• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۹۸ پاسخ غیر تکراری از ۹۹ پاسخ تکراری در مدت زمان ۰,۸۹ ثانیه یافت شد.

21. Formal models and techniques for analyzing security protocols /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Véronique Cortier and Steve Kremer

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Electronic information resources-- Access control

Classification :
QA76
.
9
.
A25
F654
2011

22. IT security governance guidebook with security program metrics on CD-ROM

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Cohen, Frederick B., 1956-

Library: Central Library and Document Center of Isfahan University (Esfahan)

Subject: Computer networks- Security measures ► Computers- Access control ► Confidential business information- Security measures- Data processing ► Corporate governance ► Software measurement

Classification :
005
C678i

23. Identity and access management

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Ertem Osmanoglu

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,False personation-- Prevention

Classification :
QA76
.
9
.
A25
O783
2013

24. Information security and privacy :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Julian Jang-Jaccard, Fuchun Guo (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computers-- Access control, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Data encryption (Computer science)

Classification :
QA76
.
9
.
A25
A279
2019eb

25. Instant penetration testing

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Vyacheslav Fadyushin

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Computers-- Access control,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25
F33
2013

26. Integrated security systems design : a complete reference for building enterprise-wide digital security systems

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Thomas Norman

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Computer networks -- Security measures,، Computers -- Access control,Security measures ، Information storage and retrieval systems

Classification :
TK
5105
.
5
.
N67I5
2014

27. Internet and Intranet security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Oppliger, Rolf

Library: Central Library of Amirkabir University of Technology (Tehran)

Subject: Internet )Computer network( - Security measures , Intranets )Computer networks( - Security measures , Computers - Access control , TCP/IP )Computer network protocol(

Classification :
TK
5105
.
875
.
I57
O67
1998

28. Internet and Intranet security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Rolf Oppliger

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Internet- Security measures,Intranets (Computer networks)- Security measures,Computers- Access control,TCP/IP (Computer network protocol)

Classification :
TK5105
.
875
.
I57
,
O67
1998

29. Internet and Intranet security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Rolf Oppliger

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Internet- Security measures,Intranets (Computer networks)- Security measures,Computers- Access control,TCP/IP (Computer network protocol)

Classification :
TK5105
.
875
.
I57
,
O67
2001

30. Internet and Intranet security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Rolf Oppliger

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Security measures ، Internet,Security measures ، Intranets )Computer networks(,، Computers -- Access control,، TCP/IP )Computer network protocol(

Classification :
TK
5105
.
875
.
I57O67

31. Internet and Intranet security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Oppliger, Rolf.

Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)

Subject: Security measures ، Internet )Computer network(,Security measures ، Intranets )Computer networks(,Access control ، Computers,، TCP/IP )Computer network protocol(

Classification :
TK
5105
.
875
.
I57
O67
1998

32. Internet and intranet security management

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Lech Janczewski

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Internet- Security measures,Intranets (Computer networks)- Security measures,Computers- Access control,Cryptography

Classification :
TK5105
.
875
.
I57
,
J358
2000

33. Internet and intranet security management

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Lech Janczewski

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Internet- Security measures,Intranets (Computer networks)- Security measures,Computers- Access control,Cryptography

Classification :
E-BOOK

34. Intrusion Detection with Snort

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: \ Jack Koziol

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Computer networks -- Security measures,Computer security,Computers -- Access control,شبکه‌های کامپیوتری -- تدابیر ایمنی,امنیت کامپیوتر,کامپیوترها -- کنترل دستیابی

Classification :
E-Book
,

35. Intrusion detection systems with Snort

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Rafeeq Ur Rehman

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Computers- Access control

Classification :
TK5105
.
59
.
R44
2003

36. Intrusion detection systems with Snort

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Rafeeq Ur Rehman

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Computers- Access control

Classification :
TK5105
.
59
.
R44
2003

37. Intrusion detection systems with Snort

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Rafeeq Ur Rehman

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer networks- Security measures,Computers- Access control

Classification :
E-BOOK

38. Intrusion detection systems with Snort

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Rafeeq Ur Rehman

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Computers- Access control

Classification :
TK5105
.
59
.
R44
2003

39. Intrusion detection systems with Snort :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Rafeeq Ur Rehman.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computers-- Access control.

Classification :

40. Intrusion detection with Snort

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer networks ; Security measures ; Computer security ; Computers ; Access control ;

Classification :
  • »
  • 5
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival