2061. The Internet security guidebook : from planning to deployment
Author: Ellis, Juanita
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,Security measures ، Internet,Security measures ، Electronic commerce
Classification :
TK
5105
.
59
.
E43


2062. The NAT handbook : implementing and managing network address translation
Author: Dutcher, Bill
Library: Central Library and Documentation Center (Kerman)
Subject: ، Directory services )Computer network technology(,، Internet addresses,، Computer networks - Security measures
Classification :
TK
5105
.
595
.
D88
2001


2063. The NCSA guide to PC and LAN security
Author: Cobb, Stephen
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer security , Local area networks )Computer networks( - Security measures
Classification :
QA
76
.
9
.
A25
C56
1996


2064. The NCSA guide to PC and LAN security
Author: Cobb, Stephen
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Computer security,Security measures ، Local area networks )Computer networks(
Classification :
QA
76
.
9
.
A25
C56
1996


2065. The NICE cyber security framework :
Author: Izzat Alsmadi.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25


2066. The Practice of Network Security Monitoring :
Author: by Richard Bejtlich.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Electronic countermeasures.
Classification :
TK
5105
.
59
.
B436
2013


2067. The SSCP prep guide :
Author: / Debra S. Isaac, Michael J. Issac
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures , Examinations , Study guides,Electronic data processing personnel , Examinations , Study guides
Classification :
E-BOOK

2068. The Stephen Cobb complete book of PC and LAN security
Author: / by Stephen Cobb,Cobb
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Local area networks (Computer networks) -- Security measures,Computers -- Access control
Classification :
TK
5105
.
7
.
C62
1992


2069. The Stephen Cobb complete book of PC and LAN security
Author: / Stephen Cobb
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Local area networks (Computer networks),Computer - Access control,-- Security measures
Classification :
005
.
8
C653S


2070. The Tao of network security monitoring
Author: / Richard Bejtlich
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks- Security measures
Classification :
E-BOOK

2071. The Tao of network security monitoring
Author: / Richard Bejtlich
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures
Classification :
TK5105
.
59
.
B44
2005


2072. The antivirus hacker's handbook /
Author: Joxean Koret, Elias Bachaalany
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control,Computer networks-- Security measures, Handbooks, manuals, etc,Computer security, Handbooks, manuals, etc
Classification :
QA76
.
9
.
A25


2073. The art of enterprise information architecture :
Author: Mario Godinez [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Information technology-- Management.,Information technology-- Security measures.,Management information systems.,Business & Economics.,Business enterprises-- Computer networks-- Security measures.,Business enterprises-- Computer networks-- Security measures.,Computer Science.,Engineering & Applied Sciences.,Information technology-- Management.,Information technology-- Management.,Information technology-- Security measures.,Information technology-- Security measures.,Management information systems.,Management information systems.,Management Theory.,Management.
Classification :
HD30
.
2
.
A77
2010


2074. The art of software security assessment
Author: / Mark Dowd, John McDonald, and Justin Schuh
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer software- Development,Computer networks- Security measures
Classification :
QA76
.
9
.
A25
,
D75
2007


2075. The basics of cyber warfare
Author: Steve Winterfeld, Jason Andress ; technical editor, Andrew Hay
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Information warfare
Classification :
U163
.
W57
2013


2076. The basics of digital privacy :
Author: Denny Cherry ; technical editor, Thomas LaRock
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control
Classification :
QA76
.
9
.
A25
C438
2014


2077. The basics of information security
Author: Jason Andress.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Information resources management.

2078. The basics of information security : understanding the fundamentals of InfoSec in theory and practice
Author: Andress, Jason.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,Security measures ، Computer networks,، Information resources management
Classification :
QA
76
.
9
.
A25
A5453
2011


2079. The basics of web hacking
Author: Josh Pauli ; Scott White, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Hackers.,Penetration testing (Computer security),Web applications-- Security measures.,Web sites-- Security measures.

2080. The basics of web hacking
Author: Josh Pauli
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer hackers,Computer networks-- Security measures,Penetration testing (Computer security),Web applications-- Security measures,Web sites-- Security measures
Classification :
TK5105
.
59
.
P385
2013

