1. A multidisciplinary introduction to information security /
پدیدآورنده : [edited by] Stig F. Mjølsnes
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures,Computer security,Computers-- Access control,Multidisciplinary design optimization
رده :
QA76
.
9
.
A25
M845
2012
2. Authentication systems for secure networks
پدیدآورنده : Oppliger, Rolf
کتابخانه: Library of Institute for Research in Fundamental Sciences (Tehran)
موضوع : ، Computer networks -- Security measures,، Computers -- Access control,، Authentication,، Cryptography
رده :
TK
5105
.
59
.
O62
3. Authentication systems for secure networks
پدیدآورنده : Oppliger, Rolf.
کتابخانه: Central Library of Amirkabir University of Technology (Tehran)
موضوع : Computer networks - Security measures , Computers - Access control , Authentication , Cryptography
رده :
TK
5105
.
59
.
O77
1996
4. BackTrack 5 wireless penetration testing
پدیدآورنده : Vivek Ramachandran
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures-- Testing,Computers-- Access control,Penetration testing (Computer security),Wireless Internet-- Security measures
رده :
TK5103
.
4885
R355
2011
5. Becoming the hacker :
پدیدآورنده : Adrian Pruteanu.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Hacking.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Hacking.,Penetration testing (Computer security)
رده :
QA76
.
9
.
A25
6. Building virtual pentesting labs for advanced penetration testing :
پدیدآورنده : Kevin Cardwell.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures.,Computer security-- Testing.,Computers-- Access control.,Computer networks-- Monitoring.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.
رده :
TK5105
.
59
7. Building virtual pentesting labs for advanced penetration testing :
پدیدآورنده : Kevin Cardwell.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures.,Computer security-- Testing.,Computers-- Access control.,Computer networks-- Security measures.,COMPUTERS / Security / General.,Computers-- Access control.
رده :
TK5105
.
59
8. Building virtual pentesting labs for advanced penetration testing :
پدیدآورنده : Kevin Cardwell.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures.,Computer security-- Testing.,Computers-- Access control.,Computer networks-- Monitoring.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.
رده :
TK5105
.
59
9. CCNP security SISAS 300-208 official cert guide /
پدیدآورنده : Aaron Woland, Kevin Redmon
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures-- Examinations, Study guides,Computers-- Access control-- Examinations, Study guides,Electronic data processing personnel-- Certification, Study guides
رده :
QA76
.
9
.
A25
10. Cisco NAC appliance
پدیدآورنده : / Jamey Heary
کتابخانه: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
موضوع : Computer networks- Security measures,Computers- Access control
رده :
E-BOOK
11. Cisco NAC appliance
پدیدآورنده : / Jamey Heary
کتابخانه: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
موضوع : Computer networks- Security measures,Computers- Access control
رده :
TK5105
.
59
.
H42
2008
12. Cisco NAC appliance
پدیدآورنده : / Jamey Heary
کتابخانه: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
موضوع : Computers , Access control,Computer networks , Security measures,Electronic books. , lcsh
رده :
E-BOOK
13. Data security technologies in SAS 9.1.3.
پدیدآورنده :
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : SAS (Computer file),SAS (Computer file),Computer networks-- Security measures.,Computers-- Access control.,Data protection.,Computer networks-- Security measures.,Computers-- Access control.,Data protection.
رده :
QA76
.
9
.
A25
D3532
2005
14. Detection of intrusions and malware, and vulnerability assessment :
پدیدآورنده : Thorsten Holz, Herbert Bos (editions.)
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures, Congresses,Computer security, Congresses,Computers-- Access control-- Evaluation, Congresses,Computers-- Access control, Congresses,Malware (Computer software), Congresses
رده :
QA76
.
9
.
A25
15. Detection of intrusions and malware, and vulnerability assessment
پدیدآورنده : Ulrich Flegel, Danilo Bruschi (eds.)
کتابخانه: Central Library and Information Center of Shahed University (Tehran)
موضوع : Computers, Access control, Congresses,Computers, Access control, Evaluation, Congresses,Computer networks, Security measures, Congresses,Computer security, Congresses,Malware (Computer software), Congresses,Eindringerkennung, Kongress, Como <2009>,Kryptoanalyse, Kongress, Como <2009>,Malware, Kongress, Como <2009>,Softwareschwachstelle, Kongress, Como <2009>,Zugriffskontrolle, Kongress, Como <2009>,Como (2009), swd,Kongress., swd,Eindringerkennung., swd,Kryptoanalyse., swd,Malware., swd,Softwareschwachstelle., swd,Zugriffskontrolle., swd
رده :
QA
،
76
.
9
،.
A25
,
D563
،
2009
16. Emerging technologies for authorization and authentication :
پدیدآورنده : Andrea Saracino, Paolo Mori (eds.).
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Access control, Congresses.,Computer security, Congresses.,Computer science.,Computer security.,Computers-- Computer Vision & Pattern Recognition.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data protection.,Information retrieval.,Information technology: general issues.,Network hardware.,Pattern recognition.,Software engineering.,Software Engineering.
رده :
QA76
.
9
.
A25
17. Federated identity primer
پدیدآورنده : Derrick Rountree.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Access control.,Computer security.,Computers-- Access control.
رده :
QA76
.
9
.
A25
R678
2013
18. Firewalls 24seven
پدیدآورنده : / Matthew Strebe, Charles Perkins
کتابخانه: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
موضوع : Computer networks , Security measures,Computers , Access control,Firewalls (Computer security)
رده :
E-BOOK
19. Formal correctness of security protocols
پدیدآورنده : Bella, Giampaolo
کتابخانه: Central Library of Sharif University of Technology (Tehran)
موضوع : ، Computer security,، Computers-- Access control,، Cryptography,، Computer networks-- Security measures
رده :
QA
76
.
9
.
A25
.
B44
2007
20. Formal models and techniques for analyzing security protocols
پدیدآورنده : edited by Veronique Cortier and Steve Kremer
کتابخانه: Central Library of Hamedan University of Technology (Hamedan)
موضوع : ، Computer security,Access control ، Computers,Security measures ، Computer networks,Access control ، Electronic information resources
رده :
QA
76
.
9
.
A25
F6563