2161. Understanding cyber risk :
Author: Thomas R. Koehler.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Business intelligence.,Computer crimes-- Prevention.,Data protection.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Business enterprises-- Computer networks-- Security measures.,Business intelligence.,Computer crimes-- Prevention.,Data protection.
Classification :
HF5548
.
37
.
K64
2018
2162. Understanding intrusion detection through visualization
Author: / by Stefan Axelsson, David Sands
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Information visualization.,Computer security.
Classification :
TK
,
5105
.
59
,.
A95
,
2006
2163. Understanding network hacks :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ;
2164. Understanding the insider threat :
Author: Richard C. Brackney, Robert H. Anderson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- United States, Congresses.,Computer security-- United States, Congresses.,Computers-- Access control-- United States, Congresses.,Electronic information resources-- Access control-- United States, Congresses.,Intelligence service-- Computer networks-- Security measures-- United States.,Intelligence service-- United States-- Data processing.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Electronic information resources-- Access control.,Intelligence service-- Computer networks-- Security measures.,Intelligence service-- Data processing.,POLITICAL SCIENCE-- Political Freedom & Security-- General.,POLITICAL SCIENCE-- Political Freedom & Security-- Terrorism.,United States., 7
Classification :
QA76
.
9
.
A25
B696
2004
2165. Unix secure shell
Author: Carasik, Anne H
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، UNIX )Computer file(,، UNIX shells,، Computer networks-- Management,، Data encryption )Computer science(,، Computer networks-- Security measures
Classification :
QA
76
.
76
.
O63
.
C37
1999
2166. Using the Internet safely for seniors for dummies /
Author: Linda Criddle, Nancy C. Muir.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Internet and older people.,Internet.,Computer networks-- Security measures.,Internet and older people.,Internet.
Classification :
TK5105
.
875
.
I57
C72
2009
2167. Utility security :the new paradigm
Author: Seger, Karl A
Library: Library of Niroo Research Institue (Tehran)
Subject: Security measures ، Electric power plants,Security measures ، Computer networks,Security measures ، Public utilities,Prevention ، Terrorism
2168. VPN applications guide : real solutions for enterprise networks
Author: McDysan, David E.
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Extranets )Computer networks(,Computer networks ، Business enterprises,، Internet,، Computer networks -- Security measures
Classification :
TK
5105
.
875
.
E87M33
2169. VPN applications guide: real solutions for enterprise networks
Author: McDysan, David E.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Extranets )Computer networks(,Computer networks ، Business enterprises,، Internet )Computer network(,Security measures ، Computer networks
Classification :
TK
5105
.
875
.
E87
M37
2000
2170. Violent Python
Author: TJ. O'Connor
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Python (Computer program language)
Classification :
QA76
.
73
.
P98
O26
2013
2171. Virtual private networks
Author: Scott, Charlie.,Charlie Scott, Paul Wolfe, and Mike Erwin
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Telecommuting,، Internet,، Extranets )Computer networks(,، Computer networks , Security measures,، Business enterprises , Computer networks
2172. Virtual private networks /
Author: Charlie Scott, Paul Wolfe, and Mike Erwin
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks,Computer networks-- Security measures,Extranets (Computer networks),Internet,Telecommuting
Classification :
TK5105
.
875
.
I57
S36
1999
2173. Virtual private networks
Author: / Charlie Scott, Paul Wolfe, and Mike Erwin
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Internet.,Extranets (Computer networks),Business enterprises--Computer networks,Computer networks--Security measures,Telecommuting.
Classification :
TK
,
5105
.
875
,.
I57
,
S395
,
1999
2174. Virtual private networks
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Internet ; Extranets (Computer networks) ; Computer networks ; Security measures ; Business enterprises ; Computer networks ; Telecommuting ;
2175. Virtual private networks [electronic resource]
Author: / Charlie Scott, Paul Wolfe, and Mike Erwin
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Internet,Extranets (Computer networks),Business enterprises--Computer networks,Computer networks--Security measures,Telecommuting
Classification :
EB
,
TK5105
.
875
.
I57
,
S395
1999
2176. Voice and data security
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer security,، Computer networks-- Security measures,، Telephone systems-- Security measures
Classification :
QA
76
.
9
.
A25
.
V58
2001
2177. Vulnerability analysis and defense for the Interne
Author: / by Abhishek Singh (editor)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer networks--Security measures--Evaluation,Computer crimes--Prevention
Classification :
QA
,
76
.
9
,.
A25
,
V848
,
2008
2178. Vulnerability analysis and defense for the Internet
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Computer networks ; Security measures ; Evaluation. ; Computer crimes ; Prevention. ;
2179. Vulnerability analysis and defense for the Internet
Author: by Abhishek Singh (editor) ; [with contributions by] Baibhav Singh and Hirosh Joseph.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures-- Evaluation.,Computer security.
2180. WORM'05 : proceedings of the 2005 ACM Workshop on Rapid Malcode, November 11, 2005, Fairfax, Virginia, USA; co-located with CCS 2005
Author: Angelos D. Keromytis, editor; sponsored by ACM Special Interest Group on Security, Audit & Control )SIGSAC(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computer networks -- Security measures,Congresses ، Computer viruses
Classification :
QA
76
.
9
.
A25A345
2005