21. Fuzzing for software security testing and quality assurance /
Author: Ari Takanen, Jared DeMott, Charlie Miller, Atte Kettunen.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer software-- Development.,Computer networks-- Security measures.,Computer security.,Computer software-- Development.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
F89
2018eb


22. Information security a manager's guide to thwarting data thieves and hackers
Author: / Philip Alexander
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Business enterprises , Computer networks , Security measures,Information technology , Security measures,Computer security,Data protection
Classification :
HF5548
.
37
.
A44
2008


23. Innovative security solutions for information technology and communications :
Author: Jean-Louis Lanet, Cristian Toma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Information technology-- Security measures, Congresses.,Computer networks-- Security measures.,Computer security.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25


24. Malicious attack propagation and source identification /
Author: Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, Wanlei Zhou.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Communications engineering-- telecommunications.,Computer networks-- Security measures.,Computer security.,Computer security.,COMPUTERS-- Security-- General.,Data encryption (Computer science),Network hardware.
Classification :
QA76
.
9
.
A25


25. Malware detection
Author: Mihai Christodorescu ... ]et al.[
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Computer networks- Security measures,، Computer viruses
Classification :
QA
76
.
9
.
A25
M3182
2007


26. Preventing ransomware :
Author: Abhijit Mohanta, Mounir Hahad, Kumaraguru Velmurugan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer crimes.,Computer networks-- Security measures.,Computer security.,Malware (Computer software),Coding theory & cryptology.,Computer crimes-- Prevention.,Computer crimes.,Computer networks-- Security measures.,Computer security.,Computer security.,Computer viruses, Trojans & worms.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Viruses & Malware.,Data encryption.,Malware (Computer software)
Classification :
QA76
.
9
.
A25
M64
2018


27. Protocol :
Author: Alexander R. Galloway.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols.,Computer networks-- Management.,Computer networks-- Security measures.,Electronic data processing-- Distributed processing.,Protocoles de réseaux d'ordinateurs.,Réseaux d'ordinateurs-- Gestion.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Traitement réparti.,Beheersing.,Computer network protocols.,Computer network protocols.,Computer networks-- Management.,Computer networks-- Management.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Culturele aspecten.,Electrical & Computer Engineering.,Electronic data processing-- Distributed processing.,Electronic data processing-- Distributed processing.,Engineering & Applied Sciences.,Programmeertalen.,Protocollen (informatica),Telecommunications.
Classification :
TK5105
.
59
.
G35
2004


28. Securing the network from malicious code : a complete guide to defending against viruses, worms, and trojans
Author: Douglas Schweitzer
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,Prevention ، Computer viruses
Classification :
TK
5105
.
59
.
S38S4


29. TechTV's security alert
Author: / Becky Worley
Library: (South Khorasan)
Subject: Computer security,Computer networks--Security measures
Classification :
QA76
.
9
.
A25
,
W69
2004


30. The Browser Hacker's Handbook /
Author: Wade Alcorn, Christian Frichot, Michele Orrù.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Browsers (Computer programs)-- Security measures.,Computer networks-- Access control.,Computer networks-- Security measures.
Classification :
QA76
.
9
.
A25
.
A384
2014
.
A393
2014


31. The CEH prep guide :
Author: Ronald L. Krutz, Russell Dean Vines.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Testing-- Examinations, Study guides.,Hackers.,Computer networks-- Examinations.,Computer networks-- Security measures-- Examinations.,Hackers.
Classification :
QA76
.
9
.
A25
K79
2007eb


32. WORM'05 : proceedings of the 2005 ACM Workshop on Rapid Malcode, November 11, 2005, Fairfax, Virginia, USA; co-located with CCS 2005
Author: Angelos D. Keromytis, editor; sponsored by ACM Special Interest Group on Security, Audit & Control )SIGSAC(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computer networks -- Security measures,Congresses ، Computer viruses
Classification :
QA
76
.
9
.
A25A345
2005


33. WORM'04 : proceedings of the 2004 ACM Workshop on Rapid Malcode, Washington, DC, USA, October 29, 2004
Author: Sponsored by ACM SIGSAC; with contributions from Defense Advanced Research Projects Agency
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computer networks -- Security measures,Congresses ، Computer viruses
Classification :
QA
76
.
9
.
A25A345
2004


