41. Firewalls 24seven
Author: / Matthew Strebe, Charles Perkins
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Computers , Access control,Firewalls (Computer security)
Classification :
E-BOOK

42. Formal correctness of security protocols
Author: Bella, Giampaolo
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer security,، Computers-- Access control,، Cryptography,، Computer networks-- Security measures
Classification :
QA
76
.
9
.
A25
.
B44
2007


43. Formal correctness of security protocols /Giampaolo Bella.
Author:
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer networks -- Security measures,Computer networks -- Access control,Computer network protocols
Classification :
QA
76
.
9
.
A25
2007


44. Formal models and techniques for analyzing security protocols
Author: edited by Veronique Cortier and Steve Kremer
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: ، Computer security,Access control ، Computers,Security measures ، Computer networks,Access control ، Electronic information resources
Classification :
QA
76
.
9
.
A25
F6563


45. Formal models and techniques for analyzing security protocols /
Author: edited by Véronique Cortier and Steve Kremer
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Electronic information resources-- Access control
Classification :
QA76
.
9
.
A25
F654
2011


46. Future of trust in computing
Author: David Gawrock... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
F888
2008eb


47. Global security, safety, and sustainability
Author: Hamid Jahankhani, Ali G. Hessami, Feng Hsu (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses,Data protection, Congresses,Internet-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
I344
2009eb


48. Guide to computer network security
Author: Joseph Migga Kizza
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control,Computer networks-- Security measures
Classification :
TK5105
.
59


49. Hacker's underground handbook :
Author: David Melnichuk.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Access control.,Computer networks -- Security measures.,Hackers.
Classification :
QA76
.
9
.
A25
D385
2010


50. Handbook of research on information security and assuranc
Author: / Jatinder N.D. Gupta, Sushil K. Sharma [editors]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Handbooks, manuals, etc,Electronic information resources--Access control--Handbooks, manuals, etc,Computer crimes--Prevention--Handbooks, manuals, etc
Classification :
TK
,
5105
.
59
,.
H353
,
2009


51. Handbook of research on information security and assurance
Author: / Jatinder N.D. Gupta, Sushil K. Sharma [editors]
Library: Insurance Research Institute Library (Tehran)
Subject: Computer networks, Security measures, Handbooks, manuals, etc,Electronic information resources, Access control, Handbooks, manuals, etc,Computer crimes, Prevention, Handbooks, manuals, etc
Classification :
TK5105
.
59
.
H
2009


52. Handbook of research on information security and assurance
Author: / Jatinder N.D. Gupta, Sushil K. Sharma [editors].
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer networks -- Security measures,Electronic information resources--Access control,Computer crimes--Prevention
Classification :
TK
5105
.
59
.
H353
2009
R


53. Handbook of research on information security and assurance
Author: Jatinder N.D. Gupta, Sushil K. Sharma ]editors[
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Handbooks, manuals, etc ، Computer networks -- Security measures,Access control -- Handbooks, manuals, etc ، Electronic information resources,Prevention -- Handbooks, manuals, etc ، Computer crimes
Classification :
TK
5105
.
59
.
H267


54. Handbook of research on information security and assurance
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Handbooks, manuals, etc ; Electronic information resources ; Access control ; Handbooks, manuals, etc ; Computer crimes ; Prevention ; Handbooks, manuals, etc ;

55. Hands-on security in DevOps :
Author: Tony Hsu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control.,Computer networks-- Security measures.,Information technology-- Management.,Computer networks-- Access control.,Computer networks-- Security measures.,COMPUTERS-- Security-- General.,Information technology-- Management.
Classification :
HD30
.
2


56. Identity and access management
Author: Ertem Osmanoglu
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,False personation-- Prevention
Classification :
QA76
.
9
.
A25
O783
2013


57. Implementing NAP and NAC security technologies :
Author: Daniel V. Hoffman.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols.,Computer networks -- Access control.,Computer networks -- Security measures.

58. Information security and privacy :
Author: Julian Jang-Jaccard, Fuchun Guo (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computers-- Access control, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
A279
2019eb


59. Instant penetration testing
Author: Vyacheslav Fadyushin
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computers-- Access control,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
F33
2013


60. Integrated security systems design : a complete reference for building enterprise-wide digital security systems
Author: Norman, Thomas L.
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,، Computers -- Access control,Security measures ، Information storage and retrieval systems
Classification :
TK
5105
.
5
.
N67I5
2014

