31. BL,BL
Author: / Marshall G.S. Hodgson. ,20090530 0
Library: Library of Islamic Parliament (Tehran)
Subject:

32. BackTrack :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Testing.,Open source software.,Wireless communication systems-- Security measures-- Testing.
Classification :
TK5103
.
2


33. Computer networks and Internets /
Author: Douglas E. Comer, Department of Computer Sciences, Purdue University, West Lafayette, IN 47907.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Internetworking (Telecommunication),Computer networks.,Internetworking (Telecommunication)
Classification :
TK5105
.
5
.
C5897
2015


34. Cyber warfare :
Author: Jason Andress, Steve Winterfeld ; Russ Rogers, technical editor ; foreword by Stephen Northcutt.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Handbooks, manuals, etc.,Information warfare, Handbooks, manuals, etc.

35. Digital forensics for network, Internet, and cloud computing :
Author: Terrence V. Lillard [and others] ; technical editor, Jim Murray.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures.,Computer crimes-- Investigation.,Computer networks-- Security measures.,Computer security.,Computer crimes-- Investigation.,Computer networks-- Security measures.,Computer security.,LAW-- Forensic Science.
Classification :
HV8079
.
C65
D54
2010


36. Ethereal power tools&Nessus, Snort,
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ; Computer security. ; Open source software. ;

37. Hardening Linux
Author: / James Turnbull
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Linux device drivers (Computer programs),Computer security,Operating systems (Computers),Software maintenance,Computer networks- Security measures
Classification :
QA76
.
76
.
D49
,
T87
2005


38. How to cheat at configuring Open Source security tool
Author: / Raven Alder ... [et al.]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Open source software.
Classification :
TK
,
5105
.
59
,.
H68
,
2007eb


39. How to cheat at configuring Open Source security tools
Author: Raven Alder ... [et al.]&
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Computer networks- Security measures,Open source software
Classification :
TK
,
5105
.
59
,.
H68
,
2007


40. How to cheat at configuring Open Source security tools
Author: / Raven Alder ... [et al.]
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Open source software,Electronic books. , lcsh
Classification :
E-BOOK
