1. Advanced penetration testing for highly-secured environments
Author: Lee Allen
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Handbooks, manuals, etc,Computer networks, Handbooks, manuals, etc,Computer security-- Testing, Handbooks, manuals, etc,Penetration testing (Computer security), Handbooks, manuals, etc
Classification :
QA76
.
9
.
A25
A45
2012
2. Cisco network security troubleshooting handbook
Author: Hoda, Mynul
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Handbooks, manuals, etc ، Computer networks -- Security measures
Classification :
TK
5105
.
59
.
H63C5
3. Cisco network security troubleshooting handbook
Author: / Mynul Hoda
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures Handbooks, manuals, etc
Classification :
TK5105
.
59
.
H63
2006
4. Cyber warfare :
Author: Jason Andress, Steve Winterfeld ; Russ Rogers, technical editor ; foreword by Stephen Northcutt.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Handbooks, manuals, etc.,Information warfare, Handbooks, manuals, etc.
5. Cyber warfare : techniques, tactics and tools for security practitioners
Author: Andress, Jason.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Handbooks, manuals, etc ، Information warfare,Handbooks, manuals, etc ، Computer networks - Security measures
Classification :
U
163
.
A64
2011
6. GFI network security and PCI compliance power tools
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: GFI Software (Firm) ; Handbooks, manuals, etc. ; Computer networks ; Security measures ; Handbooks, manuals, etc. ; Credit cards ; Security measures ; Standards ; Handbooks, manuals, etc. ;
7. Handbook of computer networks and cyber security
Author: Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Computer networks.,Computer security.
Classification :
TK5105
.
5
8. Handbook of database security
Author:
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Database security -- Handbooks, manuals, etc,Computer networks -- Security measures -- Handbooks, manuals, etc
Classification :
QA
76
.
9
.
D314
H26
2007
R
9. Handbook of database security : applications and trends
Author: edited by Michael Gertz, Sushil Jajodia
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Handbooks, manuals, etc ، Database security,Handbooks, manuals, etc ، Computer networks -- Security measures
Classification :
QA
76
.
9
.
D314H26
10. Handbook of research on information security and assuranc
Author: / Jatinder N.D. Gupta, Sushil K. Sharma [editors]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Handbooks, manuals, etc,Electronic information resources--Access control--Handbooks, manuals, etc,Computer crimes--Prevention--Handbooks, manuals, etc
Classification :
TK
,
5105
.
59
,.
H353
,
2009
11. Handbook of research on information security and assurance
Author: / Jatinder N.D. Gupta, Sushil K. Sharma [editors]
Library: Insurance Research Institute Library (Tehran)
Subject: Computer networks, Security measures, Handbooks, manuals, etc,Electronic information resources, Access control, Handbooks, manuals, etc,Computer crimes, Prevention, Handbooks, manuals, etc
Classification :
TK5105
.
59
.
H
2009
12. Handbook of research on information security and assurance
Author: Jatinder N.D. Gupta, Sushil K. Sharma
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Handbooks, manuals, etc ، Computer networks - Security measures,Handbooks, manuals, etc ، Electronic information resources - Access control,Handbooks, manuals, etc ، Computer crimes - Prevention
Classification :
TK
5105
.
59
.
H353
2009
13. Handbook of research on information security and assurance
Author: Jatinder N.D. Gupta, Sushil K. Sharma ]editors[
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Handbooks, manuals, etc ، Computer networks -- Security measures,Access control -- Handbooks, manuals, etc ، Electronic information resources,Prevention -- Handbooks, manuals, etc ، Computer crimes
Classification :
TK
5105
.
59
.
H267
14. Handbook of research on information security and assurance
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Handbooks, manuals, etc ; Electronic information resources ; Access control ; Handbooks, manuals, etc ; Computer crimes ; Prevention ; Handbooks, manuals, etc ;
15. Handbook on securing cyber-physical critical infrastructure
Author: Sajal Das, Krishna Kant, Nan Zhang (editors)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Handbooks, manuals, etc,Computer security, Handbooks, manuals, etc
Classification :
TK5105
.
59
.
H3533
2012
16. How to cheat at securing a wireless network
Author: Chris Hurley... ]at al.[
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Security measures ، Wireless communication systems,Handbooks, manuals, etc ، Computer networks -- Security measures
Classification :
TK
5103
.
2
.
H69
17. How to cheat at securing a wireless network
Author: / Chris Hurley ... [et al.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures , Handbooks, manuals, etc,Wireless communication systems , Security measures,Electronic books. , local
Classification :
E-BOOK
18. Human-computer interaction and cybersecurity handbook /
Author: edited by Abbas Moallem
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention, Handbooks, manuals, etc.,Computer networks-- Security measures, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Technology and international relations.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Technology and international relations.
Classification :
TK5105
.
59
.
H86
2019eb
19. IT-Risiko-Management mit System :
Author: Hans-Peter K"nigs
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Handbooks, manuals, etc.,Information storage and retrieval systems -- Security measures -- Handbooks, manuals, etc.,Risk assessment.
20. IT risk management guide :
Author: Gerard Blokdijk, Claire Engle & Jackie Brewster.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises -- Computer networks -- Security measures -- Handbooks, manuals, etc.,Computer security -- Management -- Handbooks, manuals, etc.,Electronic data processing departments -- Security measures -- Handbooks, manuals, etc.
Classification :
HF5548
.
37
G473
2008