1. .....................
Author: Terry Bernstein...]et al.[
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Computer networks - Security measures ، Business enterprises,Security measures ، Internet )Computer network(,Security measures ، World Wide Web )Information retrieval system(,Security measures ، Electronic funds transfers,، Data encryption )Computer science(
Classification :
HD
30
.
38
.
I57
1996
2. A comprehensive guide to virtual private networks [electronic resource]
Author: / [Martin Murhammer ... [et al.]
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Extranets (Computer networks),Business enterprises--computer networks,Internet,Computer networks--Security measures
Classification :
EB
,
TK5105
.
875
.
E87
,
C65
1998
3. A guide to computer network securit
Author: / Joseph Migga Kizza
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures
Classification :
TK
,
5105
.
59
,.
K584
,
2009
4. A guide to computer network security
Author: Kizza, Joseph Migga
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer networks-- Security measures
Classification :
TK
5105
.
59
.
K59
2009
5. A guide to computer network security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ;
6. A multidisciplinary introduction to information security /
Author: [edited by] Stig F. Mjølsnes
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Multidisciplinary design optimization
Classification :
QA76
.
9
.
A25
M845
2012
7. A practical guide to TPM 2.0 :
Author: Will Arthur, David Challener, Kenneth Goldman
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Computer Science.,Data Encryption.,Software Engineering/Programming and Operating Systems.
Classification :
QA76
.
9
.
A25
8. A study of black hole attack solutions :
Author: Elahe Fazeldehkordi, Iraj Sadegh Amiri, Oluwatobi Ayodeji Akanbi ; technical editor Matthew Neely
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security
Classification :
TK5105
.
59
9. A technical guide to IPSec virtual private networks /
Author: James S. Tiller.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Extranets (Computer networks)-- Security measures.,IPSec (Computer network protocol),COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,IPSec (Computer network protocol)
Classification :
TK5105
.
875
.
E87
T55
2001eb
10. A technical guide to IPSec virtual private networks
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Extranets (Computer networks) ; Security measures. ; IPSec (Computer network protocol) ;
11. A technical guide to IPSec virtual private networks
Author: Tiller, James S.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Extranets )Computer networks(,، IPSec )Computer network protocol(
Classification :
TK
5105
.
875
.
E87
T55
2001
12. AVIEN malware defense guide for the Enterpris
Author: / David Harley ... [et al.]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Computer security--Management,Computer viruses.,Malware (Computer software)
Classification :
QA
,
76
.
9
,.
A873
,
2007
13. AVIEN malware defense guide for the Enterprise /
Author: David Harley [and others] ; foreword by Robert S. Vibert.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Computer viruses.,Computer networks-- Security measures.,Computer security-- Management.,Computer viruses.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
A873
2007eb
14. AVIEN malware defense guide for the Enterprise
Author: / David Harley ... [et al.]
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security- Management,Computer networks- Security measures,Computer viruses
Classification :
QA76
.
9
.
A25
,
A873
2007
15. AVIEN malware defense guide for the Enterprise
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Management. ; Computer networks ; Security measures. ; Computer viruses. ;
16. AWS Certified Cloud Practitioner Study Guide :
Author: Ben Piper, David Clinton.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Examinations, Study guides.,Electronic data processing personnel-- Certification.,Computer networks-- Security measures-- Examinations.,Computer security-- Examinations.,COMPUTERS-- Security-- General.,Electronic data processing personnel-- Certification.
Classification :
QA76
.
3
.
P57
2019
17. Access control system
Author: / by Messaoud Benantar
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures
Classification :
TK
,
5105
.
59
,.
B46
,
2006
18. Access control systems
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ;
19. Access control systems
Author: by Messaoud Benantar.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.
20. Access control systems: security, identity, management, and trust models
Author: Benantar, Messaoud
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Computer networks
Classification :
TK
5105
.
59
.
B46
2006