121. Security in computing and communications :
Author: Sabu M. Thampi, Pradeep K. Atrey, Chun-I Fan, Gregorio Martinez Perez (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computers-- Access control, Congresses
Classification :
TK5105
.
59
.
S73
2013


122. Security information and event management )SIEM( implementation
Author: David R. Miller ... ]et al.[
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Computer networks,Access control ، Computers,، Application logging )Computer science(
Classification :
TK
5105
.
59
.
S4425
2011


123. Security information and event management (SIEM) implementation /
پدیدآورنده : David R. Miller ... [et al.]&
موضوع : Computer networks- Security measures,Computers- Access control,Application logging (Computer science)
۲ نسخه از این کتاب در ۲ کتابخانه موجود است.
124. Security information and event management (SIEM) implementation
Author: / David R. Miller ... [et al.]
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks, Security measures,Computers, Access control,Application logging (Computer science)
Classification :
TK5105
.
59
.
S4425
2011


125. Security intelligence :
Author: Qing Li, Gregory Clark
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Electronic information resources-- Access control.,Computer networks-- Security measures. World Wide Web-- Security measures.,Computer science.,Network security.
Classification :
TK5105
.
59


126. Security intelligence :a practitioner's guide to solving enterprise security challenges
Author: Li, Qing
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Access control ، Electronic information resources,Security measures ، Computer networks,، Computer security,Access control ، Electronic information resources
Classification :
TK
5105
.
59
.
L52


127. Security mechanisms for computer networks
Author: / Sead Muftic, P. Christofferson ... [et all]
Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)
Subject: Computers - Access control,Computer networks - Security measures
Classification :
QA76
.
9
.
A25M84
1989


128. Security technology
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ; Computer networks ; Access control ; Congresses. ; Computer networks ; Security measures ; Congresses. ;

129. Security technology
Author: / Dominik aSl?ezak ... [et al.] (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Computer networks--Access control--Congresses,Computer networks--Security measures--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
S374
,
2009


130. Security technology, disaster recovery and business continuit
Author: / Tai-hoon Kim ... [et al.], (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Computer networks--Security measures--Congresses,Computer networks--Access control--Congresses,Data protection--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
S374
,
2010


131. Security technology, disaster recovery and business continuity
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ; Computer networks ; Security measures ; Congresses. ; Computer networks ; Access control ; Congresses. ; Data protection ; Congresses. ;

132. Security threat mitigation and response
Author: / Dale Tesch and Greg Abelar
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer networks- Access control,Computer security- Evaluation,Electronic countermeasures,Firewalls (Computer security),Internet- Security measures
Classification :
TK5105
.
59
.
T47
2007


133. Snor
Author: / featuring Jay Beale and members of the Snort team, Andrew R. Baker, Joel Esler
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Snort (Computer file),Computer networks--Security measures,Computers--Access control,Computer security.
Classification :
TK
,
5105
.
59
,.
B42
,
2007


134. Snort
Author: / featuring Jay Beale and members of the Snort team, Andrew R. Baker, Joel Esler
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computers- Access control,Computer security,Snort (Computer file)
Classification :
TK5105
.
59
.
B42
2007


135. Snort
Author: / featuring Jay Beale and members of the Snort team, Andrew R. Baker, Joel Esler
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks- Security measures,Computers- Access control,Computer security,Snort (Computer file)
Classification :
E-BOOK

136. Snort 2.1 Intrusion Detection
Author: Featuring the Snort Development Team Andrew R. Baker, Brian Caswell, Mike Poor
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Computer networks- Security measures,Computers- Access control,Computer security,Snort (Computer file)
Classification :
TK
,
5105
.
59
,.
B42S7
,
2004


137. Snort cookbook
Author: / Angela Orebaugh, Simon Biles and Jacob Babbin
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computers- Access control
Classification :
TK5105
.
59
.
O785
2005


138. Snort for Dummies
Author: \ by Charlie Scott, Paul Wolfe, and Bert Hayes
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks--Security measures,Computer security,Computers--Access control,شبکههای کامپیوتری -- تدابیر ایمنی,امنیت رایانهای,کامپیوترها -- کنترل دستیابی
Classification :
E-Book
,

139. Snort for dummies
Author: / by Charlie Scott, Paul Wolfe, and Bert Hayes
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computers- Access control
Classification :
TK5105
.
59
.
S388
2004


140. Snort for dummies
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ; Computer security. ; Computers ; Access control. ; Snort (Software) ; fast ; (OCoLC)fst01792875 ; Intrusion detection systems (Computer security) ; fast ; (OCoLC)fst01762593 ;
