21. Access control systems
Author: / by Messaoud Benantar, Benantar, Messaoud.
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer networks--Security measures.
Classification :
TK
5105
.
59
.
B46
2006


22. Access control systems
Author: by Messaoud Benantar.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.

23. Access control systems: security, identity, management, and trust models
Author: Benantar, Messaoud
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Computer networks
Classification :
TK
5105
.
59
.
B46
2006


24. Access control systems: security, identity management and trust models
Author: Benantar, Messaoud
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Security measures ، Computer networks
Classification :
TK
5105
.
59
.
B46


25. Access to online resources :
Author: by Kristina Botyriute.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Collection management (Libraries),Computer networks-- Security measures.,Database security.,Electronic information resources-- Access control.,Electronic information resources-- Management.,Computer Security.,Information Services.,Internet.,Collection management (Libraries),Computer networks-- Security measures.,Database security.,Electronic information resources-- Access control.,Library & information sciences.
Classification :
Z695
.
24


26. Accountability and privacy in network security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ;

27. Active defense
Author: / Chris Brenton with Cameron Hunt
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures
Classification :
TK5105
.
59
.
B75
2001


28. Active defense
Author: / Chris Brenton with Cameron Hunt
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks- Security measures
Classification :
E-BOOK

29. Adaptive security management architecture
Author: / James S. Tiller
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures
Classification :
E-BOOK

30. Advanced CISSP prep guide: exam Q & A
Author: Krutz, Ronald L.
Library: Central Library and Documentation Center (Kerman)
Subject: Certification ، Electronic data processing personnel,Examinations ، Computer networks - Security measures
Classification :
QA
76
.
3
.
K76
2003


31. Advanced IPSEC VPN architecture and design /
Author: Vijay Bollapragada, Mohamed Khalid, Scott Wainner.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Extranets (Computer networks),IPSec (Computer network protocol)-- Security measures.,Electrical & Computer Engineering.,Engineering & Applied Sciences.,Extranets (Computer networks),Telecommunications.
Classification :
TK5105
.
567
.
B65
2005


32. Advanced Security Technologies in Networking
Author: edited by Borka Jrman-Blazic, Wolfgang S. Schneider and Tomaz Klobucar
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computer Security,Computer Networks -- security measures
Classification :
TK
،
5105
.
5
،.
N46
,
A37
،
2001


33. Advanced computer science applications
Author: / edited by Karan Singh, Latha Banda, Manisha Manjul.
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer science,Computer networks,Machine learning.,Artificial intelligence.,Technological innovations.,Security measures.

34. Advanced monitoring in P2P botnets :
Author: Shankar Karuppayah.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control.,Computer networks-- Security measures.,Malware (Computer software),Peer-to-peer architecture (Computer networks),Computer networks-- Access control.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Networking-- General.,Malware (Computer software),Mathematical physics.,Network hardware.,Peer-to-peer architecture (Computer networks)
Classification :
TK5105
.
59
.
K37
2018


35. Advanced monitoring in P2P botnets: A Dual Perspective
Author: / Shankar Karuppayah.
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer networks -- Security measures.,Computer networks -- Access control.,Malware (Computer software).,Computer security.,Malware, Computer software, Monitoring, Computer networks, Computer science, Computer security.

36. Advanced penetration testing :
Author: Wil Allsopp.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Penetration testing (Computer security),Computer networks-- Security measures.,COMPUTERS-- Security-- General.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25


37. Advanced penetration testing for highly-secured environments
Author: Lee Allen
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Handbooks, manuals, etc,Computer networks, Handbooks, manuals, etc,Computer security-- Testing, Handbooks, manuals, etc,Penetration testing (Computer security), Handbooks, manuals, etc
Classification :
QA76
.
9
.
A25
A45
2012


38. Advanced penetration testing : hacking the world's most secure networks
Author: Wil Allsopp
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Penetration testing )Computer security(,، Computer networks -- Security measures
Classification :
TA
455
.
A43C425
2017


39. Advanced relay technologies in next generation wireless communications /
Author: edited by Ionnis Krikidis and Gan Zheng.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Antenna arrays.,Computer networks.,Electromagnetic interference.,Energy conservation.,Telecommunication-- Security measures.,Wireless communication systems.,antenna arrays.,Antenna arrays.,Computer networks.,cooperative communication.,Electromagnetic interference.,energy conservation.,Energy conservation.,free-space optical communication.,MIMO communication.,next generation networks.,radiofrequency interference.,radiofrequency power transmission.,relay networks (telecommunication),TECHNOLOGY & ENGINEERING-- Mechanical.,telecommunication power management.,Telecommunication-- Security measures.,telecommunication security.,Wireless communication systems
Classification :
TK5103
.
2


40. Advanced security technologies in networking
Author: edited by Borka Jerman-Blazic, Wolfgang S. Schneider and Tomaz Klobucar
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures -- Congresses ، Computer networks,Congresses ، Computer security
Classification :
TK
5105
.
59
.
N38
2000