34. WORM'03 : proceedings of the 2003 ACM Workshop on Rapid Malcode : Washington, DC, USA, October 27, 2003
Author: sponsored by ACM SIGSAC; with contributions from Defense Advanced Research Projects Agency
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computer networks -- Security measures,Congresses ، Computer viruses
Classification :
QA
76
.
9
.
A25A345
2003


35. تشخیص و تحلیل رفتار بدافزارهای مدرن
Author: / مولف دانیال جواهری.,جواهری
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: نرمافزار بدافزار,Malware (Computer software),ویروسهای کامپیوتر,Computer viruses,شبکههای کامپیوتری,Computer networks, -- تدابیر ایمنی, -- Security measures,a01,a01,a02,a02,نرم افزار بدافزار
Classification :
QA
۷۶
/
۷۶
/
و
۹
ج
۹ ۱۳۹۸


36. تشخیص و تحلیل رفتار بدافزارهای مدرن
Author: / مولف دانیال جواهری.,جواهری
Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)
Subject: ویروسهای کامپیوتر,Computer viruses,شبکههای کامپیوتری,Computer networks, -- تدابیر ایمنی, -- Security measures,a01,a01,a02,a02
Classification :
QA
۷۶
/
۷۶
/
ج
۹
ت
۵


37. ط¹ط¯ط§ظ„طھ ع©غŒظپط±غŒ ظˆ ط¬ط±ظ… طھظˆظ„غŒط¯طŒ طھظˆط²غŒط¹ ظˆ ط§ظ†طھط´ط§ط± ط¨ط¯ط§ظپط²ط§ط±ظ‡ط§
Author: / ط§ظ…غŒط±طط³غŒظ† ظ†ط¬ظپغŒ,ظ†ط¬ظپغŒ
Library: Farabi Faculty Library, University of Tehran (Qom)
Subject: ظ†ط±ظ…‌ط§ظپط²ط§ط± ط¨ط¯ط§ظپط²ط§ط±,â€ڈ‫Malware (Computer software)â€ژ‬,ظˆغŒط±ظˆط³â€Œâ€Œظ‡ط§غŒ ع©ط§ظ…ظ¾غŒظˆطھط±,Computer viruses,ط¬ط±ط§غŒظ… ع©ط§ظ…ظ¾غŒظˆطھط±غŒ,Computer crimes,ظ‡ع©ط±ظ‡ط§,Hackers,ط´ط¨ع©ظ‡â€Œظ‡ط§غŒ ع©ط§ظ…ظ¾غŒظˆطھط±غŒ,Computer networks,ط¬ط±ط§غŒظ… ع©ط§ظ…ظ¾غŒظˆطھط±غŒ,Computer crimesâ€ھ,ط§ط¬ط±ط§غŒ ط¹ط¯ط§ظ„طھ ع©غŒظپط±غŒ,Criminal justice, Administration of, -- طھط¯ط§ط¨غŒط± ط§غŒظ…ظ†غŒ, -- Security measures, -- ظ…ظ‚ط±ط±ط§طھ ظƒغŒظپط±غŒ, -- Criminal provisions, -- ط§غŒط±ط§ظ†, -- Iran, -- ط§غŒط±ط§ظ†, -- Iran,a01,a01,a03,a03,a04,a04,a05,a05,a07,a07,a06,a06
Classification :
KMH
غ
¸
غ
°â€â€¬â€â€¬ â€
/
ظ
†
غ
³
ط
¹
غ
´
غ
±
غ
´
غ
°
غ
°â€¬

38. عدالت کیفری و جرم تولید، توزیع و انتشار بدافزارها
Author: / امیرحسین نجفی,نجفی
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: جرایم کامپیوتری,Computer crimes,ویروسهای کامپیوتر,Computer viruses,جرایم کامپیوتری,Computer crimes,هکرها,Hackers,شبکههای کامپیوتری,Computer networks,جرایم کامپیوتری,Computer crimes,اجرای عدالت کیفری,Criminal justice, Administration of, -- تدابیر ایمنی, -- Security measures, -- مقررات كیفری, -- Criminal provisions, -- ایران, -- Iran, -- ایران, -- Iran, -- ایران, -- Iran,a03,a03,a01,a01,a03,a03,a04,a04,a05,a05,a07,a07,a06,a06
Classification :
HV
۶۷۷۳
/
۳
/
الف
۹
ن
۳ ۱۴۰۰

