161. Security software development
Author: / Douglas A. Ashbaugh
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security.,Application software--Development,Computer networks--Security measures

162. Security software development. assessing and managing security risks
Author: Ashbaugh, Douglas A.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Application software- Development,، Computer networks- Security measures
Classification :
QA
76
.
9
.
A25
A8246
2009


163. Special op
Author: / by Erik Pace Birkholz
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Firewalls (Computer security),Computer networks, Security measures,Computer network architectures,Electronic books., local
Classification :
TK5105
.
59
.
B498
2003


164. The art of software security assessment
Author: / Mark Dowd, John McDonald, and Justin Schuh
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer software- Development,Computer networks- Security measures
Classification :
QA76
.
9
.
A25
,
D75
2007


165. The official (ISC)² CISSP CBK reference /
Author: John Warsinkse ; with Mark Graff, Kevin Henry, Christopher Hoover, Ben Malisow, Sean Murphy, C. Paul Oakes, George Pajari, Jeff T. Parker, David Seidl, Mike Vasquez.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Administrative agencies-- Information resources management-- Security measures-- United States-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations, Study guides.,Computers-- Access control-- Examinations, Study guides.,Telecommunications engineers-- Certification-- United States.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer networks-- Security measures-- Examinations.,Telecommunications engineers-- Certification.,United States., 7
Classification :
TK5105
.
59


166. The software vulnerability guid
Author: / Herbert H. Thompson, Scott G. Chase
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer software--Development,Computer networks--Security measures
Classification :
QA
,
76
.
9
,.
A25
,
T475
,
2005eb


167. Threat modeling
Author: Adam Shostack
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computer software-- Development
Classification :
QA76
.
9
.
A25
S495
2014


168. Toward a safer and more secure cyberspace /
Author: Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Cyberterrorism-- Prevention.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Cyberterrorism-- Prevention.
Classification :
QA76
.
9
.
A25
T695
2007eb


169. Transactions on data hiding and multimedia security VI /
Author: Yun Q. Shi [and others] (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data encryption (Computer science),Data protection,Multimedia systems-- Security measures,Algorithm Analysis and Problem Complexity,Computer Science,Computers and Society,Data Encryption,Pattern Recognition,Systems and Data Security
Classification :
QA76
.
9
.
A25
T73
2011


170. Transactions on large-scale data- and knowledge-centered systems XXXVII /
Author: edited by Abdelkader Hameurlain, Roland Wagner.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data mining, Congresses.,Database management, Congresses.,Artificial intelligence.,Artificial intelligence.,Computer networks.,Computer science.,Computer security.,Computer security.,Computers-- Database Management-- Data Mining.,Computers-- Hardware-- Network Hardware.,Computers-- Intelligence (AI) & Semantics.,Computers-- Operating Systems-- General.,Computers-- Security-- General.,Computers-- Software Development & Engineering-- General.,Data mining.,Data mining.,Network hardware.,Operating systems (Computers),Operating systems.,Software engineering.,Software Engineering.
Classification :
QA76
.
9
.
A25


171. Web application security :
Author: Bryan Sullivan, Vincent Liu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Application software.,Computer networks-- Security measures.,World Wide Web-- Security measures.
Classification :
TK
5105
.
59
.
S88
2012


173. 0203931254 (ebook)
Author: edited by Nancy Snow, Philip M. Taylor.
Library: Library of Islamic Parliament (Tehran)
Subject:

175. pt. I. Perspective : legislative role of the judge and human rights law. Legislative role of the judge : a vital force in the life of the law ; Relationship between human rights and international law : principle of human dignity versus principle of state sovereignty -- pt. II. The development of human rights law by the International Court of Justice : contentious cases. Corfu Channel case (United Kingdom v Albania) (1947-1949) ; South West Africa cases (Ethiopia v South Africa ; Liberia v South Africa) : violation of human rights law led to formation of human rights law (1960-1966) ; Barcelona Traction, Light and Power Company, Limited (new application : 1962) case (Belgium v Spain) (1962-70) ; United States diplomatic and consular staff in Tehran case (USA v Iran) (1979-1981) ; Military and paramilitary activities in and against Nicaragua case (Nicaragua v USA) (1984-1991) ; East Timor case (Portugal v Australia) (1991-1994): human rights versus state sovereignty (1991-1994) ; Application of the Convention on the Prevention and Punishment of the Crime of Genocide case (Bosnia and Herzegovia v Serbia Montenegro) (1993- ) : prohibition of genocide as jus cogens ; Legality of use of force cases (Yugoslavia v Belgium; Yugoslavia v Canada; Yugoslavia v France ; Yugoslavia v Germant ; Yugoslavia v Italy ; Yugoslavia v Netherlands ; Yugoslavia v Portugal ; Yugoslavia v Spain ; Yugoslavia v UK ; Yugoslavia v USA) (1999- ) ; Arrest warrant of 11 April 2000 (Democratic Republic of the Congo v Belgium) : an analysis of human dignity of the people, for the people, by the people (2000-2002) ; Vienna Convention on Consular Relations cases (1998-2004) : the Convention does create individual rights -- pt. III. The development of human rights law by the International Court of Justice : advisory cases. International status of South West Africa case (1949-1950) : the principle of sacred trust of civilization ; Reservations to the Convention on the Prevention and Punishment of the Crime of Genocide case (1950-1951) ; Legal consequences for states of the continued presence of
Author: Shiv R.S. Bedi.
Library: Library of Islamic Parliament (Tehran)
Subject:

177. xiv, 237 p. :
Author: Chris Johnson & Jolyon Leslie.
Library: Library of Islamic Parliament (Tehran)
Subject:

178. xviii, 5,Intern
Author: Carl F. Goodman. ,Jung Wook Cho.
Library: Library of Islamic Parliament (Tehran)
Subject:
