1. Applied Network Security.
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer networks-- Security measures.,Business enterprises-- Computer networks-- Security measures.,Computer networks-- Security measures.
Classification :
T55
.
4-60
.
8


2. Biohackers :
Author: Alessandro Delfanti
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Hackers
Classification :
HV6773
.
D45
2013


3. CEH certified ethical hacker :
Author: Matt Walker.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Examinations, Study guides.,Electronic data processing personnel-- Certification, Study guides.,Hackers-- Examinations, Study guides.,Penetration testing (Computer security)-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations.,Computer security-- Examinations.,Electronic data processing personnel-- Certification.
Classification :
QA76
.
9
.
A25
W345
2016b


4. CEH v10 :
Author: Ric Messier.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Examinations, Study guides.,Electronic data processing personnel-- Certification, Study guides.,Hackers-- Examinations, Study guides.,Penetration testing (Computer security)-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations.,Computer security-- Examinations.,COMPUTERS / Security / General.,Electronic data processing personnel-- Certification.
Classification :
QA76
.
9
.
A25


5. Chained exploits : advanced hacking attacks from start to finish
Author: Andrew Whitaker, Keatron Evans, Jack B. Voth
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Computer networks -- Security measures,، Computer hackers
Classification :
QA
76
.
9
.
A25W45


6. Code hacking :
Author: Richard Conway, Julian Cordingley
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Hackers
Classification :
TK5105
.
59
.
C5795
2004


7. Cryptography and network security :
Author: William Stallings.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Chiffrement (Informatique),Cryptographie à clé publique.,Cryptographie-- Réseaux d'ordinateurs.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Coding theory.,Computer networks-- Security measures.,Computer security.,Computersicherheit,Data encryption (Computer science),Internet,Internet.,Kryptologie,Rechnernetz
Classification :
TK5105
.
59
.
S713
2006


8. Cyber infrastructure protection
Author: Tarek Saadawi, Louis Jordan, Jr. editors
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Cyberinfrastructure, Security measures,Computer networks, Security measures

9. Cyber infrastructure protection /
Author: Tarek Saadawi, Louis Jordan, editors
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Cyberinfrastructure-- Security measures
Classification :
U413
.
A66
C93
2011


10. Cyber security awareness for CEOs and management
Author: David Willson ; contributing editor, Henry Dalziel.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer crimes-- Prevention.,Computer security.,Corporations-- Security measures.,Data protection.

11. Cyber war :
Author: Richard A. Clarke and Robert K. Knake.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cyberspace operations (Military science)-- United States.,Cyberterrorism-- United States-- Prevention.,Cyberterrorism-- United States.,Information warfare-- United States-- Prevention.,Information warfare-- United States.,Bekämpfung,Computer networks-- Security measures.,Computerkriminalität,Cyberspace operations (Military science),Cyberterrorism-- Prevention.,Cyberterrorism.,Cyberterrorism.,Information warfare-- Prevention.,Information warfare.,Informationskrigföring.,Internet,National security-- United States.,POLITICAL SCIENCE-- Political Freedom & Security-- International Security.,Sabotage-- United States-- Prevention.,Terrorism-- United States-- Prevention.,Terrorismus,United States.,USA, 7, 7
Classification :
HV6773
.
2
.
C57
2010


12. Cyber warfare :
Author: Jason Andress, Steve Winterfeld ; Russ Rogers, technical editor ; foreword by Stephen Northcutt.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Handbooks, manuals, etc.,Information warfare, Handbooks, manuals, etc.

13. Cybersecurity for hospitals and healthcare facilities :
Author: Luis Ayala
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Health facilities-- Security measures,Internet-- Security measures,Computer Security,Computer Science,Operating Systems,Security,Systems and Data Security
Classification :
QA76
.
9
.
A25


14. Dissecting the hack :
Author: Jayson E. Street [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation.,Computer crimes, Case studies.,Computer networks-- Security measures.,Computer security.,Hackers.,Computer crimes-- Case studies.,Computer crimes-- Investigation.,Computer crimes-- Investigation.,Computer crimes.,Computer hackers.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,Hackers.,TRUE CRIME-- White Collar Crime.
Classification :
HV8079
.
C65
S856
2010b


15. Dissecting the hack :
Author: Jayson E. Street, Brian Baskin, Kristin Sims ; technical editor Brian Martin
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes,Computer networks-- Security measures,Computer security,Cyberterrorism,Hackers,Hacking
Classification :
HV8079
.
C65


16. Enemy at the water cooler
Author: / Brian T. Contos
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Computer security,Computer hackers,Electronic books. , lcsh
Classification :
E-BOOK

17. Enemy at the water cooler :
Author: Brian T. Contos
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Hackers
Classification :
TK5105
.
59
.
C658
2006


18. Essential skills for hackers /
Author: Kevin Cardwell ; contributing editor, Henry Dalziel.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control.,Computer networks-- Security measures.,Computer security.,Hacking.
Classification :
QA76
.
9
.
A25
C37
2016


19. From hacking to report writing :
Author: Robert Svensson
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security
Classification :
QA76
.
9
.
A25


20. Fuzzing for software security testing and quality assurance /
Author: Ari Takanen, Jared DeMott, Charlie Miller, Atte Kettunen.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer software-- Development.,Computer networks-- Security measures.,Computer security.,Computer software-- Development.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
F89
2018eb

