1. Guide to computer network security
Author: Joseph Migga Kizza
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control,Computer networks-- Security measures
Classification :
TK5105
.
59
2. Honeypot
Author: / R.C. Joshi, Anjali Sardana
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security.,Computer hackers.,Firewalls (Computer security),Computer networks--Security measures,Wireless communication systems--Security measures
Classification :
QA76
.
9
.
A25
,
J66
2011
3. Honeypots :
Author: R.C. Joshi, Anjali Sardana
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Firewalls (Computer security),Hackers,Wireless communication systems-- Security measures
Classification :
QA76
.
9
.
A25
4. Honeypots :a new paradigm to information security
Author: Joshi, R. C.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Hackers,، Firewalls )Computer security(,Security measures ، Computer networks,Security measures ، Wireless communication systems
Classification :
QA
76
.
9
.
A25
J66
2011