- کتب و مجلات «608 عنوان»
- همه (885)
- مقاطع تحصیلی (1)
- کتب و مجلات (608)
- نرم افزار (266)
- فیلمهای آموزشی (11)
Junos Security
Transnational Security
Microsoft Azure Security
Untangle Network Security
Learning Puppet Security
Web Security
Security Intelligence
Mobile Application Security
A+, Network+, Security+ Exams i ...
If you’re preparing for the new CompTIA 2006 certification in A+, or the current Network+ and Security+ certifications, you’ll find this book invaluab ...
Junos Security
Junos Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, h ...
CCNA Security Portable Command ...
Preparing for the latest CCNA® Security exam? Here are all the CCNA Security commands you need in one condensed, portable resource. Filled with valuab ...
Network Security Through Data A ...
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security resea ...
A Practical Guide to Networking ...
This book describes how to use your iPhone, iPod touch, or iPad with iOS 8 on Wi-Fi and cellular/mobile networks securely, making connections with eas ...
Data Analysis For Network Cyber ...
There is increasing pressure to protect computer networks against unauthorized intrusion, and some work in this area is concerned with engineering sys ...
Android Security: Attacks and D ...
Android Security: Attacks and Defenses is for anyone interested in learning about the strengths and weaknesses of the Android platform from a security ...
Aspect-Oriented Security Harden ...
This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML langu ...
Transnational Security
Globalization and the easy movement of people, weapons, and toxins across borders has transformed security into a transnational phenomenon. Preventing ...
Microsoft Dynamics AX 2012 R3 S ...
Microsoft Dynamics AX is an ERP software that supports multisite operations. The variety of security features in MS Dynamics AX 2012 enables stakehold ...
Microsoft Azure Security
Microsoft Azure Security helps you ensure that all your applications and services stay secure and safe from any threats. Starting with a quick tour th ...
Untangle Network Security
Untangle NG Firewall simplifies network security because of its easy configuration and user-friendly interface. These attributes, in addition to its l ...
Security Planning: An Applied A ...
This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan ...
Guide to Computer Network Secur ...
This fully updated new edition explores the security issues, vulnerabilities and dangers encountered by the users of modern computing and communicatio ...
Distributed Networks: Intellige ...
For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized comm ...
Learning Puppet Security
As application and server environments become more complex, managing security and compliance becomes a challenging situation. By utilizing Puppet and ...
Cryptography and Network Securi ...
William Stallings’ Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unma ...
Web Security
In late 2013, approximately 40 million customer debit and credit cards were leaked in a data breach at Target. This catastrophic event, deemed one of ...
Security Intelligence
Similar to unraveling a math word problem, Security Intelligence: A Practitioner’s Guide to Solving Enterprise Security Challenges guides you through ...
Security in Wireless Sensor Net ...
This monograph covers different aspects of sensor network security including new emerging technologies. The authors present a mathematical approach to ...
Railway Infrastructure Security
This comprehensive monograph addresses crucial issues in the protection of railway systems, with the objective of enhancing the understanding of railw ...
Visual Cryptography for Image P ...
This unique book describes the fundamental concepts, theories and practice of visual cryptography. The design, construction, analysis, and application ...
Cyber Security: Analytics, Tech ...
The book, in addition to the cyber threats and technology, processes cyber security from many sides as a social phenomenon and how the implementation ...
Implementing Cisco IOS Network ...
Implementing Cisco IOS Network Security (IINS) Foundation Learning Guide Second EditionFoundation learning for the CCNA Security IINS 640-554 exam Imp ...
Mobile Application Security
Secure today’s mobile devices and applicationsImplement a systematic approach to security in your mobile application development with help from this p ...