-
«1075 عنوان»
- همه (1075)
- مقاطع تحصیلی (1)
- کتب و مجلات (882)
- آموزشی (1)
- نرم افزار (179)
- فیلمهای آموزشی (13)
امنیت کامپیوتر، قابلیت اطمینان، و امنیت: 32 کنفرانس بین ...
Computer Safety, Reliability, and Security: 32nd Intern ......
پویا امنیت سیستم هم پیوسته برق قدرت - جلد 1
Dynamic Security of Interconnected Electric Power Syste ...
Security for Web Developers
امنیت و حریم خصوصی در شبکه های ارتباطی: کنفرانس بین الم ...
Security and Privacy in Communication Networks: 5th Int ......
سفارشات مرگ: پیشتاز مدرن تروریسم در انقلاب روسیه ( Prae ...
Death Orders: The Vanguard of Modern Terrorism in Revol ......
End-to-End Network Security
شبکه نرم افزار : مجازی سازی ، SDN ، 5G ، امنیت
Software Networks: Virtualization, SDN, 5G, Security
فاجعه ارتباطات در جهان رسانه ها حال تغییر (امنیت داخلی ...
Disaster Communications in a Changing Media World (Butt ......
Spring Security 3
ثبات، ایمنی و امنیت سیستم های توزیع: 17 سمپوزیوم بین ال ...
Stabilization, Safety, and Security of Distributed Syst ......
JavaScript Security
Cyber Security: Analytics, Tech ...
The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation ...
Application Security for the An ...
With the Android platform fast becoming a target of malicious hackers, application security is crucial. This concise book provides the knowledge you n ...
امنیت کامپیوتر، قابلیت اطمینان، و ...
Computer Safety, Reliability, a ...
This book constitutes the refereed proceedings of the 32nd International Conference on Computer Safety, Reliability, and Security, SAFECOMP 2013, held ...
Software Networks: Virtualizati ...
The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datac ...
Security for Web Developers
As a web developer, you may not want to spend time making your web app secure, but it definitely comes with the territory. This practical guide provid ...
The Manager’s Guide to Web Appl ...
The Manager’s Guide to Web Application Security is a concise, information-packed guide to application security risks every organization faces, written ...
امنیت و حریم خصوصی در شبکه های ار ...
Security and Privacy in Communi ...
This book constitutes the thoroughly refereed post-conference proceedings of the 5th International ICST Conference, SecureComm 2009, held in September ...
سفارشات مرگ: پیشتاز مدرن تروریسم ...
Death Orders: The Vanguard of M ...
Arguing that Russia is the birthplace of modern terrorism, Death Orders: The Vanguard of Modern Terrorism in Revolutionary Russia uses the nation as a ...
تجزیه و تحلیل امنیت
Security analysis
بنجامین گراهام (انگلیسی: Benjamin Graham؛ ۹ مهٔ ۱۸۹۴(1894-05-09) – ۲۱ سپتامبر ۱۹۷۶(1976-09-21)) یک اقتصاددان اهل ایالات متحده آمریکا بود.
CISSP (ISC)2 Certified Informat ...
CISSP Study Guide – fully updated for the 2015 CISSP Body of Knowledge CISSP (ISC)2 Certified Information Systems Security Professional Official Stud ...
End-to-End Network Security
End-to-End Network Security is designed to counter the new generation of complex threats. Adopting this robust security strategy defends against highl ...
Expert Oracle Application Expre ...
Expert Oracle Application Express Security covers all facets of security related to Oracle Application Express (APEX) development. From basic settings ...
Expert Oracle and Java Security
Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database appl ...
Pro iOS Security and Forensics
Examine how to keep iOS devices safe in the physical world, including creating company policies for iPhones; assessing and defending against cyber vul ...
شبکه نرم افزار : مجازی سازی ، SDN ...
Software Networks: Virtualizati ...
The goal of this book is to describe new concepts for Internet next generation. This architecture is based on virtual networking using Cloud and datac ...
فاجعه ارتباطات در جهان رسانه ها ح ...
Disaster Communications in a Ch ...
Communications is key to the success of disaster mitigation, preparedness, response and recovery. Accurate information disseminated to the general pub ...
Spring Security 3
Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java ...
ثبات، ایمنی و امنیت سیستم های توز ...
Stabilization, Safety, and Secu ...
پل گیوم آندره ژید (به فرانسوی: Paul Guillaume André Gide) (۱۸۶۹ - ۱۹۵۱) نویسندهٔ فرانسوی و برنده جایزه ادبی نوبل در سال ۱۹۴۷ بود.
AAA هویت مدیریت امنیت
AAA Identity Management Securit ...
Cisco's complete, authoritative guide to Authentication, Authorization, and Accounting (AAA) solutions with CiscoSecure ACS AAA solutions are very f ...
31 Days Before Your CCNA Securi ...
31 Days Before Your CCNA Security Exam offers you an engaging and practical way to understand the certification process, commit to taking the CCNA Sec ...
Implementing Cisco IOS Network ...
Implementing Cisco IOS Network Security (IINS) Foundation Learning Guide Second EditionFoundation learning for the CCNA Security IINS 640-554 exam Imp ...
JavaScript Security
This book starts off with an introduction to JavaScript security and gives you an overview of the basic functions JavaScript can perform on the Web, b ...
Practical Linux Security Cookbo ...
With the growing popularity of Linux, more and more administrators have started moving to the system to create networks or servers for any task. This ...
Loop security and tensile prope ...
Tensile and knot properties of new generation (polyblend) and traditional suture materials in orthopedic surgery were investigated in standard labor ...