-
«1075 عنوان»
- همه (1075)
- مقاطع تحصیلی (1)
- کتب و مجلات (882)
- آموزشی (1)
- نرم افزار (179)
- فیلمهای آموزشی (13)
JavaScript Security
NTP Security
OpenStack Cloud Security
Anderson-Security
Mgosoft PDF Security 9.7.4
Reason Core Security 2.4.1.0
Clean Disk Security 8.09
Perimeter security
Construction site security
Expert Oracle Application Expre ...
Expert Oracle Application Express Security covers all facets of security related to Oracle Application Express (APEX) development. From basic settings ...
Hands-On Oracle Application Exp ...
As a Rapid Application Development framework, Oracle Application Express (APEX) allows websites to easily be created based on data within an Oracle da ...
Expert Oracle and Java Security
Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database appl ...
JavaScript Security
This book starts off with an introduction to JavaScript security and gives you an overview of the basic functions JavaScript can perform on the Web, b ...
Pro PHP Security, 2nd Edition
PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the 2nd edition of this authoritative PHP security book covers foundational PHP ...
CCSP (ISC)2 Certified Cloud Sec ...
The only official study guide for the new CCSP exam CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide is your ultimate resource ...
Practical Linux Security Cookbo ...
With the growing popularity of Linux, more and more administrators have started moving to the system to create networks or servers for any task. This ...
Introduction to Hardware Securi ...
This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past ...
NTP Security
Learn the risks associated with Network Time Protocol (NTP) security and how to minimize those risks while deploying and managing the protocol. You wi ...
Hardware IP Security and Trust
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP c ...
OpenStack Cloud Security
OpenStack is a system that controls large pools of computing, storage, and networking resources, allowing its users to provision resources through a u ...
VMware View Security Essentials
Most people associate security with network security and focus on firewalls and network monitoring. However, there is more to security than that. Secu ...
Practical Information Security ...
Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to ...
Anderson-Security
Poul Anderson was one of the most popular authors in SF. Born in 1921, he began his career in the Golden Age of SF in the 1950s, and was a regular con ...
Radical Islam and International ...
by: Efraim Inbar, Hillel Frisch Radical Islam poses a political challenge in the modern world which is like that of no other radical religious movemen ...
Mgosoft PDF Security 9.7.4
برنامه ای ساده و مستقل که می تواند به شما کمک کند تا از کلمه های عبور که برای محافظت فایل های پی دی اف قرارداده شده است رمزگشایی کنید.با ابزار Mgosoft ...
Reason Core Security 2.4.1.0
یک برنامه برای اسکن سیستم شما برای تشخیص سریع و حذف نرم افزارهای مخرب،ابزارهای تبلیغاتی مزاحم و مضر سریع تر از رقیبانش است. در هسته اصلی کامپیوتر حفاظ ...
Malwarebytes Endpoint Security ...
Malwarebytes Endpoint Security is an endpoint protection platform that uses multiple technologies to proactively protect your computers against unknow ...
Low voltage wiring : security/f ...
The Security Systems Business -- A Business Built on Contracts -- Estimating the Installation of Security Systems -- Managing a Security Systems Bu ...
Clean Disk Security 8.09
به طور معمول وقتی چیزی رو از کامپیوتر تون پاک می کنید، اون فایل یا فولدر از روی هارد دیسک شما پاک نمیشه بلکه فقط قسمتی از فایل که در اون اطلاعات مربوط ...
Perimeter security
Threat assessment and risk analysis basics -- Perimeter fence -- Protective barriers -- Security lighting -- Electronic access control -- Alarms: ...
Construction site security
Chapter 1: Overview Chapter 2: Threat Assessment and Risk Analysis Basics Chapter 3: Security Overview Chapter 4: The Security Survey Chapter 5: Perim ...
RegRun Security Suite Platinum ...
نرم افزاری طراحی شده برای حفاظت و امنیت می باشد. این نرم افزار موثر برای سیستم و مناسب با نیازهای کاربر طراحی شده است. عمده فعالیت های این نرم افزار د ...
Security planning & disaste ...
Guiding Principles in Plan Development -- The Role of the Information Security Program -- Getting Off on the Right Foot -- Establishing the Role of ...
Mechatronics for safety, securi ...
Table of Contents; Preface; Skill-Assist and Its Related Safety-Oriented Technology; From RoboCup to RoboCity CoRE; Welfare; Tele-Operation; Workers i ...