21. Configuring Symantec Antivirus, Corporate Edition
Author: Laura E. Hunter ... [et al.] ; Robert J. Shimonski, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer viruses.

22. Cryptography and network security :
Author: William Stallings.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Chiffrement (Informatique),Cryptographie à clé publique.,Cryptographie-- Réseaux d'ordinateurs.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Coding theory.,Computer networks-- Security measures.,Computer security.,Computersicherheit,Data encryption (Computer science),Internet,Internet.,Kryptologie,Rechnernetz
Classification :
TK5105
.
59
.
S713
2006


23. Cyber warfare :
Author: Paul Rosenzweig
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention-- Government policy,Computer security-- Government policy-- United States,Cyberspace-- Security measures,Cyberterrorism-- Prevention,Information warfare
Classification :
U163
.
R68
2013


24. Defense and detection strategies against Internet worm
Author: / Jose Nazario
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer networks--Security measures,Computer viruses.
Classification :
QA
,
76
.
9
,.
A25
,
N38
,
2004eb


25. Defense and detection strategies against Internet worms
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Computer networks ; Security measures. ; Computer viruses. ;

26. Defense and detection strategies against Internet worms
Author: / Jose Nazario
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer networks- Security measures,Computer viruses
Classification :
QA76
.
9
.
A25
,
N38
2004


27. Defense and detection strategies against Internet worms
Author: Jose Nazario
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Computer networks -- Security measures,، Computer viruses
Classification :
QA
76
.
9
.
A25N29


28. Defense and detection strategies against Internet worms
Author: / Jose Nazario
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer networks- Security measures,Computer viruses
Classification :
QA76
.
9
.
A25
,
N38
2004


29. Digital security :
Author: Ananda Mitra.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes, Juvenile literature.,Computer networks-- Security measures, Juvenile literature.,Computer security, Juvenile literature.,Cyberterrorism-- Prevention, Juvenile literature.,Internet-- Security measures, Juvenile literature.,Computer crimes.,Computer networks-- Security measures.,Computer security.,Cyberterrorism.,Internet-- Security measures.,Computer crimes.,Computer crimes.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,Cyberterrorism-- Prevention.,Internet-- Security measures.,Internet-- Security measures.
Classification :
HV6773
.
M58
2010


30. Disruptive security technologies with mobile code and peer-to-peer networks
Author: / R.R. Brooks
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Peer-to-peer architecture (Computer networks),Computer networks--Security measures,Computer viruses.
Classification :
TK5105
.
525
.
B76
2005


31. E-Citizens :
Author: Alfredo M. Ronchi.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Internet in public administration.,Internet in public administration.
Classification :
JF1525
.
A8


32. E-mail virus protection handbook
Author: / Syngress Publishing, Inc.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Electronic mail systems , Security measures , Handbooks, manuals, etc,Computer viruses,ETSPASTRAD,Ressources internet
Classification :
E-BOOK

33. E-mail virus protection handbook
Author: Syngress Media.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer viruses.,Electronic mail systems-- Security measures.

34. Elements of computer security
Author: / David Salomon
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security,Computer networks, Security measures
Classification :
QA76
.
9
.
A2S35
2010


35. Encyclopedia of Computer Science and Technology /
Author: edited by Phillip A. Laplante.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Information technology, Encyclopedias.,Computation.,Networks.,Software Engineering & Systems Development.,Information technology.
Classification :
T58
.
5
.
E53
2017


36. Enterprise Mac security :
Author: Charles Edge, Daniel O'Donnell
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Macintosh (Computer)
Classification :
QA76
.
9
.
A25


37. Enterprise Mac security
Author: Charles Edge, William Barker, et al
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Mac OS,Computer security

38. Fundamentals of network security /
Author: John E. Canavan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,COMPUTER INFORMATION SECURITY.,Computer networks-- Security measures.,COMPUTER NETWORKS.,COMPUTER PROGRAM INTEGRITY.,Computer security.,COMPUTER VIRUSES.,COMPUTERS.,OPERATING SYSTEMS (COMPUTERS),Réseaux d'ordinateurs-- Mesures de sûreté.
Classification :
QA76
.
9
.
A25
C364
2001


39. Fuzzing for software security testing and quality assurance /
Author: Ari Takanen, Jared DeMott, Charlie Miller, Atte Kettunen.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer software-- Development.,Computer networks-- Security measures.,Computer security.,Computer software-- Development.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
F89
2018eb


40. Handbook of water and wastewater treatment plant operations
Author: / Frank R. Spellman
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Water treatment plants--Handbooks, manuals, etc,Sewage disposal plants--Handbooks, manuals, etc,Water--Purification--Handbooks, manuals, etc,Sewage--Purification--Handbooks, manuals, etc
Classification :
TD434
.
S64
2009

