61. Honeypot
Author: / R.C. Joshi, Anjali Sardana
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security.,Computer hackers.,Firewalls (Computer security),Computer networks--Security measures,Wireless communication systems--Security measures
Classification :
QA76
.
9
.
A25
,
J66
2011
62. Honeypots :
Author: R.C. Joshi, Anjali Sardana
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Firewalls (Computer security),Hackers,Wireless communication systems-- Security measures
Classification :
QA76
.
9
.
A25
63. Honeypots :a new paradigm to information security
Author: Joshi, R. C.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Hackers,، Firewalls )Computer security(,Security measures ، Computer networks,Security measures ، Wireless communication systems
Classification :
QA
76
.
9
.
A25
J66
2011
64. Host Identity Protocol )HIP( : towards the secure mobile Internet
Author: Gurtov, Andrei.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Security measures ، Wireless Internet,، Host Identity Protocol )Computer network protocol(
Classification :
TK
5103
.
4885
.
G87
2008
65. How to cheat at securing a wireless network
Author: Chris Hurley... ]at al.[
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Security measures ، Wireless communication systems,Handbooks, manuals, etc ، Computer networks -- Security measures
Classification :
TK
5103
.
2
.
H69
66. How to cheat at securing a wireless network
Author: / Chris Hurley ... [et al.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures , Handbooks, manuals, etc,Wireless communication systems , Security measures,Electronic books. , local
Classification :
E-BOOK
67. IT Convergence and Services
Author: James J. Park...[et al.], editors
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Information technology, Congresses,Wireless communication systems, Congresses
Classification :
T58
.
5
.
I58
2012
68. Information and communications security :
Author: Sihan Qing [and others] (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
I58
2011
69. Information assurance architecture /
Author: Keith D. WIllett.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Communication systems-- Management.,Computer networks-- Security measures.,Computer security.,Data protection.,Information resources management.,Information technology-- Management.,Business enterprises-- Communication systems-- Management.,Computer networks-- Security measures.,Computer security.,Data protection.,Information resources management.,Information technology-- Management.
Classification :
QA76
.
9
.
A25
W5487
2008
70. Information hiding in communication networks :
Author: Wojciech Mazurczyk...[et al.].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Data protection.
Classification :
QA76
.
9
.
A25
71. Information security and digital forensics :
Author: Dasun Weerasinghe (Ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation, Congresses.,Computer networks-- Access control, Congresses.,Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Internet-- Security measures, Congresses.,Computer crimes-- Investigation.,Computer networks-- Access control.,Computer networks-- Security measures.,Computer security.,Informatique.,Internet-- Security measures.
Classification :
QA76
.
9
.
A25
I584
2010
72. Internet and wireless security
Author: edited by Robert Temple and John Regnault
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Security measures ، Computer networks,Security measures ، Wireless communication systems
Classification :
TK
5105
.
59
.
I544
2002
73. Internet and wireless security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ; Wireless communication systems ; Security measures. ;
74. Internet and wireless security
Author: edited by Robert Temple and John Regnault
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,Security measures ، Wireless communication systems
Classification :
TK
5105
.
59
.
I578
75. Internet and wireless security
Author: / edited by Robert Temple and John Regnault
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Wireless communication systems- Security measures
Classification :
TK5105
.
59
.
I544
2002
76. Internet and wireless security
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer networks-- Security measures,، Internet-- Security measures,، Wireless communication systems-- Security measures
Classification :
TK
5105
.
59
.
I57
2002
77. Internet and wireless security
Author: / edited by Robert Tample and John Regnault
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Internet,Wireless communication systems- Security measures,Computer networks- Security measures
Classification :
TK5105
.
875
.
I57I45
2002
78. Internet and wireless security
Author: / edited by Robert Temple and John Regnault
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks- Security measures,Wireless communication systems- Security measures
Classification :
E-BOOK
79. Introduction to Cryptography
Author: Hans Delfs and Helmut Knebl
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Data encryption (Computer science),Wireless communication systems -- Security measures,Computer networks -- Security measures
Classification :
QA
،
76
.
9
،.
D34
,
I721
،
2007
80. Intrusion detection in wireless ad-hoc networks /
Author: edited by Nabendu Chaki, Rituparna Chaki
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Wireless communication systems-- Security measures
Classification :
TK5102
.
85
.
I57
2014