• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۱۰ پاسخ غیر تکراری از ۱۰ پاسخ تکراری در مدت زمان ۰,۶۶ ثانیه یافت شد.

1. Cyber Security.

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: John G Voeller

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks -- Security measures.,COMPUTERS -- Internet -- Security.,Cyberspace -- Security measures.

Classification :
QA76
.
9
J646
2014

2. Cyber resilience of systems and networks /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Alexander Kott, Igor Linkov, editors.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Cyberspace-- Security measures.,Internet-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,COMPUTERS-- Security-- Networking.,Internet-- Security measures.,Reliability engineering.

Classification :
TK5105
.
59
.
C929
2019

3. Cyber-security and global information assurance :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Kenneth J. Knapp [editor].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Management.,Cyberspace-- Security measures.,Data protection.,Information technology-- Security measures.,Computer networks-- Security measures.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.,Information technology-- Security measures.

Classification :
QA76
.
9
.
A25
C918
2009eb

4. Cybersecurity awareness among students and faculty /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: by Abbas Moallem.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Universities and colleges-- Security measures.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Security-- General.,COMPUTERS-- Social Aspects-- Human-Computer Interaction.,LAW-- Forensic Science.,Universities and colleges-- Security measures.

Classification :
QA76
.
9
.
A25
M654
2019eb

5. Cybersecurity in Nigeria :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Aamo Iorliam.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Nigeria.,Computer security-- Nigeria.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Online Safety & Privacy.,Nigeria., 7

Classification :
QA76
.
9
.
A25

6. Human-computer interaction and cybersecurity handbook /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Abbas Moallem

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention, Handbooks, manuals, etc.,Computer networks-- Security measures, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Technology and international relations.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Technology and international relations.

Classification :
TK5105
.
59
.
H86
2019eb

7. Routledge companion to global cyber-security strategy /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Scott N. Romaniuk and Mary Manjikian.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention-- Government policy.,Computer networks-- Security measures-- Government policy.,Computer security-- Government policy.,Cyberspace-- Security measures-- Government policy.,Cyberterrorism-- Prevention-- Government policy.,Internet-- Security measures-- Government policy.,Computer networks-- Security measures-- Government policy,Computer security-- Government policy,COMPUTERS / Internet / Security,HISTORY / Military / Strategy,POLITICAL SCIENCE / Political Freedom & Security / International Security

Classification :
UA163
.
R68
2021

8. Securing social networks in cyberspace

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Al-Sakib Khan Pathan.

Library: Central library and document university of Kurdistan (Kurdistan)

Subject: Computer networks,Online social networks,Computer security.,COMPUTERS,COMPUTERS,Security measures.,Security measures.,Security.,Security.,Computer security.

Classification :

9. Toward a safer and more secure cyberspace /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Cyberterrorism-- Prevention.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Cyberterrorism-- Prevention.

Classification :
QA76
.
9
.
A25
T695
2007eb

10. Trust in cyberspace /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Fred B. Schneider, editor ; Committee on Information Systems Trustworthiness, Computer Science and Telecommunications Board, Commission on Physical Sciences, Mathematics, and Applications, National Research Council.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Internet-- Security measures.,Telecommunication policy-- United States.,Computer Security.,Internet.,Public Policy.,Telecommunications.,BUSINESS & ECONOMICS-- Industries-- Media & Communications.,Computer networks-- Security measures.,COMPUTERS.,Electrical & Computer Engineering.,Engineering & Applied Sciences.,Internet / Security.,Internet-- Security measures.,Internet.,Sicherheit,TECHNOLOGY & ENGINEERING-- Telecommunications.,Telecommunication policy.,Telecommunications.,Telekommunikationspolitik,Verteiltes System,United States.,USA., 7, 7

Classification :
TK5105
.
59
.
T78
1999eb
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival