2341. Wireless operational security
Author: / John W. Rittinghouse, James F. Ransome
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Wireless LANs- Security measures,Computer security
Classification :
TK5105
.
59
.
R58
2004


2342. Wireshark & Ethereal network protocol analyzer toolkit, Jay Beale's open source security serie
Author: / Angela Orebaugh ... [et al.
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Computer network protocols.
Classification :
TK
,
5105
.
59
,.
O73
,
2007eb


2343. Wireshark & Ethereal network protocol analyzer toolkit, Jay Beale's open source security series
Author: / Angela Orebaugh ... [et al.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Computer network protocols,Electronic books. , lcsh
Classification :
E-BOOK

2344. Wireshark 101: essential skills for network analysis
Author: / Laura Chappell; Foreword by Gerald Combs,Laura Chappell
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Network performance (Telecommunication),Computer networks -- Quality control,Computer networks -- Security measures.,Network performance, Telecommunication, Computer networks, Quality control, Security measures.

2345. Wireshark network analysis :
Author: Laura Chappell ; foreword by Gerald Combs.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Quality control-- Certification, Study guides.,Computer networks-- Security measures-- Certification, Study guides.,Network performance (Telecommunication)-- Certification, Study guides.
Classification :
TK5105
.
548
.
C43
2012


2346. Wireshark network security :
Author: Piyush Verma
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Quality control,Computer networks-- Security measures-- Computer programs,Network performance (Telecommunication)
Classification :
TK5105
.
5956


2347. Wireshark network security : a succinct guide to securely administer your network using Wireshark
Author: Verma, Piyush
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Quality control ، Computer networks,، Network performance )Telecommunication(,Security measures -- Computer programs ، Computer networks
Classification :
TK
5105
.
5
.
W47
2015


2348. Writing disaster recovery plans for telecommunications networks and LAN
Author: Wrobel, Leo A. )Leo Anthony(
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Telecommunication systems-- Security measures-- Planning,، Local area networks )Computer networks(-- Security measures-- Planning,، Disaster relief-- Planning,، Emergency management
Classification :
TK
5102
.
5
.
W77
1993


2349. 802.1X port-based authenticatio
Author: / Edwin Lyle Brown
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Standards,Computers--Access control--Standards,Computer network protocols.
Classification :
TK
,
5105
.
59
,.
B765
,
2007


2350. 802.1X port-based authentication
Author: / Edwin Lyle Brown
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks- Security measures- Standards,Computers- Access control- Standards,Computer network protocols
Classification :
E-BOOK

2351. 802.1X port-based authentication
Author: / Edwin Lyle Brown
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures- Standards,Computers- Access control- Standards,Computer network protocols
Classification :
TK5105
.
59
.
B765
2007


2352. 802.1X port-based authentication
Author: Brown, Edwin Lyle.
Library: Central library and information center (Khorasan Razavi)
Subject: Security measures -- Standards ، Computer networks,Access control -- Standards ، Computers,، Computer network protocols
Classification :
TK
5105
.
59
.
B765
2007


2353. Zabbix :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Software.,Computer networks-- Security measures.,COMPUTERS / Security / Networking
Classification :
TK5105
.
5


2354. Zabbix 1.8 network monitoring
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks,Computer networks-- Security measures,Computer security
Classification :
TK5105
.
59
.
O48
2010


2355. Zero day exploit :
Author: Rob Shein ; Marcus H. Sachs, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Fiction.,Computer security, Fiction.,Hackers, Fiction.,Computer networks-- Security measures.,Computer security.,FICTION-- General.,Hackers.
Classification :
PS3619
.
H45
Z47
2004eb


2356. Zero day exploit
Author: / Rob Shein aka Rogue Shoten
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Fiction,Computer hackers--Fiction,Computer networks--Security measures--Fiction
Classification :
PS
,
3619
,.
H45
,
Z47
,
2004


2357. Zero trust networks with VMware NSX :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ;

2358. based authentication /-802.1X port
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Standards ; Computers ; Access control ; Standards ; Computer network protocols ;

2359. based intrusion detection guide-OSSEC host
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: OSSEC (Computer file) ; Computer security. ; Computer networks ; Security measures. ;
