421. Security protocols : 7th International Workshop, Cambridge, UK, April 19-21, 1999 : proceedings
Author: Bruce Christianson...]et al.[, )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computers -- Access control,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
1796


422. Security protocols : 9th International Workshop, Cambridge, UK, April 25-27, 2001 : proceedings
Author: Bruce Christianson...]et al.[ )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computers -- Access control,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
2467


423. Security protocols : 11th International Workshop, Cambridge, UK, April 2-4, 2003 : revised selected papers
Author: Bruce Christianson...]et al.[
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computers -- Access control,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
3364


424. Security protocols: 5th International Workshop, Paris, France, April 7-9, 1997: proceedings
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer security-- Congresses,، Computers-- Access control-- Congresses,، Cryptography-- Congresses
Classification :
QA
76
.
9
.
A25
.
S44
1998


425. Security protocols : 5th International Workshop, Paris, France, April 7-9, 1997 : proceedings
Author: Mark Lomas ]et al.[ )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computers -- Access control,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
1361


426. Security protocols : 6th International workshop, Cambridge, UK, April 1998 : proceedings
Author: Bruce Christianson...]et al.[ )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computers -- Access control,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
1550


427. Security protocols : 8th international workshop, Cambridge, UK, April 3-5, 2000 : revised papers
Author: Bruce Christianson ... ]et al.[ )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computers -- Access control,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
2133


428. Security protocols : 10th international workshop, Cambridge, UK, April 17-19, 2002 : revised papers
Author: Bruce Christianson...]et al.[ )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computers -- Access control,Congresses ، Cryptography
Classification :
QA
76
.
L28
Vol
.
2845


429. Snor
Author: / featuring Jay Beale and members of the Snort team, Andrew R. Baker, Joel Esler
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Snort (Computer file),Computer networks--Security measures,Computers--Access control,Computer security.
Classification :
TK
,
5105
.
59
,.
B42
,
2007


430. Snort
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Snort (Software) ; Intrusion detection systems (Computer security) ; Computers ; Access control. ; Computer security. ;

431. Snort
Author: / featuring Jay Beale and members of the Snort team, Andrew R. Baker, Joel Esler
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computers- Access control,Computer security,Snort (Computer file)
Classification :
TK5105
.
59
.
B42
2007


432. Snort
Author: / featuring Jay Beale and members of the Snort team, Andrew R. Baker, Joel Esler
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks- Security measures,Computers- Access control,Computer security,Snort (Computer file)
Classification :
E-BOOK

433. Snort 2.1 Intrusion Detection
Author: Featuring the Snort Development Team Andrew R. Baker, Brian Caswell, Mike Poor
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Computer networks- Security measures,Computers- Access control,Computer security,Snort (Computer file)
Classification :
TK
,
5105
.
59
,.
B42S7
,
2004


434. Snort cookbook
Author: / Angela Orebaugh, Simon Biles and Jacob Babbin
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computers- Access control
Classification :
TK5105
.
59
.
O785
2005


435. Snort for Dummies
Author: \ by Charlie Scott, Paul Wolfe, and Bert Hayes
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks--Security measures,Computer security,Computers--Access control,شبکههای کامپیوتری -- تدابیر ایمنی,امنیت رایانهای,کامپیوترها -- کنترل دستیابی
Classification :
E-Book
,

436. Snort for dummies
Author: / by Charlie Scott, Paul Wolfe, and Bert Hayes
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computers- Access control
Classification :
TK5105
.
59
.
S388
2004


437. Snort for dummies
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ; Computer security. ; Computers ; Access control. ; Snort (Software) ; fast ; (OCoLC)fst01792875 ; Intrusion detection systems (Computer security) ; fast ; (OCoLC)fst01762593 ;

438. Superkey: version 1.0: owner's handbook
Author:
Library: National Library and Archives of Islamic Republic of Iran (Tehran)
Subject: Electronic data processing - Keyboarding,Computers - Access control,Superkey (Computer program)
Classification :
QA76
.
9
.
K48
,
S86
1985


439. Tableaux de bord de la sécurité réseau /
Author: Cédric Llorens, Laurent Levier, Denis Valois ; avec la contribution de Olivier Salvatori.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computers-- Access control.,Réseaux d'ordinateurs-- Sécurité-- Mesures, Cas, Études de.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Computer networks-- Security measures.,Computers-- Access control.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
L56
2006eb


440. Technology and Practice of Passwords
Author: \ [Edited by] Frank Stajano...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computers -- Access control -- Passwords -- Congresses.,Computers -- Access control -- Passwords., کامپیوترها -- کنترل دستیابی -- پسووردها -- کنگره ها,کامپیوترها -- کنترل دستیابی -- پسووردها
Classification :
QA
76
.
9
.
T4
2016
E-Book
,

