541. The fugitive game
Author: / Jonathan Littman
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Mitnick, Kevin D.--(Kevin David),--1963,Computer crimes--United States--Investigation,Hackers--United States--Psychology,Internet--Security measures--United States
Classification :
HV
,
6773
.
2
,.
L57
,
1996


542. The hacker diaries
Author: / Dan Verton
Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)
Subject: Computer security,Computer hackers- Interviews,Computer hackers- Psychology,Computer crimes
Classification :
QA76
.
9
.
A25V47
2002


543. The hacker playbook :
Author: Peter Kim
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer networks-- Security measures,Computer programming,Computer software-- Testing,Hackers,Penetration testing (Computer security), Handbooks, manuals, etc

544. The hacker playbook 3 :
Author: Peter Kim.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
K56
2018


545. The hacker playbook 2 :
Author: Peter Kim.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.

546. The information systems security officer's guide :
Author: Dr. Gerald L. Kovaich
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security

547. The information systems security officer's guide :
Author: Gerald L. Kovacich.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Protection de l'information (Informatique),Sécurité informatique.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.
Classification :
QA76
.
9
.
A25
K68
2003eb


548. The official CHFI study guide (Exam 312-49)
Author: Dave Kleinman, technical editor ; Kevin Cardwell ... [et al.]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Examinations, Study guides,Computer security-- Examinations, Study guides
Classification :
QA76
.
9
.
A25
O34
2007


549. The official (ISC)² CISSP CBK reference /
Author: John Warsinkse ; with Mark Graff, Kevin Henry, Christopher Hoover, Ben Malisow, Sean Murphy, C. Paul Oakes, George Pajari, Jeff T. Parker, David Seidl, Mike Vasquez.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Administrative agencies-- Information resources management-- Security measures-- United States-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations, Study guides.,Computers-- Access control-- Examinations, Study guides.,Telecommunications engineers-- Certification-- United States.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer networks-- Security measures-- Examinations.,Telecommunications engineers-- Certification.,United States., 7
Classification :
TK5105
.
59


550. The second economy :
Author: Steve Grobman, Allison Cerra ; foreword by Christopher Young
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes,Computer networks-- Security measures,Computer security,Cyberspace-- Security measures,Cyberterrorism
Classification :
TK5105
.
59


551. The smart girl's guide to privacy :
Author: Violet Blue.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Internet and women.,Internet-- Safety measures.,Internet-- Security measures.,Privacy, Right of.
Classification :
HV6773
.
B56
2015


552. The traditional problem of evil: suffering and evil actions -- Another problem of evil: divine hiddenness -- Miracles as a problem of evil -- The ignorance defense -- Identifying, interpreting, and certifying revelation -- Should God's power be understood as omnipotence? -- A process Christian theism and the problems of evil. 0
Author: James A. Keller.
Library: Library of Islamic Parliament (Tehran)
Subject:

553. The virtual battlefield :
Author: edited by Christian Czosseck and Kenneth Geers.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Cyberterrorism.,Information warfare.,Computer crimes.,Cyberterrorism.,HISTORY-- Military-- Strategy.,Information warfare.
Classification :
U163
.
V578
2009eb


554. Traceback and Anonymity
Author: \ Xinyuan Wang, Douglas Reeves.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security.,Cyberspace-- Security measures.,Computer crimes-- Prevention.,کامپیوترها -- ایمنی اطلاعات ,فضای مجازی -- تدابیر ایمنی ,جرایم کامپیوتری -- پیشگیری
Classification :
QA
76
.
9
.
W32T7
2015
E-Book
,


555. Traceback and anonymity /
Author: Xinyuan Wang, Douglas Reeves
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer security.,Cyberspace-- Security measures.,Cyberterrorism-- Prevention.
Classification :
QA76
.
9
.
A25


556. UNIX and Linux forensic analysis toolki
Author: / Chris Pogue, Cory Altheide, Todd Haverkos
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: UNIX (Computer file),Linux.,Computer crimes--Investigation,Computer security.,Forensic sciences.
Classification :
HV
,
8079
,.
C65
,
P64
,
2008eb


557. Understanding cyber risk :
Author: Thomas R. Koehler.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Business intelligence.,Computer crimes-- Prevention.,Data protection.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Business enterprises-- Computer networks-- Security measures.,Business intelligence.,Computer crimes-- Prevention.,Data protection.
Classification :
HF5548
.
37
.
K64
2018


558. Unix and Linux forensic analysis DVD toolkit
Author: Pogue, Chris.
Library: Library of Niroo Research Institue (Tehran)
Subject: Investigation ، Computer crimes,، Computer security,، Forensic sciences
Classification :
HV
8079
.
C65P64
2008


559. Vers & virus :
Author: François Paget; sous la direction de Philippe Rosé.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Computer security.,Computer viruses.
Classification :
QA76
.
76
.
C68
F736
2005


560. Virtualization and forensics : a digital forensic investigator's guide to virtual environments
Author: Barrett, Diane.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Investigation ، Computer crimes,Security measures ، Virtual computer systems,، Computer security
Classification :
HV
8079
.
C65
B37
2010

