2101. The information security dictionary
Author: / by Urs E. Gattiker
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks- Security measures Dictionaries,Computer security Dictionaries,Information technology- Security measures Dictionaries
Classification :
E-BOOK

2102. The information security dictionary. defining the terms that define security for E-business, Internet, information, and wireless technology
Author: Gattiker, Urs E.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer networks- Security measures Dictionaries,، Computer security Dictionaries,، Information technology- Security measures Dictionaries
Classification :
TK
5105
.
59
.
G387
2004


2103. The information security dictionary: defining the terms that define security for E-business, internet, information, and wireless technology
Author: Gattiker, Urs E.
Library: Central Library of APLL (Tehran)
Subject: ، Computer networks - Security measures - Dictionaries,، Computer security - Dictionaries,، Information technology - Security measures - Dictionaries
Classification :
TK
5105
.
59
.
G3
2004


2104. The information systems security officer's guide :
Author: Dr. Gerald L. Kovaich
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security

2105. The international handbook of computer security
Author: / Jae K. Shim, Anique A. Qureshi, Joel G. Siegel
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security Handbooks, manuals, etc,Data protection Handbooks, manuals, etc,Computer networks- Security measures Handbooks, manuals, etc
Classification :
QA76
.
9
.
A25
,
S468
2000


2106. The internet of risky things :
Author: Sean Smith.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Embedded Internet devices.,Internet of things-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Hardware.,COMPUTERS-- Internet.,COMPUTERS-- Security-- Online Safety & Privacy.,Embedded Internet devices.,TECHNOLOGY & ENGINEERING-- Industrial Technology.,TECHNOLOGY & ENGINEERING-- Mobile & Wireless Communications.,TECHNOLOGY & ENGINEERING-- Remote Sensing & Geographic Information Systems.,TECHNOLOGY & ENGINEERING-- Robotics.,TECHNOLOGY & ENGINEERING-- Sensors.
Classification :
TK5105
.
8857
.
S65
2017


2107. The misuse of information systems :
Author: John P. D'Arcy.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
D335
2007eb


2108. The modelling and analysis of security protocols :
Author: P.Y.A. Ryan and S.A. Schneider, with M.H. Goldsmith, G. Lowe and A.W. Roscoe
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols,Computer networks-- Security measures,Computer security-- Mathematical models,Computer software-- Verification,Computers-- Access control,Cryptography
Classification :
TK5105
.
59
.
R93
2001


2109. The network security test lab :
Author: Michael Gregg
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security-- Evaluation
Classification :
TK5105
.
59


2110. #The practice of network security
Author: #Allan Liska
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer networks- Security measures
Classification :
#
TK
،#.
L58


2111. The second economy :
Author: Steve Grobman, Allison Cerra ; foreword by Christopher Young
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Internet-- Security measures
Classification :
QA76
.
9
.
A25
G78
2016


2112. The second economy :
Author: Steve Grobman, Allison Cerra ; foreword by Christopher Young
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Internet-- Security measures.
Classification :
QA76
.
9
.
A25


2113. The second economy :
Author: Steve Grobman, Allison Cerra ; foreword by Christopher Young
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes,Computer networks-- Security measures,Computer security,Cyberspace-- Security measures,Cyberterrorism
Classification :
TK5105
.
59


2114. The secure information society
Author: Jörg Krüger, Bertram Nickolay, Sandro Gaycken, editors
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Law and legislation,Computer networks-- Security measures,Computer security,Computer security-- Government policy,Computer security-- Law and legislation
Classification :
QA76
.
9
.
A25
S43
2013


2115. The security of critical infrastructures :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ;

2116. The software vulnerability guid
Author: / Herbert H. Thompson, Scott G. Chase
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer software--Development,Computer networks--Security measures
Classification :
QA
,
76
.
9
,.
A25
,
T475
,
2005eb


2117. The state of the art in intrusion prevention and detection
Author: edited by Al-Sakib Khan Pathan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures.,Computer security.,Computers -- Access control.
Classification :
QA76
.
9
.
A25
E358
9999


2118. The tangled Web :
Author: Michal Zalewski.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Browsers (Computer programs),Computer networks-- Security measures.,Computer security.
Classification :
TK
5105
.
59
.
Z354
2012


2119. Theoretical and experimental methods for defending against DDoS attacks
Author: Mohammad Reza Khalifeh Soltanian, Iraj Sadegh Amiri (University of Malaya, Kuala Lumpur, Malaysia) ; Matthew Neely, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Denial of service attacks.

2120. Theoretical and experimental methods for defending against DDoS attacks
Author: Khalifeh Soltanian, Mohammad Reza
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,، Denial of service attacks
Classification :
TK
5105
.
59
.
K45T4

