• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۵ پاسخ غیر تکراری از ۵ پاسخ تکراری در مدت زمان ۰,۴۷ ثانیه یافت شد.

1. Data security technologies in SAS 9.1.3.

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: SAS (Computer file),SAS (Computer file),Computer networks-- Security measures.,Computers-- Access control.,Data protection.,Computer networks-- Security measures.,Computers-- Access control.,Data protection.

Classification :
QA76
.
9
.
A25
D3532
2005

2. Metasploit Penetration Testing Cookbook :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Management.,Computers-- Access control.,Data protection.,Information technology-- Security measures.,Computer networking & communications.,Computer networks-- Security measures.,Computer security-- Management.,Computer security.,Computers-- Access control.,Computers-- Networking-- Security.,Computers-- Security-- General.,Computers-- System Administration-- General.,Data protection.,Information technology-- Security measures.,Network security.

Classification :
QA76
.
9
.
A25
.
T459
2018eb

3. Privacy solutions and security frameworks in information protection

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Hamid R. Nemati, [editor]

Library: Campus International Library of Kish University of Tehran (Hormozgan)

Subject: Computer networks -- Security measures,Data protection,Confidential communications,Computers -- Access control

Classification :
TK
5105
.
59
.
P7
2013

4. Transparent user authentication

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Nathan Clarke

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer networks, Security measures,Computers, Access control,Data protection

Classification :
E-BOOK

5. Transparent user authentication biometrics, RFID and behavioural profiling

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Nathan Clarke

Library: Central library and document university of Kurdistan (Kurdistan)

Subject: Computer networks, Security measures,Computers, Access control,Data protection

Classification :
TK5105
.
59
.
C575
2011
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival