-
«1075 عنوان»
- همه (1075)
- مقاطع تحصیلی (1)
- کتب و مجلات (882)
- آموزشی (1)
- نرم افزار (179)
- فیلمهای آموزشی (13)
Defensive Security Handbook
حاکمیت شرکتی و امنیت منابع در چین : دگرگونی منابع جهانی ...
Corporate Governance and Resource Security in China: Th ......
امنیت سایبر: تجزیه و تحلیل ترافیک، فناوری و اتوماسیون
Cyber Security: Analytics, Technology and Automation
تراهرتز و امنیت برنامه های کاربردی: آشکارسازهای، منابع ...
THz and Security Applications: Detectors, Sources and A ......
Data-Driven Security
Android Security Internals
24 گناه مرگبار از نقص برنامه نویسی نرم افزار امنیتی و چ ...
24 Deadly Sins of Software Security Programming Flaws a ......
طراحی ساختار، سیتم علائم و امنیت در راهآهنها
Infrastructure Design, Signalling and Security in Railw ...
امنیت اینترنت اشیا: مرور، راه حل های بلاک چین و باز کرد ...
IoT security: Review, blockchain solutions, and open ch ......
Social Security For Dummies, 3r ...
Make sure you get the benefits you’ve earned Navigate your way around the complex system with ease Incorporate Social Security into your financial pla ...
IT Security Risk Control Manage ...
This book explains how to construct an information security program, from inception to audit, with enduring, practical, hands-on advice and actionable ...
Web Security Testing Cookbook
Among the tests you perform on web applications, security testing is perhaps the most important, yet it’s often the most neglected. The recipes in the ...
Intermediate Security Testing w ...
With computer hacking attacks making headline news on a frequent occasion, learning ethical hacking has become a priority for those tasked with defend ...
Network Security Assessment, 2n ...
Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-base ...
Defensive Security Handbook
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish ...
حاکمیت شرکتی و امنیت منابع در چین ...
Corporate Governance and Resour ...
Corporate governance has become a household term and investors across the world are demanding more transparency and accountability from controllers of ...
Microsoft Security Essentials 1 ...
Microsoft Security Essentials provides real-time protection for your home PC that guards against viruses, spyware, and other malicious software. It is ...
Getting an Information Security ...
Get prepared for your Information Security job search! Do you want to equip yourself with the knowledge necessary to succeed in the Information Securi ...
Handbook of Communications Secu ...
“Handbook of Communications Security” gives the reader information related to all aspects of communications security, from the fundamental concepts to ...
Information Security The Comple ...
Today’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information ...
Cisco 877 IOS 12.4.15T2 Advance ...
the symptom is observed on a cisco 877 router that is running cisco.has anyone else had download stall problems with ios t softwareios software releas ...
امنیت سایبر: تجزیه و تحلیل ترافیک ...
Cyber Security: Analytics, Tech ...
Contains a unique codification of cyber securityExcellent book for students, postgraduates and professionalsGives a profound overview of the most spok ...
Computer safety, reliability, a ...
Invited Paper The Ten Most Powerful Principles for Quality in (Software and) Software Organizations for Dependable Systems . . . . . . . . . . . . . ...
تراهرتز و امنیت برنامه های کاربرد ...
THz and Security Applications: ...
These proceedings comprise invited papers from highly experienced researchers in THz technology and security applications. THz detection of explosives ...
Cryptography and Network Securi ...
For one-semester, undergraduate- or graduate-level courses in Cryptography, Computer Security, and Network Security. The book is suitable for self-stu ...
Data-Driven Security
Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This caref ...
Android Security Internals
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features h ...
طراحی ساختار، سیتم علائم و امنیت ...
Infrastructure Design, Signalli ...
این کتاب نشاندهندهی نمونهای از کمکهای اخیر محققان سراسر جهان در زمینه طراحی زیرساختهای راهآهن، سیستم علائم و امنیت است. بخش اول: سیستمهای راهآ ...
Kali Linux 2 Assuring Security ...
Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the t ...
امنیت اینترنت اشیا: مرور، راه حل ...
IoT security: Review, blockchai ...
رشته های مرتبط مهندسی کامپیوتر، فناوری اطلاعات گرایش های مرتبط امنیت اطلاعات، اینترنت و شبکه های گسترده، شبکه های کامپیوتری مجله نسل آینده سیستم ها ...
تسلط مامبو : تجارت الکترونیک ، قا ...
Mastering Mambo: E-Commerce, Te ...
I ordered this item and it was returned as undeliverable - at least twice.So I really can't comment other than that - the delivery system is not very ...