41. Intrusion detection with Snort
پدیدآورنده :
کتابخانه: Central Library and Documents Center of Mazandaran University (Mazandaran)
موضوع : Computer networks ; Security measures ; Computer security ; Computers ; Access control ;
42. Intrusion detection with Snort
پدیدآورنده : / Jack Koziol
کتابخانه: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
موضوع : Computer networks- Security measures,Computer security,Computers- Access control
رده :
TK5105
.
59
.
K69
2003
43. Intrusion detection with Snort /
پدیدآورنده : Jack Koziol.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
رده :
TK5105
.
59
.
K69
2003eb
44. Kali Linux, an ethical hacker's cookbook : end-to-end penetration testing solutions
پدیدآورنده : Sharma, Himanshu
کتابخانه: Library of Institute for Research in Fundamental Sciences (Tehran)
موضوع : ، Penetration testing )Computer security(,، Computer security,، Computers -- Access control,، Computer networks -- Security measures
رده :
QA
76
.
9
.
A25S522
45. Kali Linux network scanning cookbook
پدیدآورنده : Justin Hutchens
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures,Computer security,Computers-- Access control,Penetration testing (Computer security)
رده :
QA76
.
9
.
A25
H883
2014
46. Managing security with Snort and IDS tools
پدیدآورنده : / Kerry Cox and Christopher Gerg
کتابخانه: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
موضوع : Snort (Computer file),Computer security,Computers- Access control,Computer networks- Security measures
رده :
E-BOOK
47. Managing security with Snort and IDS tools
پدیدآورنده : / Kerry Cox and Christopher Gerg
کتابخانه: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
موضوع : Snort (Computer file),Computer security,Computers- Access control,Computer networks- Security measures
رده :
TK5105
.
59
.
C65
2004
48. Metasploit
پدیدآورنده : by David Kennedy ... [et al.]
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures-- Testing,Computers-- Access control,Open source software,Penetration testing (Computer security)
رده :
QA76
.
9
.
A25
M4865
2011
49. Metasploit Penetration Testing Cookbook :
پدیدآورنده :
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures.,Computer security-- Management.,Computers-- Access control.,Data protection.,Information technology-- Security measures.,Computer networking & communications.,Computer networks-- Security measures.,Computer security-- Management.,Computer security.,Computers-- Access control.,Computers-- Networking-- Security.,Computers-- Security-- General.,Computers-- System Administration-- General.,Data protection.,Information technology-- Security measures.,Network security.
رده :
QA76
.
9
.
A25
.
T459
2018eb
50. Metasploit penetration testing cookbook
پدیدآورنده :
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures-- Testing,Computers-- Access control,Penetration testing (Computer security)
رده :
QA76
.
9
.
A25
S56
2012
51. Metasploit penetration testing cookbook
پدیدآورنده : Monika Agarwal, Abhinav Singh
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures-- Testing,Computers-- Access control,Penetration testing (Computer security)
رده :
QA76
.
9
.
A25
A34
2013
52. Network security assessment
پدیدآورنده : / Chris McNab
کتابخانه: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
موضوع : Computers- Access control- Evaluation,Computer networks- Security measures- Evaluation
رده :
QA76
.
9
.
A25
,
M4355
2008
53. Network security assessment
پدیدآورنده : / Chris McNab
کتابخانه: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
موضوع : Computers- Access control- Evaluation,Computer networks- Security measures- Evaluation
رده :
QA76
.
9
.
A25
,
M4355
2004
54. Network security tools
پدیدآورنده : Dhanjani, Nitesh
کتابخانه: Library of Institute for Research in Fundamental Sciences (Tehran)
موضوع : ، Computer security,، Computer networks -- Security measures,، Computers -- Access control
رده :
QA
76
.
9
.
A25D486
55. Network security tools
پدیدآورنده : Dhanjani, Nitesh
کتابخانه: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
موضوع : ، Computer security,Security measures ، Computer networks,Access control ، Computers
رده :
QA
76
.
9
.
A25
D523
2005
56. Network security tools
پدیدآورنده : / Nitesh Dhanjani and Justin Clarke
کتابخانه: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
موضوع : Computer security,Computer networks- Security measures,Computers- Access control
رده :
QA76
.
9
.
A25
,
D523
2005
57. OpenAM
پدیدآورنده : Indira Thangasamy
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Access control,Computers-- Access control,Electronic commerce-- Security measures
رده :
QA76
.
9
.
A25
T43
2011
58. Oracle Identity and Access Manager 11g for administrators
پدیدآورنده : Atul Kumar
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures,Computer security,Computers-- Access control,Database security
رده :
QA76
.
9
.
A25
K863
2011
59. Outsourcing information security
پدیدآورنده : / C. Warren Axelrod
کتابخانه: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
موضوع : Computer networks, Security measures, United States,Computers, Access control, United States,Data encryption (Computer science)
رده :
QA76
.
9
.
A25
,
A88
2004
60. Outsourcing information security
پدیدآورنده : / C. Warren Axelrod
کتابخانه: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
موضوع : Computer networks- Security measures United States,Computers- Access control United States,Data encryption (Computer science)
رده :
QA76
.
9
.
A25
,
A88
2004