1. Black hat :
Author: John Biggs
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Computer security.
Classification :
QA76
.
9
.
A25
B539
2004


2. Computer crime, investigation, and the law /
Author: Chuck Easttom, Jeffrey Taylor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation-- United States.,Computer crimes-- United States.,Computer security.,Internet-- Law and legislation-- United States.,Computer crimes-- Investigation.,Computer crimes-- Investigation.,Computer crimes-- Law and legislation.,Computer crimes.,Computer crimes.,Computer security.,Internet-- Law and legislation.,TRUE CRIME-- White Collar Crime.,United States., 7
Classification :
HV6773
.
2
.
E17
2011eb


3. Computer forensics :
Author: EC-Council Press
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation-- Examinations, Study guides,Computer hackers,Computer security-- Examinations, Study guides,Criminal investigation-- Examinations, Study guides,Electronic evidence
Classification :
HV8079
.
C65
C664
2010


4. Cyber security awareness for CEOs and management
Author: David Willson ; contributing editor, Henry Dalziel.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer crimes-- Prevention.,Computer security.,Corporations-- Security measures.,Data protection.

5. CyberShock
Author: / by Winn Schwartau
Library: Library of Faculty of World Studies University of Tehran (Tehran)
Subject: Computer security,Computer hackers,Computer crimes
Classification :
QA
76
.
9
A25
S3537
2000


6. Cyberpunk :
Author: Katie Hafner and John Markoff.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Computer security.,Hackers.
Classification :
QA76
.
9
.
A25
H34
1991


7. Dissecting the hack :
Author: Jayson E. Street [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation.,Computer crimes, Case studies.,Computer networks-- Security measures.,Computer security.,Hackers.,Computer crimes-- Case studies.,Computer crimes-- Investigation.,Computer crimes-- Investigation.,Computer crimes.,Computer hackers.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,Hackers.,TRUE CRIME-- White Collar Crime.
Classification :
HV8079
.
C65
S856
2010b


8. Dissecting the hack :
Author: Jayson E. Street, Brian Baskin, Kristin Sims ; technical editor Brian Martin
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes,Computer networks-- Security measures,Computer security,Cyberterrorism,Hackers,Hacking
Classification :
HV8079
.
C65


9. E-Citizens :
Author: Alfredo M. Ronchi.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Internet in public administration.,Internet in public administration.
Classification :
JF1525
.
A8


10. Ethical and social issues in the information age /
Author: Joseph Migga Kizza.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computers and civilization.,Information society.,Information technology-- Moral and ethical aspects.,Information technology-- Social aspects.,Computers and civilization.,Information society.,Information technology-- Moral and ethical aspects.,Information technology-- Social aspects.,Informatique.
Classification :
T58
.
5
.
K59
2010


11. Guide to computer network security /
Author: Joseph Migga Kizza.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Business & Economics-- Information Management.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- System Administration-- Storage & Retrieval.,Data mining.,Information architecture.,Information retrieval.,Network hardware.
Classification :
TK5105
.
59


12. Guide to computer network security
Author: Joseph Migga Kizza
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control,Computer networks-- Security measures
Classification :
TK5105
.
59


13. Hacked :
Author: Charlie Mitchell.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention-- Government policy-- United States.,Computer security-- Government policy-- United States.,Cyber intelligence (Computer security),Internet-- Government policy-- United States.,Computer crimes-- Government policy-- United States.,Computer hackers.,Computer security-- Government policy-- United States.,Computer security-- Government policy.,COMPUTERS-- Security-- General.,Computersicherheit,Cyber intelligence (Computer security),Cyber intelligence (Computer security),Cyberspace.,Internet-- Government policy-- United States.,Internet-- Government policy.,Internet-- Government policy.,United States.,USA, 7, 7
Classification :
TK5105
.
875
.
I57
M575
2016


14. Hacker's challenge 3 :20 brand-new forensic scenarios & solutions
Author: David Pollino ... ]et al.[
Library: (Semnan)
Subject: Security measures ، Computer networks,Security measures ، Internet,، Computer crimes,، Computer hackers
Classification :
QA
76
.
9
.
H33


15. Hackers :
Author: Paul A. Taylor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Netherlands.,Freedom of information-- Netherlands.,Hackers-- Netherlands-- Attitudes.,Computer crimes.,Freedom of information.,TRUE CRIME-- White Collar Crime.,Netherlands., 7
Classification :
HV6773
.
3
.
N4
T39
1999eb


16. Hardware-based computer security techniques to defeat hackers
Author: / Roger Dube
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Equipment and supplies,Computer security--Computer programs,Computer input-output equipment.,Computer crimes--Prevention
Classification :
QA
,
76
.
9
,.
A25
,
D8152
,
2008


17. Hardware-based computer security techniques to defeat hackers : from biometrics to quantum cryptography
Author: Dube, Roger
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer security - Computer programs ► Computer security - Equipment and supplies ► Computer input-output equipment ► Computer crimes-Prevention
Classification :
005
D814h


18. Hardware-based computer security techniques to defeat hackers : from biometrics to quantum cryptography
Author: Dube, Roger
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer security - Computer programs ► Computer security - Equipment and supplies ► Computer input-output equipment ► Computer crimes-Prevention
Classification :
005
D814h


19. Insider threat :
Author: Eric Cole, Sandra Ring
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Commercial crimes,Computer networks-- Security measures,Computer security,Hackers
