2041. Syngress IT security project management handbook
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Handbooks, manuals, etc. ; Computer security ; Management ; Handbooks, manuals, etc. ;

2042. Syngress force emerging threat analysis
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer crimes ; Prevention. ; Computer networks ; Security measures. ; Computer security. ;

2043. Syngress force emerging threat analysis :
Author: David Maynor ... [et al.]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer networks-- Security measures,Computer security

2044. T :-site network and security services with NSX-Multi
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ;

2045. Tableaux de bord de la sécurité réseau /
Author: Cédric Llorens, Laurent Levier, Denis Valois ; avec la contribution de Olivier Salvatori.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computers-- Access control.,Réseaux d'ordinateurs-- Sécurité-- Mesures, Cas, Études de.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Computer networks-- Security measures.,Computers-- Access control.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
L56
2006eb


2046. Targeted cyber attacks
Author: Aditya K. Sood, Richard Enbody ; technical editor Peter Loshin
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer networks-- Security measures,Cyberspace-- Security measures
Classification :
TK5105
.
59
.
S66
2014


2047. TechTV's security alert
Author: / Becky Worley
Library: (South Khorasan)
Subject: Computer security,Computer networks--Security measures
Classification :
QA76
.
9
.
A25
,
W69
2004


2048. Techno Security's guide to managing risks :
Author: Jack Wiles ; Russ Rogers, technical editor
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Industries-- Security measures
Classification :
QA76
.
9
.
A25
W547
2007


2049. Techno Security's guide to managing risks
Author: / Jack Wiles
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer networks- Security measures,Industries- Security measures
Classification :
QA76
.
9
.
A25
,
W547
2007


2050. Techno security's guide to e-discovery and digital forensic
Author: / Jack Wiles, lead author
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer crimes--Investigation,Computer networks--Security measures,Computer security.
Classification :
HV
,
8079
,.
C65
,
W53
,
2007eb


2051. The Browser Hacker's Handbook /
Author: Wade Alcorn, Christian Frichot, Michele Orrù.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Browsers (Computer programs)-- Security measures.,Computer networks-- Access control.,Computer networks-- Security measures.
Classification :
QA76
.
9
.
A25
.
A384
2014
.
A393
2014


2052. The CEH prep guide :
Author: Ronald L. Krutz, Russell Dean Vines.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Testing-- Examinations, Study guides.,Hackers.,Computer networks-- Examinations.,Computer networks-- Security measures-- Examinations.,Hackers.
Classification :
QA76
.
9
.
A25
K79
2007eb


2053. The CERT guide to system and network security practices
Author: Allen, Julia H.
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Computer networks -- Security measures
Classification :
QA
76
.
9
.
A25A42


2054. The CISSP and CAP prep guide
Author: / Ronald L. Krutz, Russell Dean Vines
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks- Security measures- Examinations- Study guides,Computer security- Examinations-Study guides,Telecommunications engineers- Certification
Classification :
TK5105
.
59
.
K782
2007


2055. The E-Privacy imperative
Author: / Mark S. Merkow, James Breithaupt
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Electronic commerce,Electronic commerce- Security measures,Business enterprises- Computer networks- Security measures,Privacy, Right of
Classification :
HF5548
.
32
.
M47
2002


2056. The E-Privacy imperative
Author: / Mark S. Merkow, James Breithaupt
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Electronic commerce,Electronic commerce- Security measures,Business enterprises- Computer networks- Security measures,Privacy, Right of
Classification :
HF5548
.
32
.
M47
2002


2057. The E-Privacy imperative protect your customers' Internet privacy and ensure your company's survival in the electronic age
Author: Merkow, Mark S.,Mark S. Merkow, James Breithaupt
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Electronic commerce,، Electronic commerce- Security measures,، Business enterprises- Computer networks- Security measures,، Privacy, Right of
Classification :
HF
5548
.
32
.
M47
2002


2058. The Executive guide to information security: threats, challenges, and solutions
Author: Mark Egan with Tim Mather
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection
Classification :
HF
،
5548
.
32
،.
E325
،
2005


2059. <The> Future of Identity in the Information Society
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses,Computer networks -- Security measures -- Congresses,Privacy, Right of -- Congresses,کامپیوترها -- ایمنی اطلاعات -- کنگرهها,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها, حق صیانت از حریم شخصی -- کنگرهها
Classification :
E-Book
,

2060. The Internet security guidebook : from planning to deployment
Author: Ellis, Juanita
Library: Library of College of Science University of Tehran (Tehran)
Subject: ، Computer networks -- Security measures,Security measures ، Internet )Computer network(,Security measures ، Electronic commerce
Classification :
TK
5105
.
59
.
E44
2001

