1681. Programming .NET security
Author: / Adam Freeman and Allen Jones
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Microsoft .NET,Electronic books. , local
Classification :
E-BOOK

1682. Protected internet, intranet, & virtual private networks
Author: / Alexander Moldovyan ... [et al.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Internet , Security measures,Intranets (Computer networks) , Security measures,Extranets (Computer networks) , Security measures,Business enterprises , Computer networks , Security measures,ETSPASTRAD,Ressources internet
Classification :
E-BOOK

1683. Protected internet, intranet, & virtual private networks
Author: Alexander Moldovyan ... ]et al.
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Computer networks , Security measures,، Internet , Security measures,، Intranets )Computer networks( , Security measures,، Extranets )Computer networks( , Security measures,، Business enterprises , Computer networks , Security measures,، ETSPASTRAD,، Ressources internet
Classification :
TK
5105
.
59
.
P76
2003b


1684. Protecting LAN resources: a comprehensive guide to securing, Protecting and rebuilding a network
Author: Held, Gilbert
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Local area networks )Computer networks( - Security measures , Computer security , Data protection
Classification :
TK
5105
.
59
.
H44
1995


1685. Protecting information assets and IT infrastructure in the cloud
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Cloud computing ; Security measures ; Computer networks ; Security measures ;

1686. Protecting information assets and IT infrastructure in the cloud /
Author: by Ravi Das and Preston de Guise.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures.,Computer networks-- Security measures.,Cloud Computing,Computer networks-- Security measures.,COMPUTERS / Computer Literacy,COMPUTERS / Computer Science,COMPUTERS / Data Processing,COMPUTERS / Hardware / General,COMPUTERS / Information Technology,COMPUTERS / Machine Theory,COMPUTERS / Reference,Computersicherheit,Datensicherung
Classification :
QA76
.
585


1687. Protecting your library's digital sources :the essential guide to planning and preservation
Author: Kahn, Miriam )Miriam B.(,Miriam B. Kahn
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: Safety measures ، Libraries,Safety measures ، Archives,Security measures ، Library information networks,Conservation and restoration ، Electronic records,Planning ، Emergency management,، Computer security,، Data protection,Backup processing alternatives ، Electronic data processing
Classification :
Z679
.
7
.
K385
2004


1688. Protocol :
Author: Alexander R. Galloway.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols.,Computer networks-- Management.,Computer networks-- Security measures.,Electronic data processing-- Distributed processing.,Protocoles de réseaux d'ordinateurs.,Réseaux d'ordinateurs-- Gestion.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Traitement réparti.,Beheersing.,Computer network protocols.,Computer network protocols.,Computer networks-- Management.,Computer networks-- Management.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Culturele aspecten.,Electrical & Computer Engineering.,Electronic data processing-- Distributed processing.,Electronic data processing-- Distributed processing.,Engineering & Applied Sciences.,Programmeertalen.,Protocollen (informatica),Telecommunications.
Classification :
TK5105
.
59
.
G35
2004


1689. Protocol
Author: / Alexander R. Galloway
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures,Computer networks, Management,Computer network protocols,Electronic data processing, Distributed processing
Classification :
E-BOOK

1690. Protocols for Secure electronic commerce
پدیدآورنده : Sherif, Mostafa Hashem
موضوع : ، Electronic commerce,، Bank ceredit cards,، Computer networks- Security measures
۲ نسخه از این کتاب در ۲ کتابخانه موجود است.
1691. Protocols for authentication and key establishment
Author: by Colin Boyd, Anish Mathuria.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols.,Computer networks -- Security measures.,Data encryption (Computer science)
Classification :
TK5105
.
59
B936
2011


1692. Protocols for authentication and key establishment
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ;

1693. Public key infrastructure
Author: Suranjan Choudhury, Kartik Bhatnagar, and Wasim Haque
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Business enterprises, Computer networks, Security measures,Electronic commerce, Security measures,Computer networks, Security measures
Classification :
HD
،
30
.
38
،.
C46
،
2002


1694. Public key infrastructure :
Author: John R. Vacca.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Public key infrastructure (Computer security),Web services.,Computer networks-- Security measures.,Computer security.,Computerbeveiliging.,Computernetwerken.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Public key infrastructure (Computer security),Web services.
Classification :
QA76
.
9
.
A25
P85
2004eb


1695. Public key infrastructures, services and applications
Author: Fabio Martinelli, Bart Preneel (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Data encryption (Computer science), Congresses,Public key cryptography, Congresses,Public key infrastructure (Computer security), Congresses

1696. Python passive network mapping :
Author: Chet Hosmer
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Peer-to-peer architecture (Computer networks),Python (Computer program language)
Classification :
TK5105
.
59


1697. Q2S Winet'08: Proceedings of the Fourth ACM international symposium on QoS and security for wirless and mobile networks:Vancouver,British columbia,canada, O
Author: sponsored by ACM SIGSIM
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Wireless communication systems -- Quality control -- Congresses,Mobile communication systems -- QUality control -- Congresses,Network performance (Telecommunication) -- Congresses,Wireless communication systems -- Security measures -- Congresses,Computer networks -- Security measures -- Congresses
Classification :
TK
،
5103
.
2
،.
A268
،
2008


1698. Quantitative security risk assessment of enterprise networks
Author: Ou, Xinming,5791-,Xinming Ou, Anoop Singhal
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Computer networks, Security measures,، Computer networks, Risk assessment, Methodology,، Cyberinfrastructure, Risk assessment, Methodology,، Cyberinfrastructure, Security measures
Classification :
TK
5105
.
59
.
O9
2012


1699. Quantitative security risk assessment of enterprise networks
Author: / Xinming Ou, Anoop Singhal
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures,Computer networks, Risk assessment, Methodology,Cyberinfrastructure, Risk assessment, Methodology,Cyberinfrastructure, Security measures
Classification :
E-BOOK

1700. Quick start guide to penetration testing :
Author: Sagar Rahalkar.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Metasploit (Electronic resource),Metasploit (Electronic resource),Computer networks-- Security measures-- Testing.,Penetration testing (Computer security),COMPUTERS / Security / General.,Penetration testing (Computer security)
Classification :
TK5105
.
59

