481. New approaches to the study of religion /
Author: edited by Peter Antes, Armin W. Geertz, a
Library: Library of Islamic Parliament (Tehran)
Subject:

482. New threats and countermeasures in digital crime and cyber terrorism /
Author: [edited by] Maurice Dawson, Marwan Omar.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer security.,Cyberterrorism-- Prevention.
Classification :
HV6773
.
N4745
2015


483. Ninja hacking :
Author: Thomas Wilhelm, Jason Andress.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer security.,Hackers.

484. Ninja hacking : unconventional penetration testing tactics and techniques
Author: Wilhelm, Thomas
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Penetration testing )Computer security(,، Computer security,Prevention ، Computer crimes,، Hackers
Classification :
QA
76
.
9
.
A25
W548
2011


485. Niʻmatnāmah-yi Nāṣiruddīn Shāhī.,0415325293 (Paperba
Author: translated by Norah M. Titley. ,edited by Frederick W. Kagan and Christian Kubik.
Library: Library of Islamic Parliament (Tehran)
Subject:

486. Online consumer protection :
Author: Kuanchin Chen, Adam Fadlalla [editors].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Consumer protection.,Disclosure of information.,Electronic commerce-- Security measures.,Electronic information resources-- Access control.,Ethical relativism.,Privacy, Right of.,BUSINESS & ECONOMICS-- Commercial Policy.,BUSINESS & ECONOMICS-- Consumer Behavior.,Computer crimes.,Consumer protection.,Disclosure of information.,Electronic commerce-- Security measures.,Electronic information resources-- Access control.,Ethical relativism.,Privacy, Right of.
Classification :
HC79
.
C63
O54
2009eb


487. Operating system forensics /
Author: Ric Messier ; Kevin Mackay, technical editor
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation,Computer security,Operating systems (Computers)-- Security measures
Classification :
HV8079
.
C65
M47
2016


489. Perventing computer fraud
Author: / Dana L. Stern
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer crimes,Computer security
Classification :
HV6773
.
S74
1993


490. Practical Cyber Forensics :
Author: by Niranjan Reddy.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation.,Computer networks-- Security measures.,Computer security.,Computer crimes-- Investigation.,Computer networks-- Security measures.,Computer security.
Classification :
HV8079
.
C65
R44
2019


491. Practical cyber forensics :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer crimes ; Investigation ; Computer networks ; Security measures ; Computer security ; Forensic sciences ; Technological innovations ; Electronic evidence ; Evidence, Criminal ; Criminal investigation ;

492. Practical cyber intelligence :
Author: Wilson Bautista Jr.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Cyber intelligence (Computer security),Cyberterrorism-- Prevention.,Information technology-- Security measures.,Coding theory & cryptology.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer science.,COMPUTERS / Security / General,Cyber intelligence (Computer security),Cybernetics & systems theory.,Cyberterrorism-- Prevention.,Data encryption.,Information technology-- Security measures.
Classification :
HV6773


493. Preventing ransomware :
Author: Abhijit Mohanta, Mounir Hahad, Kumaraguru Velmurugan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer crimes.,Computer networks-- Security measures.,Computer security.,Malware (Computer software),Coding theory & cryptology.,Computer crimes-- Prevention.,Computer crimes.,Computer networks-- Security measures.,Computer security.,Computer security.,Computer viruses, Trojans & worms.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Viruses & Malware.,Data encryption.,Malware (Computer software)
Classification :
QA76
.
9
.
A25
M64
2018


494. Profiling hackers
Author: / Raoul Chiesa, Stefania Ducci, Silvio Ciappi
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer crimes.,Computer security.,Computer hackers.,Criminal behavior, Prediction of.
Classification :
HV
,
6773
,.
C477
,
2009


495. Ransomware revealed :
Author: by Nihad A. Hassan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer security.,Malware (Computer software),Computer crimes-- Prevention.,Computer security.,Malware (Computer software)
Classification :
QA76
.
76
.
C68
H37
2019eb


496. Routledge companion to global cyber-security strategy /
Author: edited by Scott N. Romaniuk and Mary Manjikian.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention-- Government policy.,Computer networks-- Security measures-- Government policy.,Computer security-- Government policy.,Cyberspace-- Security measures-- Government policy.,Cyberterrorism-- Prevention-- Government policy.,Internet-- Security measures-- Government policy.,Computer networks-- Security measures-- Government policy,Computer security-- Government policy,COMPUTERS / Internet / Security,HISTORY / Military / Strategy,POLITICAL SCIENCE / Political Freedom & Security / International Security
Classification :
UA163
.
R68
2021


497. Routledge studies in hu
Author: edited by Libby Porter and Kate Shaw.
Library: Library of Islamic Parliament (Tehran)
Subject:

498. Sandworm :
Author: Andy Greenberg.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Russia (Federation),Hackers-- Russia (Federation),Computer crimes.,Hackers.,SOCIAL SCIENCE / Sociology / General.,Russia (Federation), 7
Classification :
HV6773
.
R8
G74
2019


499. Scene of the cybercrime
Author:
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer networks- Security measures,Computer crimes- Investigation,Forensic sciences
Classification :
QA76
.
9
.
A25
,
C765
2008


500. Scene of the cybercrime
Author:
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer networks- Security measures,Computer crimes- Investigation,Forensic sciences
Classification :
QA76
.
9
.
A25
,
C765
2008

