• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۳ پاسخ غیر تکراری از ۳ پاسخ تکراری در مدت زمان ۰,۷۷ ثانیه یافت شد.

1. How to break software security: effective techniques for security testing

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Whittaker, James A.

Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)

Subject: ، Computer security,Testing ، Computer software,Reliability ، Computer software

Classification :
QA
76
.
9
.
A25
W48
2004

2. Secure and resilient software :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Mark S. Merkow, Lakshmikanth Raghavan.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Application software-- Development.,Computer security.,Computer software-- Reliability.,Computer software-- Testing.

Classification :

3. Unauthorised access: physical penetration testing for IT security teams

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Allsopp, Wil.

Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)

Subject: ، Computer security,Security measures ، Computer networks,Testing ، Computer software,Reliability ، Computer software

Classification :
QA
76
.
9
.
A25
A456
2009
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival