21. Anti-hacker tool kit
پدیدآورنده : / Keith J. Jones, Mike Shema, Bradley C. Johnson
کتابخانه: Imam Reza International University library and information center (Khorasan Razavi)
موضوع : Data protection,Computer networks--Security measures
رده :
TK5105
.
59
.
J65


22. Anti-hacker tool kit
پدیدآورنده : / Keith J. Jones, Mike Shema, Bradley C. Johnson
کتابخانه: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
موضوع : Data protection,Computer networks- Security measures
رده :
TK5105
.
59
.
J65
2002


23. Anti-hacker tool kit
پدیدآورنده : / Mike Shema ... [et al.]
کتابخانه: Central Library and Archive Center of shahid Beheshti University (Tehran)
موضوع : Data protection,Computer networks,-- Security measures
رده :
005
.
8
S545A
2006


24. Anti-hacker tool kit
پدیدآورنده : Shema, Mike
کتابخانه: Library of College of Science University of Tehran (Tehran)
موضوع : ، Data protection,، Computer networks -- Security measures
رده :
TK
5105
.
59
.
S54
2004


25. Anti-hacker tool kit
پدیدآورنده : Mike Shema...]et al.[
کتابخانه: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
موضوع : ، Data protection,Security measures ، Computer networks
رده :
TK
5105
.
59
.
S54
2006


26. Anti-hacker tool kit
پدیدآورنده : / Keith J. Jones, Mike Shema, Bradley C. Johnson
کتابخانه: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)
موضوع : Data protection,Computer networks- Security measures
رده :
TK5105
.
59
.
J66
2002


27. Anti-hacker tool kit
پدیدآورنده : Mike Shema
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures,Data protection

28. Anti-hacker tool kit
پدیدآورنده : Shema, Mike ... ]et al.[
کتابخانه: (Semnan)
موضوع : ، Data protection,Security measures ، Computer networks
رده :
TK
5105
.
59
.
A57
2006


29. Application security in the ISO27001 environment
پدیدآورنده : Vinod Vasudevan ... [et al.].
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures-- Standards.,Computer security-- Standards.,Computer security.,Data protection-- Standards.,Information technology-- Standards.

30. Applied information security :
پدیدآورنده : David Basin, Patrick Schaller, Michael Schläpfer.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Data protection.
رده :
QA76
.
9
.
A25
B37
2011


31. Applied information security
پدیدآورنده :
کتابخانه: Central Library and Documents Center of Mazandaran University (Mazandaran)
موضوع : Computer security. ; Data encryption (Computer science) ; Computer networks ; Security measures. ; Data protection. ;

32. Applied information security
پدیدآورنده : / David Basin, Patrick Schaller, Michael Schleapfer
کتابخانه: Central Library and Document Center of Shahid Chamran University (Khuzestan)
موضوع : Computer security.,Data encryption (Computer science),Computer networks--Security measures,Data protection.
رده :
QA
,
76
.
9
,.
A25
,
B3798
,
2011


33. Assessing and managing security risk in IT systems :
پدیدآورنده :
کتابخانه: Central Library and Documents Center of Mazandaran University (Mazandaran)
موضوع : Computer security ; Data protection ; Risk assessment ;

34. Assessing and managing security risk in IT systems
پدیدآورنده : / John McCumber
کتابخانه: Central Library and Document Center of Shahid Chamran University (Khuzestan)
موضوع : Computer security.,Data protection.,Risk assessment.
رده :
QA
,
76
.
9
,.
A25
,
M4284
,
2005


35. Auditing cloud computing :
پدیدآورنده : [edited by] Ben Halpert
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Business enterprises-- Computer networks-- Security measures,Cloud computing-- Security measures,Data protection,Information technology-- Security measures
رده :
HF5548
.
37
.
A93
2011


36. Buffer overflow attacks, detect, exploit,prevent
پدیدآورنده : James C.Foster, Vitaly Osipor, Nish Bhalla ,Niels Heinen
کتابخانه: Library of Niroo Research Institue (Tehran)
موضوع : ، Assembles language )Computer program language(,، Data protection,، Computer security
رده :
QA
76
.
73
.
A8B8


37. Business Continuity Management :
پدیدآورنده : Stefan Spörrer.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures.,Crisis management.,Data protection.,Emergency management-- Planning.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer networks-- Security measures.,Crisis management.,Data protection.,Emergency management-- Planning.
رده :
HD49


38. CCS'10 : proceedings of the 17th ACM Conference on Computer and Communications Security, October 4-8, 2010, Chicago, Illinois, USA
پدیدآورنده : ]general chair, Ehab Al-Shaer; program chairs, Angelos D. Keromytis, Vitaly Shmatikov[; sponsored by, ACM SIGSAC; supported by, National Science Foundation...]et al.[
کتابخانه: Library of Institute for Research in Fundamental Sciences (Tehran)
موضوع : Congresses ، Computer security,Congresses ، Data protection,Congresses ، Data encryption )Computer science(
رده :
QA
76
.
9
.
A25A26
2010


39. Cloud computing security :
پدیدآورنده : editor, John R. Vacca
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Cloud computing-- Security measures.,Computer networks-- Security measures.,Computer security.,Data protection.
رده :
QA76
.
585
.
C5825
2017eb


40. Cloud computing security :foundations and challenges
پدیدآورنده : editor, John R. Vacca
کتابخانه: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
موضوع : Security measures ، Cloud computing,Security measures ، Computer networks,، Data protection,، Computer security
رده :
QA
76
.
585
.
C5825

