21. Detection of intrusions and malware, and vulnerability assessment
Author: Ulrich Flegel, Danilo Bruschi (eds.)
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computers, Access control, Congresses,Computers, Access control, Evaluation, Congresses,Computer networks, Security measures, Congresses,Computer security, Congresses,Malware (Computer software), Congresses,Eindringerkennung, Kongress, Como <2009>,Kryptoanalyse, Kongress, Como <2009>,Malware, Kongress, Como <2009>,Softwareschwachstelle, Kongress, Como <2009>,Zugriffskontrolle, Kongress, Como <2009>,Como (2009), swd,Kongress., swd,Eindringerkennung., swd,Kryptoanalyse., swd,Malware., swd,Softwareschwachstelle., swd,Zugriffskontrolle., swd
Classification :
QA
،
76
.
9
،.
A25
,
D563
،
2009
22. Detection of intrusions and malware, and vulnerability assessment
Author: / Klaus Julisch, Christopher Kruegel (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computers--Access control--Congresses,Computers--Access control--Evaluation--Congresses,Computer networks--Security measures--Congresses,Computer security--Congresses,Intrusions,Malware,Vulnerability assessment,DIMVA
Classification :
QA
,
76
.
9
,.
A25
,
D563
,
2005
23. Detection of intrusions and malware, and vulnerability assessment : Second International Conference, DIMVA 2005, Vienna, Austria, July 7-8, 2005 : proceedings
Author: Klaus Julisch, Christopher Kruegel )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computers -- Access control,Evaluation -- Congresses ، Computers -- Access control,Congresses ، Computer networks -- Security measures,Congresses ، Computer security
Classification :
QA
76
.
L28
Vol
.
3548
24. Ethical hacking and countermeasures /
Author: EC-Council Council.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Secuity measures-- Examinations, Study guides.,Computers-- Access control-- Examinations, Study guides.,Electronic data processing personnel-- Certification.,Penetration testing (Computer security),Telecommunications engineers-- Certification.
Classification :
QA76
.
9
.
A25
E865
2010
25. Firewalls 24seven
Author: / Matthew Strebe, Charles Perkins
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Computers , Access control,Firewalls (Computer security)
Classification :
E-BOOK
26. Formal correctness of security protocols
Author: Bella, Giampaolo
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer security,، Computers-- Access control,، Cryptography,، Computer networks-- Security measures
Classification :
QA
76
.
9
.
A25
.
B44
2007
27. Formal models and techniques for analyzing security protocols
Author: edited by Veronique Cortier and Steve Kremer
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: ، Computer security,Access control ، Computers,Security measures ، Computer networks,Access control ، Electronic information resources
Classification :
QA
76
.
9
.
A25
F6563
28. Formal models and techniques for analyzing security protocols /
Author: edited by Véronique Cortier and Steve Kremer
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Electronic information resources-- Access control
Classification :
QA76
.
9
.
A25
F654
2011
29. Guide to computer network security /
Author: Joseph Migga Kizza.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Business & Economics-- Information Management.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- System Administration-- Storage & Retrieval.,Data mining.,Information architecture.,Information retrieval.,Network hardware.
Classification :
TK5105
.
59
30. Hack proofing Windows 2000 /
Author: Chad Todd ; Norris L. Johnson, Jr., technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer Science.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Engineering & Applied Sciences.
Classification :
QA76
.
9
.
A25
T63
2001eb
31. Hands-on security in DevOps :
Author: Tony Hsu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control.,Computer networks-- Security measures.,Information technology-- Management.,Computer networks-- Access control.,Computer networks-- Security measures.,COMPUTERS-- Security-- General.,Information technology-- Management.
Classification :
HD30
.
2
32. How to cheat at securing Linux /
Author: Mohan Krishnamurthy [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Linux.,Linux.,Linux.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
TK5105
.
59
.
H683
2008eb
33. Identity and access management
Author: Ertem Osmanoglu
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,False personation-- Prevention
Classification :
QA76
.
9
.
A25
O783
2013
34. Information processing and security system
Author: / edited by Khalid Saeed, Jerzy Peja??
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Information storage and retrieval systems--Security measures,Computers--Access control
Classification :
TK
,
5105
.
59
,.
I525
,
2005
35. Information processing and security systems
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ; Information storage and retrieval systems ; Security measures. ; Computers ; Access control. ;
36. Information security and privacy :
Author: Julian Jang-Jaccard, Fuchun Guo (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computers-- Access control, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
A279
2019eb
37. Instant penetration testing
Author: Vyacheslav Fadyushin
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computers-- Access control,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
F33
2013
38. Integrated security systems design : a complete reference for building enterprise-wide digital security systems
Author: Norman, Thomas L.
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,، Computers -- Access control,Security measures ، Information storage and retrieval systems
Classification :
TK
5105
.
5
.
N67I5
2014
39. Internet and Intranet security
Author: Oppliger, Rolf
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Internet )Computer network( - Security measures , Intranets )Computer networks( - Security measures , Computers - Access control , TCP/IP )Computer network protocol(
Classification :
TK
5105
.
875
.
I57
O67
1998
40. Internet and Intranet security
Author: / Rolf Oppliger
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Internet- Security measures,Intranets (Computer networks)- Security measures,Computers- Access control,TCP/IP (Computer network protocol)
Classification :
TK5105
.
875
.
I57
,
O67
1998