• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۷ پاسخ غیر تکراری از ۷ پاسخ تکراری در مدت زمان ۰,۹۲ ثانیه یافت شد.

1. Cyber Attacks

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Edward Amoroso, John R. Vacca.

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Cyberterrorism, United States, Prevention,Computer networks, Security measures,Cyberspace, Security measures,Computer crimes, United States, Prevention,National security, United States

Classification :
HV6773
,.
2
.
A47
2013

2. Cyber Attacks: Protecting National Infrastructure

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: /Edward G. Amoroso

Library: Library of Islamic Encyclopedia Foundation (Tehran)

Subject: Cyberterrorism -- United States -- Prevention.,Computer networks -- Security measures.,Cyberspace -- Security measures,Computer crimes -- United States -- Prevention.,تروریسم رایانه‌ای -- ایالات متحده -- پیشگیری, امنیت ملی -- ایالات متحده

Classification :
HV6773
.
3
.
A4
‬

3. Cyber terrorism :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Andrew Michael Colarik.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Asymmetric warfare.,Computer crimes.,Computer networks-- Security measures.,Cyberterrorism.,Information superhighway-- Economic aspects.,Information warfare-- Political aspects.,Asymmetric warfare.,Computer crimes.,Computer networks-- Security measures.,Computerkriminalität,Cyberspace,Cyberterrorism.,Information superhighway-- Economic aspects.,POLITICAL SCIENCE-- Political Freedom & Security-- Terrorism.,Terrorismus

Classification :
HV6773
.
C64
2006eb

4. Cybersecurity policies and strategies for cyberwarfare prevention /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jean-Loup Richet, University of Nantes, France.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention.,Cyber intelligence (Computer security),Cyberspace operations (Military science),Cyberterrorism-- Prevention.

Classification :
HV6773
.
15
.
C97
C923
2015

5. Managing cyber attacks in international law, business, and relations: in search of cyber peace

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Scott J. Shackelford

Library: Central Library and Archive Center of shahid Beheshti University (Tehran)

Subject: Information warfare (International law),Cyberspace,Cyberterrorism,Computer crimes,Computer networks,-- Security measures,-- Security measures

Classification :
343
.
0999
S524M
2014

6. Routledge companion to global cyber-security strategy /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Scott N. Romaniuk and Mary Manjikian.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Prevention-- Government policy.,Computer networks-- Security measures-- Government policy.,Computer security-- Government policy.,Cyberspace-- Security measures-- Government policy.,Cyberterrorism-- Prevention-- Government policy.,Internet-- Security measures-- Government policy.,Computer networks-- Security measures-- Government policy,Computer security-- Government policy,COMPUTERS / Internet / Security,HISTORY / Military / Strategy,POLITICAL SCIENCE / Political Freedom & Security / International Security

Classification :
UA163
.
R68
2021

7. The second economy :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Steve Grobman, Allison Cerra ; foreword by Christopher Young

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes,Computer networks-- Security measures,Computer security,Cyberspace-- Security measures,Cyberterrorism

Classification :
TK5105
.
59
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival