• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۱۶ پاسخ غیر تکراری از ۱۶ پاسخ تکراری در مدت زمان ۰,۶۶ ثانیه یافت شد.

1. A technical guide to IPSec virtual private networks /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: James S. Tiller.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Extranets (Computer networks)-- Security measures.,IPSec (Computer network protocol),COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,IPSec (Computer network protocol)

Classification :
TK5105
.
875
.
E87
T55
2001eb

2. Computer and cyber security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Dr. Brij B. Gupta, National Institute of Technology Kurukshetra, Haryana, India ; Dr. Dharma P. Agrawal, University of Cincinnati, USA ; Dr. Haoxiang Wang, GoPerception Laboratory & Cornell University, USA.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,BUSINESS & ECONOMICS-- Production & Operations Management.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Operating Systems-- General.

Classification :
QA76
.
9
.
A25
C626
2019eb

3. Crypto :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Steven Levy.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Cryptography.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Cryptography.

Classification :
QA76
.
9
.
A25
L49
2001eb

4. Cryptology and network security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jan Camenisch, Panos Papadimitratos (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer Communication Networks.,Computers and Society.,Cryptology.,Information Systems and Communication Service.,Software Engineering/Programming and Operating Systems.,Computer networking & communications.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- Online Services-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Ethical & social aspects of IT.,Network hardware.,Software Engineering.

Classification :
QA76
.
9
.
A25

5. Data-driven block ciphers for fast telecommunication systems /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Nikolay A. Moldovyan, Alexander A. Moldovyan.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Ciphers.,Computer security.,Cryptography.,Ciphers.,Ciphers.,Computer security.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Cryptography.,Cryptography.

Classification :
QA76
.
9
.
A25
M664
2008eb

6. Hands-on cybersecurity with Blockchain :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Rajneesh Gupta.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Blockchains (Databases),Computer networks-- Security measures.,Computer security.,Database security.,Denial of service attacks.,Blockchains (Databases),Computer networks-- Security measures.,Computer security.,Computer security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Online Safety & Privacy.,Data capture & analysis.,Database security.,Denial of service attacks.,Network security.

Classification :
QA76
.
9
.
A25
G87
2018

7. (ISC)² CISSP certified information systems security professional official study guide /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Mike Chapple, James Michael Stewart, Darril Gibson.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Examinations, Study guides.,Electronic data processing personnel-- Certification.,Telecommunications engineers-- Certification.,Computer networks-- Security measures-- Examinations.,Computer security-- Examinations.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Electronic data processing personnel-- Certification.,Telecommunications engineers-- Certification.

Classification :
QA76
.
3
.
C4255
2018

8. Information technology network and internet :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: C.T. Bhunia.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks.,Information technology.,Internet.,Computer networks.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Information technology.,Internet.

Classification :
T58
.
5
.
I54
2008eb

9. Internet security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Tim Speed, Juanita Ellis.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Internet-- Security measures.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Internet-- Security measures.

Classification :
TK5105
.
59
.
S64
2003eb

10. Intrusion detection and correlation :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Electronic countermeasures.,Intrusion detection systems (Computer security),Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Electronic countermeasures.,Electronic countermeasures.,Informatique.,Intrusion detection systems (Computer security)

Classification :
TK5105
.
59
.
K78
2005eb

11. Managing Cisco network security /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Eric Knipp [and others] ; Edgar Danielyan, technical editor.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Cisco Systems, Inc.,Cisco Systems, Inc.,Computer networks-- Management.,Computer networks-- Security measures.,Computer networks-- Management.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.

Classification :
TK5105
.
59
.
M36
2002eb

12. Microsoft Windows 2000 security /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Rashi Gupta with NIIT.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Microsoft Windows (Computer file),Microsoft Windows (Computer file),Computer security.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.

Classification :
QA76
.
9
.
A25
G87
2003eb

13. Next generation SSH2 implementation :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Dale Liu, lead author and technical editor ; Max Caceres [and others].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: UNIX Shells.,UNIX Shells.,UNIX Shells.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data encryption (Computer science)

Classification :
QA76
.
9
.
A25
L585
2009eb

14. PKI :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Andrew Nash [and others].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Public key cryptography.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,Computers-- Access control.,Computers-- Access control.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Public key cryptography.,Public key cryptography.,Public-Key-Infrastruktur

Classification :
QA76
.
9
.
A25
P59
2001eb

15. Security, privacy and trust in the IoT environment /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: editor, Zaigham Mahmood.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Internet of things-- Security measures.,Computer security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Online Safety & Privacy.

Classification :
QA76
.
9
.
A25

16. Windows Server 2008 PKI and certificate security /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Brian Komar.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Microsoft Windows server.,Microsoft Windows server.,Microsoft Windows server.,Computer networks-- Security measures.,Public key infrastructure (Computer security),Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Public key infrastructure (Computer security),Public key infrastructure (Computer security)

Classification :
TK5105
.
59
.
K67
2008eb
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival