1. AVIEN malware defense guide for the Enterpris
Author: / David Harley ... [et al.]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Computer security--Management,Computer viruses.,Malware (Computer software)
Classification :
QA
,
76
.
9
,.
A873
,
2007


2. AVIEN malware defense guide for the Enterprise /
Author: David Harley [and others] ; foreword by Robert S. Vibert.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Computer viruses.,Computer networks-- Security measures.,Computer security-- Management.,Computer viruses.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
A873
2007eb


3. AVIEN malware defense guide for the Enterprise
Author: / David Harley ... [et al.]
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security- Management,Computer networks- Security measures,Computer viruses
Classification :
QA76
.
9
.
A25
,
A873
2007


4. AVIEN malware defense guide for the Enterprise
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Management. ; Computer networks ; Security measures. ; Computer viruses. ;

5. Cryptography and network security :
Author: William Stallings.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Chiffrement (Informatique),Cryptographie à clé publique.,Cryptographie-- Réseaux d'ordinateurs.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Coding theory.,Computer networks-- Security measures.,Computer security.,Computersicherheit,Data encryption (Computer science),Internet,Internet.,Kryptologie,Rechnernetz
Classification :
TK5105
.
59
.
S713
2006


6. Innovative security solutions for information technology and communications :
Author: Jean-Louis Lanet, Cristian Toma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Information technology-- Security measures, Congresses.,Computer networks-- Security measures.,Computer security.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25


7. Protocol :
Author: Alexander R. Galloway.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols.,Computer networks-- Management.,Computer networks-- Security measures.,Electronic data processing-- Distributed processing.,Protocoles de réseaux d'ordinateurs.,Réseaux d'ordinateurs-- Gestion.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Traitement réparti.,Beheersing.,Computer network protocols.,Computer network protocols.,Computer networks-- Management.,Computer networks-- Management.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Culturele aspecten.,Electrical & Computer Engineering.,Electronic data processing-- Distributed processing.,Electronic data processing-- Distributed processing.,Engineering & Applied Sciences.,Programmeertalen.,Protocollen (informatica),Telecommunications.
Classification :
TK5105
.
59
.
G35
2004

