1. Data security technologies in SAS 9.1.3.
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: SAS (Computer file),SAS (Computer file),Computer networks-- Security measures.,Computers-- Access control.,Data protection.,Computer networks-- Security measures.,Computers-- Access control.,Data protection.
Classification :
QA76
.
9
.
A25
D3532
2005


2. Metasploit Penetration Testing Cookbook :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Computers-- Access control.,Data protection.,Information technology-- Security measures.,Computer networking & communications.,Computer networks-- Security measures.,Computer security-- Management.,Computer security.,Computers-- Access control.,Computers-- Networking-- Security.,Computers-- Security-- General.,Computers-- System Administration-- General.,Data protection.,Information technology-- Security measures.,Network security.
Classification :
QA76
.
9
.
A25
.
T459
2018eb


3. Privacy solutions and security frameworks in information protection
Author: / Hamid R. Nemati, [editor]
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer networks -- Security measures,Data protection,Confidential communications,Computers -- Access control
Classification :
TK
5105
.
59
.
P7
2013


4. Transparent user authentication
Author: / Nathan Clarke
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures,Computers, Access control,Data protection
Classification :
E-BOOK

5. Transparent user authentication biometrics, RFID and behavioural profiling
Author: / Nathan Clarke
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer networks, Security measures,Computers, Access control,Data protection
Classification :
TK5105
.
59
.
C575
2011

