1. A multidisciplinary introduction to information security /
Author: [edited by] Stig F. Mjølsnes
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Multidisciplinary design optimization
Classification :
QA76
.
9
.
A25
M845
2012
2. Authentication systems for secure networks
Author: Oppliger, Rolf
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,، Computers -- Access control,، Authentication,، Cryptography
Classification :
TK
5105
.
59
.
O62
3. Authentication systems for secure networks
Author: Oppliger, Rolf.
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer networks - Security measures , Computers - Access control , Authentication , Cryptography
Classification :
TK
5105
.
59
.
O77
1996
4. BackTrack 5 wireless penetration testing
Author: Vivek Ramachandran
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Testing,Computers-- Access control,Penetration testing (Computer security),Wireless Internet-- Security measures
Classification :
TK5103
.
4885
R355
2011
5. Becoming the hacker :
Author: Adrian Pruteanu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Hacking.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Hacking.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
6. Building virtual pentesting labs for advanced penetration testing :
Author: Kevin Cardwell.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Testing.,Computers-- Access control.,Computer networks-- Monitoring.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.
Classification :
TK5105
.
59
7. Building virtual pentesting labs for advanced penetration testing :
Author: Kevin Cardwell.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Testing.,Computers-- Access control.,Computer networks-- Security measures.,COMPUTERS / Security / General.,Computers-- Access control.
Classification :
TK5105
.
59
8. Building virtual pentesting labs for advanced penetration testing :
Author: Kevin Cardwell.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Testing.,Computers-- Access control.,Computer networks-- Monitoring.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.
Classification :
TK5105
.
59
9. CCNP security SISAS 300-208 official cert guide /
Author: Aaron Woland, Kevin Redmon
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides,Computers-- Access control-- Examinations, Study guides,Electronic data processing personnel-- Certification, Study guides
Classification :
QA76
.
9
.
A25
10. Cisco NAC appliance
Author: / Jamey Heary
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks- Security measures,Computers- Access control
Classification :
E-BOOK
11. Cisco NAC appliance
Author: / Jamey Heary
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computers- Access control
Classification :
TK5105
.
59
.
H42
2008
12. Cisco NAC appliance
Author: / Jamey Heary
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computers , Access control,Computer networks , Security measures,Electronic books. , lcsh
Classification :
E-BOOK
13. Data security technologies in SAS 9.1.3.
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: SAS (Computer file),SAS (Computer file),Computer networks-- Security measures.,Computers-- Access control.,Data protection.,Computer networks-- Security measures.,Computers-- Access control.,Data protection.
Classification :
QA76
.
9
.
A25
D3532
2005
14. Detection of intrusions and malware, and vulnerability assessment :
Author: Thorsten Holz, Herbert Bos (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Computers-- Access control-- Evaluation, Congresses,Computers-- Access control, Congresses,Malware (Computer software), Congresses
Classification :
QA76
.
9
.
A25
15. Detection of intrusions and malware, and vulnerability assessment
Author: Ulrich Flegel, Danilo Bruschi (eds.)
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computers, Access control, Congresses,Computers, Access control, Evaluation, Congresses,Computer networks, Security measures, Congresses,Computer security, Congresses,Malware (Computer software), Congresses,Eindringerkennung, Kongress, Como <2009>,Kryptoanalyse, Kongress, Como <2009>,Malware, Kongress, Como <2009>,Softwareschwachstelle, Kongress, Como <2009>,Zugriffskontrolle, Kongress, Como <2009>,Como (2009), swd,Kongress., swd,Eindringerkennung., swd,Kryptoanalyse., swd,Malware., swd,Softwareschwachstelle., swd,Zugriffskontrolle., swd
Classification :
QA
،
76
.
9
،.
A25
,
D563
،
2009
16. Detection of intrusions and malware, and vulnerability assessment
Author: / Klaus Julisch, Christopher Kruegel (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computers--Access control--Congresses,Computers--Access control--Evaluation--Congresses,Computer networks--Security measures--Congresses,Computer security--Congresses,Intrusions,Malware,Vulnerability assessment,DIMVA
Classification :
QA
,
76
.
9
,.
A25
,
D563
,
2005
17. Firewalls 24seven
Author: / Matthew Strebe, Charles Perkins
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Computers , Access control,Firewalls (Computer security)
Classification :
E-BOOK
18. Formal correctness of security protocols
Author: Bella, Giampaolo
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer security,، Computers-- Access control,، Cryptography,، Computer networks-- Security measures
Classification :
QA
76
.
9
.
A25
.
B44
2007
19. Formal models and techniques for analyzing security protocols
Author: edited by Veronique Cortier and Steve Kremer
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: ، Computer security,Access control ، Computers,Security measures ، Computer networks,Access control ، Electronic information resources
Classification :
QA
76
.
9
.
A25
F6563
20. Formal models and techniques for analyzing security protocols /
Author: edited by Véronique Cortier and Steve Kremer
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Electronic information resources-- Access control
Classification :
QA76
.
9
.
A25
F654
2011