- کتب و مجلات «608 عنوان»
- همه (885)
- مقاطع تحصیلی (1)
- کتب و مجلات (608)
- نرم افزار (266)
- فیلمهای آموزشی (11)
بیوتکنولوژی ، امنیت و جستجو برای محدودیت: تحقیق پژوهش و ...
Biotechnology, Security and the Search for Limits: An I ......
پیشرفته احتراق و Aerothermal فن آوری: حفاظت از محیط زیس ...
Advanced Combustion and Aerothermal Technologies: Envir ......
Fuzzing برای امنیت نرم افزار تضمین کیفیت و تست (خانه Ar ...
Fuzzing for Software Security Testing and Quality Assur ......
Fuzzing برای امنیت نرم افزار تضمین کیفیت و تست (خانه Ar ...
Fuzzing for Software Security Testing and Quality Assur ......
VMware vCloud Security
Cloud Computing and Security
End-to-End Network Security
Beautiful Security
The Myths of Security
Android Apps Security
Moodle Security
Spring Security 3.1
امنیت انرژی چالش های قرن 21 : آمو ...
Energy Security Challenges for ...
The impact of energy on global security and economy is clear and profound, and this is why in recent years energy security has become a source of conc ...
بیوتکنولوژی ، امنیت و جستجو برای ...
Biotechnology, Security and the ...
Since 9/11 and the U.S. anthrax attacks, public, and policy concerns about the security threats posed by biological weapons has increased significantl ...
پیشرفته احتراق و Aerothermal فن آ ...
Advanced Combustion and Aerothe ...
Here readers will find a summary of proceedings at a highly important NATO workshop. The ARW Advanced Combustion and Aerothermal Technologies: Environ ...
Fuzzing برای امنیت نرم افزار تضمی ...
Fuzzing for Software Security T ...
"Fuzzing for Software Security Testing and Quality Assurance" gives software developers a powerful new tool to build secure, high-quality software, an ...
Fuzzing برای امنیت نرم افزار تضمی ...
Fuzzing for Software Security T ...
"Fuzzing for Software Security Testing and Quality Assurance" gives software developers a powerful new tool to build secure, high-quality software, an ...
VMware vCloud Security
VMware vCloud Security provides the reader with in depth knowledge and practical exercises sufficient to implement a secured private cloud using VMwar ...
Cloud Computing and Security
This book constitutes the proceedings of the International Conference on Cloud Computing and Security (ICCCS 2015) will be held on August 13-15, 2015 ...
A Practical Guide to Networking ...
This book describes how to use your iPhone, iPod touch, or iPad with iOS 8 on Wi-Fi and cellular/mobile networks securely, making connections with eas ...
A+, Network+, Security+ Exams i ...
If you’re preparing for the new CompTIA 2006 certification in A+, or the current Network+ and Security+ certifications, you’ll find this book invaluab ...
Nmap 6: Network Exploration and ...
Master the basic scanning techniques for port scanning and host discovery. Perform security checks to web applications, mail servers and databases. Le ...
End-to-End Network Security
End-to-End Network Security is designed to counter the new generation of complex threats. Adopting this robust security strategy defends against highl ...
Beautiful Security
In Beautiful Security, today’s security experts offer a collection of essays that describe bold and extraordinary methods to secure computer systems i ...
The Myths of Security
If you think computer security has improved in recent years, Myths of Security will shake you out of your complacency. Longtime security professional ...
Network Security Assessment, 2n ...
Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-base ...
The Fundamentals of Network Sec ...
Here’s a practical book that introduces fundamental network security concepts, principles, and terms. It helps you identify the best type of intrusion ...
Android Apps Security
Android Apps Security provides guiding principles for how to best design and develop Android apps with security in mind. It explores concepts that can ...
Moodle Security
Moodle Security will show you how to make sure that only authorized users can access the information on your Moodle site. This may seem simple, but, e ...
Spring Security 3.1
Learn to leverage the power of Spring Security to keep intruders at bay through simple examples that illustrate real world problems. Each sample demon ...
Security and loss prevention 4t ...
About the Author ............................ xvii Preface............................................. xix Acknowledgments ........................ ...
Facility manager's guide t ...
Table of Contents Foreword ............................................................................................ xiii Preface ............... ...
Stabilization, safety, and secu ...
Table of Contents Invited Talks Challenges in Personalizing and Decentralizing the Web: An Overview of GOSSPLE . . . . . . . . . . . . . . . . . . ...