61. Advances in security and payment methods for mobile commerce
Author: Wen Chen Hu, Chung-Wei Lee and Weidong Kou, editors
Library: (Semnan)
Subject: Security measures ، Mobile commerce,Computer networks Security measures ، Business enterprises
Classification :
HF
5548
.
34
.
A39


62. Advances in security technology
Author: Haeng-kon Kim, Tai-hoon Kim, Akingbehin Kiumi (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control, Congresses,Computer networks-- Security measures, Congresses,Computer security, Congresses,Internet-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
S438
2008eb


63. Aggressive network self-defense
Author: Neil Archibald ... ]et al.[ ; technical editor Neil R. Wyler )aka Grifter(, foreword by Timothy M. Mullen )Thor(
Library: (Semnan)
Subject: ، Computer security,، Computer networks - Security measures,، Internet - Security measures
Classification :
TK
5105
.
59
.
A374
2005


64. Agile IT security implementation methodology
Author: Jeff Laskowski
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Agile software development,Computer networks-- Security measures,Computer security
Classification :
QA76
.
9
.
A25
L37
2011


65. Ajax security /
Author: Billy Hoffman and Bryan Sullivan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Ajax (Web site development technology),Computer networks-- Security measures.,Computer security.
Classification :
TK5105
.
8885
.
A52
H62
2008


66. Ajax security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Ajax (Web site development technology) ; Computer networks ; Security measures ; Computer security ;

67. Ajax security
Author: / Billy Hoffman and Bryan Sullivan
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Ajax (Web site development technology),Computer networks--Security measures,Computer security.
Classification :
TK
,
5105
.
8885
,.
A52
,
H62
,
2008


68. Algorithms in applications
Author: editors: Utpal Sharma, Dhruba K. Bhattacharyya
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Algorithms,Congresses ، Computer networks -- Security measures,Congresses ، Pattern recognition systems,Congresses ، Soft computing
Classification :
QA
9
.
58
.
A43


69. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks
Author: \ S.V. Raghavan and E. Dawson, editors.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Denial of service attacks.,Computer networks-- Security measures.,Computer crimes-- Prevention.,حملههای منجر به قطع سرویسدهی ,شبکههای کامپیوتری -- تدابیر ایمنی,جرایم کامپیوتری -- پیشگیری
Classification :
TK
5105
.
59
.
I5
2011
E-Book
,


70. An introduction to information security and ISO27001
Author: Steve G. Watkins.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.

71. An investigation into the detection and mitigation of Denial of Service (DoS) attacks
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Denial of service attacks. ; Computer networks ; Security measures. ; Computer crimes ; Prevention. ;

72. An investigation into the detection and mitigation of Denial of Service (DoS) attacks
Author: / S.V. Raghavan and E. Dawson, editors
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Denial of service attacks.,Computer networks--Security measures,Computer crimes--Prevention
Classification :
TK
,
5105
.
59
,.
I57
,
2011


73. Anti-Hacher tool kit
Author: / Mike shema, Bradley C. Johnson
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Data protection,Computer networks,-- Security measures
Classification :
005
.
8
S545A
2004


74. Anti-hacker tool kit
Author: / Keith J. Jones, Mike Shema, Bradley C. Johnson
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Data protection,Computer networks- Security measures
Classification :
TK5105
.
59
.
J65
2002


75. Anti-hacker tool kit
Author: Shema, Mike
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Computer networks,، Data protection
Classification :
TK
5105
.
59
.
S54
2004


76. Anti-hacker tool kit
Author: / Keith J. Jones, Mike Shema, Bradley C. Johnson
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Data protection,Computer networks--Security measures
Classification :
TK5105
.
59
.
J65


77. Anti-hacker tool kit
Author: / Keith J. Jones, Mike Shema, Bradley C. Johnson
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Data protection,Computer networks- Security measures
Classification :
TK5105
.
59
.
J65
2002


78. Anti-hacker tool kit
Author: / Mike Shema ... [et al.]
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Data protection,Computer networks,-- Security measures
Classification :
005
.
8
S545A
2006


79. Anti-hacker tool kit
Author: Shema, Mike
Library: Library of College of Science University of Tehran (Tehran)
Subject: ، Data protection,، Computer networks -- Security measures
Classification :
TK
5105
.
59
.
S54
2004


80. Anti-hacker tool kit
Author: Mike Shema...]et al.[
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Data protection,Security measures ، Computer networks
Classification :
TK
5105
.
59
.
S54
2006

