41. Honeypot frameworks and their applications :
Author: Chee Keong Ng, Lei Pan, Yang Xiang.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Malware (Computer software)-- Prevention.,Computer modelling & simulation.,Computer networking & communications.,Computer security.,Computer security.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Viruses & Malware.,Mathematical physics.,Maths for computer scientists.
Classification :
QA76
.
9
.
A25


42. How to be invisible :
Author: J.J. Luna.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- United States.,Identification-- United States.,Privacy, Right of-- United States.,Computer security.,Identification.,Privacy, Right of.,United States., 7
Classification :
JC596
.
2
.
U5
L86
2004


43. How to do everything with Windows XP home networking /
Author: Dave Field and Andrew Brandt.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Microsoft Windows (Computer file),Microsoft Windows (Computer file),Computer security.,Home computer networks.,Computer security.,Home computer networks.
Classification :
TK5105
.
75
.
F54
2004


44. Identifying malicious code through reverse engineering
Author: edited by Abhishek Singh ; with contributions by Baibhav Singh
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer viruses,Reverse engineering,Software protection
Classification :
QA76
.
76
.
C68
I34
2009


45. Identifying malicious code through reverse engineering
Author: / edited by Abhishek Singh ; with contributions by Baibhav Singh.
Library: Library of College of Science University of Tehran (Tehran)
Subject: Reverse engineering,Computer viruses,Software protection,a04,a06,a06
Classification :
TA168
.
5
.
I346
2009


46. Information Security for Global Information Infrastructures :
Author: Sihan Qing
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject:
Classification :
QA76
.
9
.
A25
S543
2000


47. Information security
Author:
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer security,Data protection,Computer viruses,Cryptography
Classification :
QA
76
.
9
.
I5
2004


48. Information security a manager's guide to thwarting data thieves and hackers
Author: / Philip Alexander
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Business enterprises , Computer networks , Security measures,Information technology , Security measures,Computer security,Data protection
Classification :
HF5548
.
37
.
A44
2008


49. Information security architecture :
Author: Jan Killmeyer Tudor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer architecture.,Computer security.,Computer architecture.,COMPUTER INFORMATION SECURITY.,COMPUTER NETWORKS.,COMPUTER PROGRAM INTEGRITY.,Computer security.,COMPUTER VIRUSES.,COMPUTERS.,Computersicherheit,OPERATING SYSTEMS (COMPUTERS)
Classification :
QA76
.
9
.
A25
T83
2001


50. Information security management handbook.
Author: Harold F. Tipton, Micki Krause, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management, Handbooks, manuals, etc.,Data protection, Handbooks, manuals, etc.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer security-- Management.,Data protection.
Classification :
QA76
.
9
.
A25


51. Innovative security solutions for information technology and communications :
Author: Jean-Louis Lanet, Cristian Toma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Information technology-- Security measures, Congresses.,Computer networks-- Security measures.,Computer security.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25


52. Internet security professional reference /
Author: Derek Atkins [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Internet-- Security measures.,Computer security.,Datensicherung,Internet,Internet-- Security measures.
Classification :
TK5105
.
875
.
I57
I576
1997


53. Israel vs. Iran :
Author: Yaakov Katz and Yoaz Hendel.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Espionage, Israeli.,National security-- Middle East.,Nuclear weapons-- Iran.,Espionage, Israeli.,International relations.,National security.,Nuclear weapons.,POLITICAL SCIENCE-- Political Freedom & Security-- Intelligence.,TRUE CRIME-- Espionage.,Iran, Relations, Israel.,Israel, Relations, Iran.,Iran.,Israel.,Middle East., 0, 0, 7, 7, 7
Classification :
UB271
.
I8
H4513
2012eb


54. Living with the Internet and online dangers /
Author: Corey Sandler.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Internet and teenagers.,Internet-- Safety measures.
Classification :
HQ799
.
2
.
I5
S26
2010


55. Living with the Internet and online dangers /
Author: Corey Sandler.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Internet and teenagers.,Internet-- Safety measures.
Classification :
HQ799
.
2
.
I5
S26
2010


56. Malicious attack propagation and source identification /
Author: Jiaojiao Jiang, Sheng Wen, Bo Liu, Shui Yu, Yang Xiang, Wanlei Zhou.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Communications engineering-- telecommunications.,Computer networks-- Security measures.,Computer security.,Computer security.,COMPUTERS-- Security-- General.,Data encryption (Computer science),Network hardware.
Classification :
QA76
.
9
.
A25


57. Malicious cryptography
Author: / Adam Young, Moti Yung
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Cryptography.,Computer viruses--Prevention,Data protection.
Classification :
QA
,
76
.
9
,.
A25
,
Y65
,
2004


58. Malicious cryptography :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Cryptography ; Computer viruses ; Prevention ; Data protection ;

59. Malicious cryptography :
Author: Adam Young, Moti Yung
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Computer viruses-- Prevention,Cryptography,Data protection
Classification :
QA76
.
9
.
A25


60. Malware Forensics Field Guide for Linux Systems /
Author: Cameron H. Malin, Eoghan Casey, James M. Aquilina ; Curtis W. Rose, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Linux,Computer crimes-- Investigation, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Computer viruses, Handbooks, manuals, etc.,Forensic sciences, Handbooks, manuals, etc.,Malware (Computer software), Handbooks, manuals, etc.
Classification :
QA
76
.
76
.
C68
.
M32
2014

