• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۹۷ پاسخ غیر تکراری از ۹۸ پاسخ تکراری در مدت زمان ۱,۱۷ ثانیه یافت شد.

1. A multidisciplinary introduction to information security /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: [edited by] Stig F. Mjølsnes

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Multidisciplinary design optimization

Classification :
QA76
.
9
.
A25
M845
2012

2. AAA identity management security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Vivek Santuka, Premdeep Banga, Brandon J. Carroll

Library: Farabi Faculty Library, University of Tehran (Qom)

Subject: Computer networks, Security measures,Computers, Access control,Identification,Authentication

Classification :
TK
5105
.
59
.
S316
2011

3. Authentication systems for secure networks

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Oppliger, Rolf.

Library: Central Library of Amirkabir University of Technology (Tehran)

Subject: Computer networks - Security measures , Computers - Access control , Authentication , Cryptography

Classification :
TK
5105
.
59
.
O77
1996

4. Authentication systems for secure networks

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Rolf Oppliger

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Computer networks -- Security measures,، Computers -- Access control,، Authentication,، Cryptography

Classification :
TK
5105
.
59
.
O62

5. BackTrack 5 wireless penetration testing

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Vivek Ramachandran

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Testing,Computers-- Access control,Penetration testing (Computer security),Wireless Internet-- Security measures

Classification :
TK5103
.
4885
R355
2011

6. Becoming the hacker :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Adrian Pruteanu.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Hacking.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Hacking.,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25

7. Building virtual pentesting labs for advanced penetration testing :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Kevin Cardwell.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Testing.,Computers-- Access control.,Computer networks-- Monitoring.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.

Classification :
TK5105
.
59

8. Building virtual pentesting labs for advanced penetration testing :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Kevin Cardwell.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Testing.,Computers-- Access control.,Computer networks-- Security measures.,COMPUTERS / Security / General.,Computers-- Access control.

Classification :
TK5105
.
59

9. Building virtual pentesting labs for advanced penetration testing :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Kevin Cardwell.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Testing.,Computers-- Access control.,Computer networks-- Monitoring.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.

Classification :
TK5105
.
59

10. CCNP security SISAS 300-208 official cert guide /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Aaron Woland, Kevin Redmon

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Examinations, Study guides,Computers-- Access control-- Examinations, Study guides,Electronic data processing personnel-- Certification, Study guides

Classification :
QA76
.
9
.
A25

11. Cisco NAC appliance

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jamey Heary

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer networks- Security measures,Computers- Access control

Classification :
E-BOOK

12. Cisco NAC appliance

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jamey Heary

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Computers- Access control

Classification :
TK5105
.
59
.
H42
2008

13. Cisco NAC appliance

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jamey Heary

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computers , Access control,Computer networks , Security measures,Electronic books. , lcsh

Classification :
E-BOOK

14. Data security technologies in SAS 9.1.3.

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: SAS (Computer file),SAS (Computer file),Computer networks-- Security measures.,Computers-- Access control.,Data protection.,Computer networks-- Security measures.,Computers-- Access control.,Data protection.

Classification :
QA76
.
9
.
A25
D3532
2005

15. Detection of intrusions and malware, and vulnerability assessment :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Thorsten Holz, Herbert Bos (editions.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Computers-- Access control-- Evaluation, Congresses,Computers-- Access control, Congresses,Malware (Computer software), Congresses

Classification :
QA76
.
9
.
A25

16. Detection of intrusions and malware, and vulnerability assessment

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Klaus Julisch, Christopher Kruegel (eds.)

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computers--Access control--Congresses,Computers--Access control--Evaluation--Congresses,Computer networks--Security measures--Congresses,Computer security--Congresses,Intrusions,Malware,Vulnerability assessment,DIMVA

Classification :
QA
,
76
.
9
,.
A25
,
D563
,
2005

17. Detection of intrusions and malware, and vulnerability assessment

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Ulrich Flegel, Danilo Bruschi (eds.)

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: Computers, Access control, Congresses,Computers, Access control, Evaluation, Congresses,Computer networks, Security measures, Congresses,Computer security, Congresses,Malware (Computer software), Congresses,Eindringerkennung, Kongress, Como <2009>,Kryptoanalyse, Kongress, Como <2009>,Malware, Kongress, Como <2009>,Softwareschwachstelle, Kongress, Como <2009>,Zugriffskontrolle, Kongress, Como <2009>,Como (2009), swd,Kongress., swd,Eindringerkennung., swd,Kryptoanalyse., swd,Malware., swd,Softwareschwachstelle., swd,Zugriffskontrolle., swd

Classification :
QA
،
76
.
9
،.
A25
,
D563
،
2009

18. Firewalls 24seven

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Matthew Strebe, Charles Perkins

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer networks , Security measures,Computers , Access control,Firewalls (Computer security)

Classification :
E-BOOK

19. Formal correctness of security protocols

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Bella, Giampaolo

Library: Central Library of Sharif University of Technology (Tehran)

Subject: ، Computer security,، Computers-- Access control,، Cryptography,، Computer networks-- Security measures

Classification :
QA
76
.
9
.
A25
.
B44
2007

20. Formal models and techniques for analyzing security protocols

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Veronique Cortier and Steve Kremer

Library: Central Library of Hamedan University of Technology (Hamedan)

Subject: ، Computer security,Access control ، Computers,Security measures ، Computer networks,Access control ، Electronic information resources

Classification :
QA
76
.
9
.
A25
F6563
  • »
  • 5
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival