1. A technical guide to IPSec virtual private networks /
Author: James S. Tiller.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Extranets (Computer networks)-- Security measures.,IPSec (Computer network protocol),COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,IPSec (Computer network protocol)
Classification :
TK5105
.
875
.
E87
T55
2001eb


2. Computer and cyber security :
Author: edited by Dr. Brij B. Gupta, National Institute of Technology Kurukshetra, Haryana, India ; Dr. Dharma P. Agrawal, University of Cincinnati, USA ; Dr. Haoxiang Wang, GoPerception Laboratory & Cornell University, USA.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,BUSINESS & ECONOMICS-- Production & Operations Management.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Operating Systems-- General.
Classification :
QA76
.
9
.
A25
C626
2019eb


3. Crypto :
Author: Steven Levy.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Cryptography.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Cryptography.
Classification :
QA76
.
9
.
A25
L49
2001eb


4. Cryptology and network security :
Author: Jan Camenisch, Panos Papadimitratos (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer Communication Networks.,Computers and Society.,Cryptology.,Information Systems and Communication Service.,Software Engineering/Programming and Operating Systems.,Computer networking & communications.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- Online Services-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Ethical & social aspects of IT.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25


5. Data-driven block ciphers for fast telecommunication systems /
Author: Nikolay A. Moldovyan, Alexander A. Moldovyan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Ciphers.,Computer security.,Cryptography.,Ciphers.,Ciphers.,Computer security.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Cryptography.,Cryptography.
Classification :
QA76
.
9
.
A25
M664
2008eb


6. Hands-on cybersecurity with Blockchain :
Author: Rajneesh Gupta.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Blockchains (Databases),Computer networks-- Security measures.,Computer security.,Database security.,Denial of service attacks.,Blockchains (Databases),Computer networks-- Security measures.,Computer security.,Computer security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Online Safety & Privacy.,Data capture & analysis.,Database security.,Denial of service attacks.,Network security.
Classification :
QA76
.
9
.
A25
G87
2018


7. (ISC)² CISSP certified information systems security professional official study guide /
Author: Mike Chapple, James Michael Stewart, Darril Gibson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Examinations, Study guides.,Electronic data processing personnel-- Certification.,Telecommunications engineers-- Certification.,Computer networks-- Security measures-- Examinations.,Computer security-- Examinations.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Electronic data processing personnel-- Certification.,Telecommunications engineers-- Certification.
Classification :
QA76
.
3
.
C4255
2018


8. Information technology network and internet :
Author: C.T. Bhunia.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Information technology.,Internet.,Computer networks.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Information technology.,Internet.
Classification :
T58
.
5
.
I54
2008eb


9. Internet security :
Author: Tim Speed, Juanita Ellis.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Internet-- Security measures.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Internet-- Security measures.
Classification :
TK5105
.
59
.
S64
2003eb


10. Intrusion detection and correlation :
Author: by Christopher Kruegel, Fredrik Valeur, Giovanni Vigna.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Electronic countermeasures.,Intrusion detection systems (Computer security),Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Electronic countermeasures.,Electronic countermeasures.,Informatique.,Intrusion detection systems (Computer security)
Classification :
TK5105
.
59
.
K78
2005eb


11. Managing Cisco network security /
Author: Eric Knipp [and others] ; Edgar Danielyan, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cisco Systems, Inc.,Cisco Systems, Inc.,Computer networks-- Management.,Computer networks-- Security measures.,Computer networks-- Management.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
TK5105
.
59
.
M36
2002eb


12. Microsoft Windows 2000 security /
Author: Rashi Gupta with NIIT.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Microsoft Windows (Computer file),Microsoft Windows (Computer file),Computer security.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
G87
2003eb


13. Next generation SSH2 implementation :
Author: Dale Liu, lead author and technical editor ; Max Caceres [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: UNIX Shells.,UNIX Shells.,UNIX Shells.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
L585
2009eb


14. PKI :
Author: Andrew Nash [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Public key cryptography.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,Computers-- Access control.,Computers-- Access control.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Public key cryptography.,Public key cryptography.,Public-Key-Infrastruktur
Classification :
QA76
.
9
.
A25
P59
2001eb


15. Security, privacy and trust in the IoT environment /
Author: editor, Zaigham Mahmood.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Internet of things-- Security measures.,Computer security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Online Safety & Privacy.
Classification :
QA76
.
9
.
A25


16. Windows Server 2008 PKI and certificate security /
Author: Brian Komar.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Microsoft Windows server.,Microsoft Windows server.,Microsoft Windows server.,Computer networks-- Security measures.,Public key infrastructure (Computer security),Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Public key infrastructure (Computer security),Public key infrastructure (Computer security)
Classification :
TK5105
.
59
.
K67
2008eb

