21. Formal models and techniques for analyzing security protocols /
Author: edited by Véronique Cortier and Steve Kremer
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Electronic information resources-- Access control
Classification :
QA76
.
9
.
A25
F654
2011


22. IT security governance guidebook with security program metrics on CD-ROM
Author: Cohen, Frederick B., 1956-
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer networks- Security measures ► Computers- Access control ► Confidential business information- Security measures- Data processing ► Corporate governance ► Software measurement
Classification :
005
C678i


23. Identity and access management
Author: Ertem Osmanoglu
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,False personation-- Prevention
Classification :
QA76
.
9
.
A25
O783
2013


24. Information security and privacy :
Author: Julian Jang-Jaccard, Fuchun Guo (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computers-- Access control, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Data encryption (Computer science)
Classification :
QA76
.
9
.
A25
A279
2019eb


25. Instant penetration testing
Author: Vyacheslav Fadyushin
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computers-- Access control,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
F33
2013


26. Integrated security systems design : a complete reference for building enterprise-wide digital security systems
Author: Thomas Norman
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,، Computers -- Access control,Security measures ، Information storage and retrieval systems
Classification :
TK
5105
.
5
.
N67I5
2014


27. Internet and Intranet security
Author: Oppliger, Rolf
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Internet )Computer network( - Security measures , Intranets )Computer networks( - Security measures , Computers - Access control , TCP/IP )Computer network protocol(
Classification :
TK
5105
.
875
.
I57
O67
1998


28. Internet and Intranet security
Author: / Rolf Oppliger
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Internet- Security measures,Intranets (Computer networks)- Security measures,Computers- Access control,TCP/IP (Computer network protocol)
Classification :
TK5105
.
875
.
I57
,
O67
1998


29. Internet and Intranet security
Author: / Rolf Oppliger
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Internet- Security measures,Intranets (Computer networks)- Security measures,Computers- Access control,TCP/IP (Computer network protocol)
Classification :
TK5105
.
875
.
I57
,
O67
2001


30. Internet and Intranet security
Author: Rolf Oppliger
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Security measures ، Internet,Security measures ، Intranets )Computer networks(,، Computers -- Access control,، TCP/IP )Computer network protocol(
Classification :
TK
5105
.
875
.
I57O67


31. Internet and Intranet security
Author: Oppliger, Rolf.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Internet )Computer network(,Security measures ، Intranets )Computer networks(,Access control ، Computers,، TCP/IP )Computer network protocol(
Classification :
TK
5105
.
875
.
I57
O67
1998


32. Internet and intranet security management
Author: / Lech Janczewski
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Internet- Security measures,Intranets (Computer networks)- Security measures,Computers- Access control,Cryptography
Classification :
TK5105
.
875
.
I57
,
J358
2000


33. Internet and intranet security management
Author: / Lech Janczewski
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Internet- Security measures,Intranets (Computer networks)- Security measures,Computers- Access control,Cryptography
Classification :
E-BOOK

34. Intrusion Detection with Snort
Author: \ Jack Koziol
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks -- Security measures,Computer security,Computers -- Access control,شبکههای کامپیوتری -- تدابیر ایمنی,امنیت کامپیوتر,کامپیوترها -- کنترل دستیابی
Classification :
E-Book
,

35. Intrusion detection systems with Snort
Author: / Rafeeq Ur Rehman
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computers- Access control
Classification :
TK5105
.
59
.
R44
2003


36. Intrusion detection systems with Snort
Author: / Rafeeq Ur Rehman
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computers- Access control
Classification :
TK5105
.
59
.
R44
2003


37. Intrusion detection systems with Snort
Author: / Rafeeq Ur Rehman
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks- Security measures,Computers- Access control
Classification :
E-BOOK

38. Intrusion detection systems with Snort
Author: / Rafeeq Ur Rehman
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computers- Access control
Classification :
TK5105
.
59
.
R44
2003


39. Intrusion detection systems with Snort :
Author: Rafeeq Ur Rehman.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computers-- Access control.
