• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۴ پاسخ غیر تکراری از ۴ پاسخ تکراری در مدت زمان ۴,۰۰ ثانیه یافت شد.

1. Implementing the ISO/IEC 27001 information security management system standard

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Edward Humphreys

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: Computer security -- Management -- Standards,Computer networks -- Security measures -- Standards,Data protection -- Standards,Information technology -- Standards

Classification :
QA
،
76
.
9
،.
A25
,
H855
،
2007

2. Network Scanning Cookbook /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jetty, Sairam.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.

Classification :

3. Penetration testing fundamentals /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Chuck Easttom.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security)

Classification :
TK5105
.
59

4. The Executive guide to information security: threats, challenges, and solutions

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Mark Egan with Tim Mather

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection

Classification :
HF
،
5548
.
32
،.
E325
،
2005
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival