63
,
H6857
2007
183. How to cheat at managing information security /
Author: Mark Osborne ; Paul M. Summitt, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management.,Information technology-- Security measures.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25
O83
2006eb
184. How to cheat at securing Linux /
Author: Mohan Krishnamurthy [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Linux.,Linux.,Linux.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
TK5105
.
59
.
H683
2008eb
185. Human-computer interaction :
Author: Masaaki Kurosu (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Human-computer interaction, Congresses.,Artificial intelligence.,Computer security.,Computers-- Computer Graphics.,Computers-- Expert Systems.,Computers-- Hardware-- Network Hardware.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Computers-- User Interfaces.,Expert systems-- knowledge-based systems.,Human-computer interaction.,Image processing.,Network hardware.,User interface design & usability.
Classification :
QA76
.
9
.
H85
186. Human-computer interaction and cybersecurity handbook /
Author: edited by Abbas Moallem
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention, Handbooks, manuals, etc.,Computer networks-- Security measures, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Technology and international relations.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Technology and international relations.
Classification :
TK5105
.
59
.
H86
2019eb
187. ICCCE 2018 :
Author: Amit Kumar, Stefan Mozar, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks, Congresses.,Cooperating objects (Computer systems), Congresses.,Internet of things, Congresses.,Artificial Intelligence (incl. Robotics).,Communications Engineering, Networks.,Computer Imaging, Vision, Pattern Recognition and Graphics.,Engineering.,Microwaves, RF and Optical Engineering.,Signal, Image and Speech Processing.,Wireless and Mobile Communication.,Artificial intelligence.,Communications engineering / telecommunications.,Computer networks.,Computer vision.,COMPUTERS / Computer Literacy.,COMPUTERS / Computer Science.,COMPUTERS / Data Processing.,COMPUTERS / Hardware / General.,COMPUTERS / Information Technology.,COMPUTERS / Machine Theory.,COMPUTERS / Reference.,Cooperating objects (Computer systems),Imaging systems & technology.,Internet of things.,Microwave technology.,WAP (wireless) technology.
Classification :
TK5105
.
5
188. ISA server and beyond :
Author: Thomas W. Shinder, Debra Littlejohn Shinder ; Martin Grasdal, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Microsoft ISA server.,Microsoft ISA server.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
TK5105
.
59
.
S55
2002eb
189. (ISC)² CISSP certified information systems security professional official study guide /
Author: Mike Chapple, James Michael Stewart, Darril Gibson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Examinations, Study guides.,Electronic data processing personnel-- Certification.,Telecommunications engineers-- Certification.,Computer networks-- Security measures-- Examinations.,Computer security-- Examinations.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Electronic data processing personnel-- Certification.,Telecommunications engineers-- Certification.
Classification :
QA76
.
3
.
C4255
2018
190. IT governance :
Author: Alan Calder & Steve Watkins.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Business enterprises-- Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.
Classification :
QA76
.
9
.
A25
C342
2008eb
191. IT manager's handbook /
Author: Bill Holtsnider, Brian D. Jaffe.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Industrial management-- Data processing.,Information technology-- Management.,Management information systems.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Industrial management-- Data processing.,Information technology-- Management.,Management information systems.
Classification :
HD30
.
2
.
H657
2010eb
192. Incident response & computer forensics /
Author: Chris Prosise, Kevin Mandia.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation.,Computer security.,Forensic sciences.,Computer crimes-- Investigation.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Forensic sciences.
Classification :
QA76
.
9
.
A25
P76
2003eb
193. Industrial cybersecurity :
Author: Pascal Ackerman.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Automatic machinery-- Security measures.,Computer networks-- Security measures.,Computer security.,Process control-- Security measures.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Networking.,COMPUTERS-- System Administration-- General.
Classification :
TS156
.
8
194. Information Security :
Author: edited by Ali Ismail Awad and Michael Fairhurst.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Security systems.,Computer security.,COMPUTERS-- Security-- General.,Data protection.,security of data.,Security systems.
Classification :
QA76
.
9
.
A25
I56
2018eb
195. Information Technology Control and Audit.
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Information technology.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Information technology.
Classification :
T58
.
5
196. Information Technology -- New Generations :
Author: Shahram Latifi, editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science, Congresses.,Electrical engineering.,Information technology, Congresses.,Algorithms & data structures.,Computer science.,Computer security.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Electrical engineering.,Information retrieval.,Information technology.
Classification :
QA75
.
5
197. Information and Communication Technology for Competitive Strategies :
Author: Simon Fong, Shyam Akashe, Parikshit N. Mahalle, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science, Congresses.,Information technology, Congresses.,Telecommunication, Congresses.,Communications Engineering, Networks.,Computational Intelligence.,Data Mining and Knowledge Discovery.,Engineering.,Artificial intelligence.,Communications engineering / telecommunications.,Computer science.,COMPUTERS / Computer Literacy.,COMPUTERS / Computer Science.,COMPUTERS / Data Processing.,COMPUTERS / Hardware / General.,COMPUTERS / Information Technology.,COMPUTERS / Machine Theory.,COMPUTERS / Reference.,Data mining.,Information technology.,Telecommunication.
Classification :
T58
.
5
198. Information and communications security :
Author: David Naccache [and 7 more] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Telecommunication systems-- Security measures, Congresses.,Algorithms & data structures.,Computer networking & communications.,Computer security.,Computers-- Hardware-- General.,Computers-- Information Theory.,Computers-- Online Services-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Information technology: general issues.,Software Engineering.,Telecommunication systems-- Security measures.
Classification :
QA76
.
9
.
A25
199. Information assurance :
Author: Joseph G. Boyce, Dan W. Jennings.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.
Classification :
QA76
.
9
.
A25
B69
2002eb
200. Information assurance :
Author: [edited by] Yi Qian [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Reliability.,Computer networks-- Security measures.,Computer security.,Computer networks-- Reliability.,Computer networks-- Reliability.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
TK5105
.
59
.
I5247
2008eb