1. Administering Windows Vista security
Author: / Mark Minasi, Byron Hynes
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Microsoft Windows (Computer file),Computer security
Classification :
QA76
.
9
.
A25
,
M5825
2007
2. Administering Windows Vista security
Author: / Mark Minasi, Byron Hynes
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Microsoft Windows (Computer file),Computer security
Classification :
QA76
.
9
.
A25
,
M5825
2007
3. Administering Windows Vista security
Author: Mark Minasi, Byron Hynes.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Microsoft Windows (Computer file),Computer security.
4. Administering Windows Vista security : the big surprises
Author: Minasi, Mark
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Microsoft Windows )Computer file(,، Computer security
Classification :
QA
76
.
9
.
A25M56
5. Check Point NG :
Author: Drew Simonis [and three others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Microsoft Windows (Computer file),Microsoft Windows (Computer file),Computer security.,Computer security.
Classification :
QA76
.
9
.
A25
6. Check Point NG :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Microsoft Windows (Computer file) ;
7. Deploying secure 802.11 wireless networks with Microsoft Windows
Author: / Joseph Davies
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Wireless LANs,IEEE 802.11 (Standard),Computer networks- Security measures,Microsoft Windows (Computer file)
Classification :
TK5105
.
78
.
D36
2004
8. Deploying secure 802.11 wireless networks with Microsoft Windows
Author: / Joseph Davies
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Wireless LANs,IEEE 802.11 (Standard),Computer networks- Security measures,Microsoft Windows (Computer file)
Classification :
TK5105
.
78
.
D36
2004
9. ExamInsight for designing security for a Microsoft Windows 2000 network :
Author: Patrick Simpson ; with contributing author Chris Timmons.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Microsoft Windows (Computer file),Microsoft Windows (Computer file),Computer networks-- Security measures-- Examinations, Study guides.,Electronic data processing personnel-- Certification.,Microsoft software-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations.,COMPUTERS-- Certification Guides-- General.,Electronic data processing personnel-- Certification.,Microsoft software-- Examinations.
Classification :
QA76
.
3
.
S56
2003b
10. Hacking expose
Author: / Stuart McClure, Joel Scambray, George Kurtz
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Microsoft Windows (Computer file),Computer networks--Security measures,Computer security.,Data protection.
Classification :
QA
,
76
.
9
,.
A25
,
M428
,
2005eb
11. Hacking exposed
Author: / Joel Scambray,Stuart McClure, George Kurtz
Library: Ilam University Central Library (Ilam)
Subject: Microsoft Windows (Computer file),Computer security,Computer networks- Security measures,Data protection
Classification :
QA76
.
9
.
A25
,
M428
2008
12. Hacking exposed
Author: / Stuart McClure, Joel Scambray, George Kurtz
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Microsoft Windows (Computer file),Computer security,Computer networks- Security measures,Data protection
Classification :
QA76
.
9
.
A25
,
M428
2005
13. Hacking exposed
Author: / Stuart McClure, Joel Scambray, George Kurtz
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Microsoft Windows (Computer file),Computer security,Computer networks- Security measures,Data protection
Classification :
QA76
.
9
.
A25
,
M428
2005
14. Hacking exposed :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Microsoft Windows (Computer file) ; Computer security ; Computer networks ; Security measures ; Data protection ;
15. Hacking exposed
Author: / Joel Scambray, Stuart McClure,Variant Title: Windows security secrets.
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Microsoft Windows (Computer file),Computer security
Classification :
QA76
.
9
.
A25
S29
16. Hacking exposed Windows. Windows security secrets & solutions
Author: Scambray, Joel.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Microsoft Windows )Computer file(,، Computer security
Classification :
QA
76
.
9
.
A25
S3
2008
17. Hacking exposed Windows : Windows security secrets & solutions
Author: Scambray, Joel
Library: Central library and information center (Khorasan Razavi)
Subject: ، Microsoft Windows )Computer file(,، Computer security
Classification :
QA
76
.
9
.
A25
S3
2008
18. Hacking exposed: network security secrets & solutions
Author: McClure, Stuart
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Microsoft Windows )Computer file(,، Computer security,Security measures ، Computer networks,، Data protection
Classification :
QA
76
.
9
.
A25
M428
2005
19. Hacking the code: ASP.NET web application security
Author: Burnett, Mark
Library: Central Library of APLL (Tehran)
Subject: ، Computer security,، Microsoft windows )computer file(,، Microsoft .NET
Classification :
QA
76
.
9
.
A26
B8
2004
20. Hands-on penetration testing on Windows :
Author: Phil Bramwell.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Kali Linux.,Microsoft Windows (Computer file),Kali Linux.,Microsoft Windows (Computer file),Computer security.,Computers-- Access control.,Penetration testing (Computer security),Windows PowerShell (Computer program language),Computer security.,Computers-- Access control.,Penetration testing (Computer security),Windows PowerShell (Computer program language)
Classification :
QA76
.
9
.
A25