-
«1075 عنوان»
- همه (1075)
- مقاطع تحصیلی (1)
- کتب و مجلات (882)
- آموزشی (1)
- نرم افزار (179)
- فیلمهای آموزشی (13)
VMware vCloud Security
Cloud Computing and Security
End-to-End Network Security
Beautiful Security
The Myths of Security
Android Apps Security
Moodle Security
Spring Security 3.1
Security
Security Advisor 2017-11-01
VMware vCloud Security
VMware vCloud Security provides the reader with in depth knowledge and practical exercises sufficient to implement a secured private cloud using VMwar ...
Cloud Computing and Security
This book constitutes the proceedings of the International Conference on Cloud Computing and Security (ICCCS 2015) will be held on August 13-15, 2015 ...
A Practical Guide to Networking ...
This book describes how to use your iPhone, iPod touch, or iPad with iOS 8 on Wi-Fi and cellular/mobile networks securely, making connections with eas ...
A+, Network+, Security+ Exams i ...
If you’re preparing for the new CompTIA 2006 certification in A+, or the current Network+ and Security+ certifications, you’ll find this book invaluab ...
Nmap 6: Network Exploration and ...
Master the basic scanning techniques for port scanning and host discovery. Perform security checks to web applications, mail servers and databases. Le ...
End-to-End Network Security
End-to-End Network Security is designed to counter the new generation of complex threats. Adopting this robust security strategy defends against highl ...
Beautiful Security
In Beautiful Security, today’s security experts offer a collection of essays that describe bold and extraordinary methods to secure computer systems i ...
The Myths of Security
If you think computer security has improved in recent years, Myths of Security will shake you out of your complacency. Longtime security professional ...
Network Security Assessment, 2n ...
Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-base ...
The Fundamentals of Network Sec ...
Here’s a practical book that introduces fundamental network security concepts, principles, and terms. It helps you identify the best type of intrusion ...
Android Apps Security
Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can ...
Moodle Security
Moodle Security will show you how to make sure that only authorized users can access the information on your Moodle site. This may seem simple, but, e ...
Spring Security 3.1
Learn to leverage the power of Spring Security to keep intruders at bay through simple examples that illustrate real world problems. Each sample demon ...
Security
در این مجموعه شاهد 15 تصویر با کیفیت با عنوان امنیت می باشید، این تصاویر با فرمت JPG بر روی سایت برای دانلود قرار گرفته است.
Security and loss prevention 4t ...
About the Author ............................ xvii Preface............................................. xix Acknowledgments ........................ ...
Facility manager's guide t ...
Table of Contents Foreword ............................................................................................ xiii Preface ............... ...
Stabilization, safety, and secu ...
Table of Contents Invited Talks Challenges in Personalizing and Decentralizing the Web: An Overview of GOSSPLE . . . . . . . . . . . . . . . . . . ...
Computer safety, reliability, a ...
Session 1 System Analysis Reliability Analysis of Safety-Related Communication Architectures . . . . 1 Oliver Schulz and Jan Peleska A Novel HAZOP ...
Coping with global environmenta ...
Forewords Achim Steiner, Executive Director of the United Nations Environment Programme (UNEP) and Under-Secretary-General of the United Nations V ...
The state of food insecurity in ...
Undernourishment around the world High food prices and food security Towards the Summit commitments
Security Advisor 2017-11-01
این مجله به موضوع امنیت پرداخته و اطلاعات مفید و جالبی به خوانندگان خودش میده.
European Security and Defence 6 ...
این مجله هم از مجموعه مجلات نظامی هست که سلاح ها و نیروهای نظامی جدید رو معرفی و بررسی می کنه.
Cyber Security - Issue 2, 2017
این مجله از مجموعه مجلات امنیت هست که به بررسی راه های نفوذ و خنثی کردن اونها میپردازه که علاقه مندان خاص خودش رو داره.