21. Enterprise Information Systems II
Author: edited by Bernadette Sharp, Joaquim Filipe, José Cordeiro.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Data structures (Computer science),Software engineering.
Classification :
T58
.
6
E358
2001


22. From database to cyber security :
Author: Pierangela Samarati, Indrajit Ray, Indrakshi Ray (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Databases.,Computer security.,Databases.
Classification :
QA76
.
9
.
A25


23. Google hacking for penetration testers.dollar5Volume 2 /
Author: Johnny Long.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Google.,Google.,Google.,Computer networks-- Security measures.,Computer security.,Internet programming.,Internet-- Security measures.,Web search engines.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Online Services.,COMPUTERS-- System Administration-- Storage & Retrieval.,Internet programming.,Internet-- Security measures.,Web search engines.
Classification :
TK5105
.
885
.
G66
L66
2008eb


24. Hack proofing ColdFusion
Author: Greg Meyer ... [et al.].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: ColdFusion.,Computer networks-- Security measures.,Computer security.,Database design.,World Wide Web-- Security measures.

25. Hack proofing ColdFusion
Author: Greg Meyer ... [et al.].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: ColdFusion.,Computer networks-- Security measures.,Computer security.,Database design.,World Wide Web-- Security measures.

26. Hack proofing ColdFusion
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: ColdFusion. ; Computer networks ; Security measures. ; Computer security. ; Database design. ; World Wide Web ; Security measures. ;

27. Handbook of Database Security
Author: / edited by Michael Gertz,Sushil Jajodia
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Database security,Computer networks -- Security measures
Classification :
QA
76
.
9
.
D314H26
2008
R


28. Handbook of database security
Author:
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Database security -- Handbooks, manuals, etc,Computer networks -- Security measures -- Handbooks, manuals, etc
Classification :
QA
76
.
9
.
D314
H26
2007
R


29. Handbook of database security
Author: / edited by Michael Gertz, Sushil Jajodia
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Database security.,Computer networks--Security measures
Classification :
QA
,
76
.
9
,.
D314
,
H26
,
2008


30. Handbook of database security
Author:
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Database security,Computer networks- Security measures,Computersicherheit.- swd,Datenbanksystem.- swd
Classification :
QA
,
76
.
9
,.
D314
,
H36
,
2008


31. Handbook of database security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Database security. ; Computer networks ; Security measures. ; Computersicherheit. ; swd. ; Datenbanksystem. ; swd. ;

32. Handbook of database security : applications and trends
Author: edited by Michael Gertz, Sushil Jajodia
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Handbooks, manuals, etc ، Database security,Handbooks, manuals, etc ، Computer networks -- Security measures
Classification :
QA
76
.
9
.
D314H26


33. Hands-on cybersecurity with Blockchain :
Author: Rajneesh Gupta.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Blockchains (Databases),Computer networks-- Security measures.,Computer security.,Database security.,Denial of service attacks.,Blockchains (Databases),Computer networks-- Security measures.,Computer security.,Computer security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Online Safety & Privacy.,Data capture & analysis.,Database security.,Denial of service attacks.,Network security.
Classification :
QA76
.
9
.
A25
G87
2018


34. Honeypots :a new paradigm to information security
Author: Joshi, R. C.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Hackers,، Firewalls )Computer security(,Security measures ، Computer networks,Security measures ، Wireless communication systems
Classification :
QA
76
.
9
.
A25
J66
2011


35. How to cheat at designing security for a Windows Server 2003 network
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Database security,، Computer networks-- Security measures,، Computer security
Classification :
TK
5105
.
59
.
H69
2006


36. Information security applications
Author: Dong Hoon Lee, Moti Yung (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Database security, Congresses
Classification :
QA76
.
9
.
A25
W57
2012eb


37. Information security in research and business :
Author: edited by Louise Yngström, Jan Carlsen.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business -- Data processing -- Security measures -- Congresses.,Business -- Data processing -- Security measures.,Computer security -- Congresses.
Classification :
QA76
.
9
.
A25
E358
1997


38. Machine learning for computer and cyber security :
Author: editors, Brij B. Gupta, Michael Sheng.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence.,Computer networks-- Security measures-- Data processing.,Computer security-- Data processing.,Machine learning.,Artificial intelligence.,COMPUTERS-- Database Management-- Data Mining.,COMPUTERS-- General.,COMPUTERS-- Machine Theory.,Machine learning.,MATHEMATICS-- Arithmetic.
Classification :
TK5105
.
59


39. Metasploit Penetration Testing Cookbook :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Computers-- Access control.,Data protection.,Information technology-- Security measures.,Computer networking & communications.,Computer networks-- Security measures.,Computer security-- Management.,Computer security.,Computers-- Access control.,Computers-- Networking-- Security.,Computers-- Security-- General.,Computers-- System Administration-- General.,Data protection.,Information technology-- Security measures.,Network security.
Classification :
QA76
.
9
.
A25
.
T459
2018eb


40. Oracle Identity and Access Manager 11g for administrators
Author: Atul Kumar
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Database security
Classification :
QA76
.
9
.
A25
K863
2011

