261. Synchronizing Internet Protocol Security (SIPSec) /
Author: by Charles A. Shoniregun.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols.,Internet-- Security measures.

262. Synchronizing Internet protocol security (SIPSec)
Author: / Charles A. Shoniregun
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Internet , Security measures,Computer network protocols
Classification :
E-BOOK

263. The Executive guide to information security: threats, challenges, and solutions
Author: Mark Egan with Tim Mather
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection
Classification :
HF
،
5548
.
32
،.
E325
،
2005


264. The Internet in the Mideast and North Africa: free expression and censorship
Author:
Library: State Department Library (Tehran)
Subject: Internet (Computer network) - Social aspects - Middle East,Internet (Computer network) - Law and legislation - Social aspects - Middle East,Internet (Computer network) - Security measures - Middle East,Internet (Computer network) - Censorship - Middle East,Privacy, Rights of - Middle East,Internet (Computer network) - Social aspects - Afica, North,Internet (Computer network) - Security measures - Africa, North,Internet (Computer network) - Censorship - Africa, North,Privacy, Rights of - Africa, North

265. The Internet security guidebook
Author: / Juanita Ellis, Tim Speed
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer networks -- Security measures,Internet (Computer network) -- Security measures,Electronic commerce -- Security measures
Classification :
TK
5105
.
59
.
E44
2001


266. The Internet security guidebook : from planning to deployment
Author: Juanita Ellis, Tim Speed
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,Security measures ، Internet,Security measures ، Electronic commerce
Classification :
TK
5105
.
59
.
E43


267. The NAT handbook : implementing and managing network address translation
Author: Dutcher, Bill
Library: Central Library and Documentation Center (Kerman)
Subject: ، Directory services )Computer network technology(,، Internet addresses,، Computer networks - Security measures
Classification :
TK
5105
.
595
.
D88
2001


268. <The> Web Application Hacker's Handbook
Author: \ Dafydd Stuttard, Marcus Pinto.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Internet -- Security measures. ,Computer security,اینترنت -- تدابیر ایمنی ,کامپیوترها -- ایمنی اطلاعات
Classification :
E-Book
,

269. The art of invisibility :
Author: Kevin Mitnick with Robert Vamosi ; foreword by Mikko Hypponen.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Internet-- Security measures.,Privacy, Right of.,Privacy, Right of, Popular works.,Computer security.,COMPUTERS-- Hardware-- Mobile Devices.,COMPUTERS-- Hardware-- Personal Computers.,COMPUTERS-- Internet.,COMPUTERS-- Security-- Online Safety & Privacy.,COMPUTERS-- Social Aspects.,COMPUTERS-- Web-- Social Media.,Data protection.,Internet-- Security measures.,Privacy, Right of.,TECHNOLOGY & ENGINEERING-- Mobile & Wireless Communications.,TECHNOLOGY & ENGINEERING-- Social Aspects.,TECHNOLOGY & ENGINEERING-- Telecommunications.
Classification :
TK5105
.
875
.
I57
M58
2017


270. The art of invisibility :the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data
Author: Mitnick, Kevin D. )Kevin David(
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Security measures ، Internet,، Computer security,، Data protection,، Privacy, Right of
Classification :
TK
5105
.
I57M58
2017


271. The complete guide to Internet security
Author: / Mark S. Merkow & James Breithaupt
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Internet,Computer security,-- Security measures
Classification :
005
.
8
M564C
2000


272. The complete guide to Internet security
Author: Merkow, Mark S.
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Internet-- Security measures,، Computer security
Classification :
TK
5105
.
875
.
I57
.
M465
2000


273. The complete guide to internet security
Author: / Mark S. Merkow and James Breithoupt
Library: Tehran University, technical faculty libraries 1 (Tehran)
Subject: Internet (Computer network)-Security measures,Computer Security
Classification :
TK
5105
.
875
.
I57M465
2000


274. The complete idiot's guide to Internet privacy and security
Author: Gralla, Preston
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,Security measures ، Internet
Classification :
QA
76
.
9
.
A25
G717
2002


275. The complete idiot's guide to internet privacy and security
Author: Gralla, Preston
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: ، Computer security,، Internet--Security measures
Classification :
QA
76
.
9
.
A25
G717
2002


276. The complete idiot's guide to protecting yourself online /
Author: by Preston Gralla.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Internet-- Security measures.,Privacy, Right of-- United States.,Computer security.,COMPUTERS-- Networking-- Intranets & Extranets.,COMPUTERS-- Web-- General.,Internet-- Security measures.,Privacy, Right of.,United States., 7
Classification :
TK5105
.
875
.
I57
G724
1999eb


277. The death of the internet
Author: edited by Markus Jakobsson
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes,Data protection,Electronic commerce-- Security measures,Internet-- Security measures
Classification :
TK5105
.
875
.
I57
.
J34
2012


278. The hundredth window: protecting your privacy and security in the age of the Internet
Author: Jennings, Charles
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,Security measures ، Internet
Classification :
QA
76
.
9
.
A25
J46
2000


279. The internet of risky things :
Author: Sean Smith.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Embedded Internet devices.,Internet of things-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Hardware.,COMPUTERS-- Internet.,COMPUTERS-- Security-- Online Safety & Privacy.,Embedded Internet devices.,TECHNOLOGY & ENGINEERING-- Industrial Technology.,TECHNOLOGY & ENGINEERING-- Mobile & Wireless Communications.,TECHNOLOGY & ENGINEERING-- Remote Sensing & Geographic Information Systems.,TECHNOLOGY & ENGINEERING-- Robotics.,TECHNOLOGY & ENGINEERING-- Sensors.
Classification :
TK5105
.
8857
.
S65
2017


280. The personal cybersecurity bible
Author: / Jerri L. Ledford
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer security,Internet -- Security measures
Classification :
QA
76
.
9
.
A25
L4
2006

