- کتب و مجلات «608 عنوان»
- همه (885)
- مقاطع تحصیلی (1)
- کتب و مجلات (608)
- نرم افزار (266)
- فیلمهای آموزشی (11)
هواشناسی و امنیت انرژی : شبیه سازی ، پیش بینی، و مدیریت
Meteorology and energy security : simulations, projecti ...
جریان Bioelectromagnetics مفاهیم: مکانیسم اثر بیولوژیکی ...
Bioelectromagnetics Current Concepts: The Mechanisms of ......
سیاست خارجی و دیپلماسی آفریقایی از دوران باستان تا قرن ...
African Foreign Policy and Diplomacy from Antiquity to ......
معتاد به نفت: آمریکا درایو های بی امان برای امنیت انرژی
Addicted to Oil: America's Relentless Drive for Energy ...
اعلامیه استقلال انرژی: چگونه آزادی از نفت خارجی بهبود ا ...
A Declaration of Energy Independence: How Freedom from ......
گاساتا (GASATA) یک الگوریتم ژنتیکی به عنوان ابزاری جایگ ...
GasSATA, a Genetic Algorithm. as an Alternative Tool. f ......
فناوری اطلاعات (IT) نرم افزار امنیتی در هنگ کنگ: مرجع ا ...
Information Technology (IT) Security Software in Hong K ......
Anderson-Security
OpenStack Cloud Security
NTP Security
کتاب آشپزی امنیت لینوکس
Linux Security Cookbook
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ...
کتاب آشپزی امنیت لینوکس
Linux Security Cookbook
I picked this book up since it had a chapter on iptables however after reading more I found that this book is quite dated. Someone who is still runnin ...
کتاب آشپزی امنیت لینوکس
Linux Security Cookbook
The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting ac ...
هواشناسی و امنیت انرژی : شبیه ساز ...
Meteorology and energy security ...
"Meteorological data is essential for both day-to-day energy management and for planning for the world's future energy security. The editor of this co ...
جریان Bioelectromagnetics مفاهیم: ...
Bioelectromagnetics Current Con ...
This volume is based on the lectures and selected posters on different aspects of biological effects of EMF, presented at the NATO Advanced Research W ...
سیاست خارجی و دیپلماسی آفریقایی ا ...
African Foreign Policy and Dipl ...
African statehood predates that of Europe, as well as the rest of Western civilization, and yet by imposing Western values on Africa and its peoples, ...
معتاد به نفت: آمریکا درایو های بی ...
Addicted to Oil: America's ...
The book begins with some good definitions that guide the global oil industry. In terms of "energy grades" oil is a clear winner for powering Large In ...
اعلامیه استقلال انرژی: چگونه آزاد ...
A Declaration of Energy Indepen ...
Every American should read "A Declaration of Energy Independence: How Freedom from Foreign Oil Can Improve National Security, Our Economy, and the Env ...
گاساتا (GASATA) یک الگوریتم ژنتیک ...
GasSATA, a Genetic Algorithm. a ...
رشته های مرتبط مهندسی کامپیوتر، برنامه نویسی کامپیوتر و مهندسی الگوریتم ها و محاسبات ۲- استفاده از الگوریتم های ژنتیکی برای تشخیص سوء استفاده الگوریتم ...
Cisco Next-Generation Security ...
Network threats are emerging and changing faster than ever before. Cisco Next-Generation Network Security technologies give you all the visibility and ...
CompTIA Security+ Practice Test ...
1,000 Challenging practice questions for Exam SY0-501 CompTIA Security+ Practice Tests provides invaluable practice for candidates preparing for Exam ...
Network Security Through Data A ...
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this p ...
CompTIA Security+ Review Guide, ...
Consolidate your knowledge base with critical Security+ review CompTIA Security+ Review Guide, Fourth Edition, is the smart candidate’s secret weapon ...
Pro iOS Security and Forensics
Examine how to keep iOS devices safe in the physical world, including creating company policies for iPhones; assessing and defending against cyber vul ...
CompTIA Security+: Get Certifie ...
The CompTIA Security+ Get Certified Get Ahead SY0-401 Study Guide is an update to the top-selling SY0-201 and SY0-301 study guides, which have helped ...
Radical Islam and International ...
by: Efraim Inbar, Hillel Frisch Radical Islam poses a political challenge in the modern world which is like that of no other radical religious movemen ...
Anderson-Security
Poul Anderson was one of the most popular authors in SF. Born in 1921, he began his career in the Golden Age of SF in the 1950s, and was a regular con ...
Practical Information Security ...
Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to ...
VMware View Security Essentials
Most people associate security with network security and focus on firewalls and network monitoring. However, there is more to security than that. Secu ...
OpenStack Cloud Security
OpenStack is a system that controls large pools of computing, storage, and networking resources, allowing its users to provision resources through a u ...
Hardware IP Security and Trust
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights how security of IP c ...
NTP Security
Learn the risks associated with Network Time Protocol (NTP) security and how to minimize those risks while deploying and managing the protocol. You wi ...
Introduction to Hardware Securi ...
This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past ...
Practical Linux Security Cookbo ...
With the growing popularity of Linux, more and more administrators have started moving to the system to create networks or servers for any task. This ...