1. A multidisciplinary introduction to information security /
Author: [edited by] Stig F. Mjølsnes
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Multidisciplinary design optimization
Classification :
QA76
.
9
.
A25
M845
2012


2. Advanced monitoring in P2P botnets :
Author: Shankar Karuppayah.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control.,Computer networks-- Security measures.,Malware (Computer software),Peer-to-peer architecture (Computer networks),Computer networks-- Access control.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Networking-- General.,Malware (Computer software),Mathematical physics.,Network hardware.,Peer-to-peer architecture (Computer networks)
Classification :
TK5105
.
59
.
K37
2018


3. Advances in information and computer security :
Author: Tetsu Iwata, Masakatsu Nishigaki (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses,Computer security-- Congresses,Electronic information resources-- Access control-- Congresses
Classification :
QA76
.
9
.
A25
I58
2011


4. Advances in information and computer security
Author: / Isao Echizen, Noboru Kunihiro, Ryoichi Sasaki (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security, Congresses,Computer networks, Access control, Congresses,Computer networks, Security measures, Congresses
Classification :
QA76
.
9
.
A25I58
2010


5. Advances in security technology
Author: Haeng-kon Kim, Tai-hoon Kim, Akingbehin Kiumi (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses,Internet-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
S438
2008eb


6. Authentication systems for secure networks
Author: Oppliger, Rolf
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,، Computers -- Access control,، Authentication,، Cryptography
Classification :
TK
5105
.
59
.
O62


7. Authentication systems for secure networks
Author: Oppliger, Rolf.
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer networks - Security measures , Computers - Access control , Authentication , Cryptography
Classification :
TK
5105
.
59
.
O77
1996


8. BackTrack 5 wireless penetration testing
Author: Vivek Ramachandran
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Testing,Computers-- Access control,Penetration testing (Computer security),Wireless Internet-- Security measures
Classification :
TK5103
.
4885
R355
2011


9. Becoming the hacker :
Author: Adrian Pruteanu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Hacking.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Hacking.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25


10. Botnet detection
Author: edited by Wenke Lee, Cliff Wang and David Dagon.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses.,Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data protection, Congresses.

11. Building DMZs for Enterprise network
Author: / Robert J. Shimonski ... [et al.]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Access control,Computer networks--Security measures,Wide area networks (Computer networks)--Access
Classification :
TK
,
5105
.
5
,.
D59
,
2003eb


12. Building DMZs for Enterprise networks /
Author: Robert J. Shimonski [and others]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control.,Computer networks-- Security measures.,Wide area networks (Computer networks)-- Access.

13. Building DMZs for Enterprise networks
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Access control. ; Computer networks ; Security measures. ; Wide area networks (Computer networks) ; Access. ;

14. Building virtual pentesting labs for advanced penetration testing :
Author: Kevin Cardwell.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Testing.,Computers-- Access control.,Computer networks-- Monitoring.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.
Classification :
TK5105
.
59


15. Building virtual pentesting labs for advanced penetration testing :
Author: Kevin Cardwell.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Testing.,Computers-- Access control.,Computer networks-- Security measures.,COMPUTERS / Security / General.,Computers-- Access control.
Classification :
TK5105
.
59


16. Building virtual pentesting labs for advanced penetration testing :
Author: Kevin Cardwell.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Testing.,Computers-- Access control.,Computer networks-- Monitoring.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.
Classification :
TK5105
.
59


17. CCNP security SISAS 300-208 official cert guide /
Author: Aaron Woland, Kevin Redmon
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides,Computers-- Access control-- Examinations, Study guides,Electronic data processing personnel-- Certification, Study guides
Classification :
QA76
.
9
.
A25


18. Cisco IOS access lists
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Computer networks ; Access control ; Cisco IOS ;

19. Cisco IOS access lists
Author: / Jeff Sedayao
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Cisco IOS,Computer networks , Access control,Computer networks , Security measures,Electronic books. , local
Classification :
E-BOOK

20. Cisco IOS access lists
Author: / Jeff Sedayao
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: CISCO IOS.,Computer networks--Security measures,Computer networks--Access control
Classification :
TK
,
5105
.
59
,.
S444
,
2001

