81. Preventing ransomware :
Author: Abhijit Mohanta, Mounir Hahad, Kumaraguru Velmurugan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer crimes.,Computer networks-- Security measures.,Computer security.,Malware (Computer software),Coding theory & cryptology.,Computer crimes-- Prevention.,Computer crimes.,Computer networks-- Security measures.,Computer security.,Computer security.,Computer viruses, Trojans & worms.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Viruses & Malware.,Data encryption.,Malware (Computer software)
Classification :
QA76
.
9
.
A25
M64
2018


82. Protocol :
Author: Alexander R. Galloway.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols.,Computer networks-- Management.,Computer networks-- Security measures.,Electronic data processing-- Distributed processing.,Protocoles de réseaux d'ordinateurs.,Réseaux d'ordinateurs-- Gestion.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Traitement réparti.,Beheersing.,Computer network protocols.,Computer network protocols.,Computer networks-- Management.,Computer networks-- Management.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Culturele aspecten.,Electrical & Computer Engineering.,Electronic data processing-- Distributed processing.,Electronic data processing-- Distributed processing.,Engineering & Applied Sciences.,Programmeertalen.,Protocollen (informatica),Telecommunications.
Classification :
TK5105
.
59
.
G35
2004


83. Rootkits and bootkits :
Author: by Alex Matsorov, Eugene Rodionov, and Sergey Bratus.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Malware (Computer software),Computer security.,COMPUTERS-- Security-- Viruses & Malware.,Malware (Computer software)
Classification :
QA76
.
9
.
A25


84. Securing the network from malicious code : a complete guide to defending against viruses, worms, and trojans
Author: Douglas Schweitzer
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,Prevention ، Computer viruses
Classification :
TK
5105
.
59
.
S38S4


85. Seguridad PC
Author: Alexis Burgos.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computer viruses -- Protection.,Microcomputers -- Security measures.

86. Selected papers in network and system administration
Author: edited by Eric Anderson, Mark Burgess and Alva Couch
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: Management ، Computer systems,Management ، Computer networks
Classification :
QA
76
.
24
.
S45


87. Seven deadliest Microsoft attacks
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer viruses. ; Computer security. ;

88. Seven deadliest Microsoft attacks
Author: Rob Kraus ... ]et al.[ ; technical editor, Chris Griffin
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer viruses,، Computer security
Classification :
QA
76
.
76
.
C68
S48
2010


89. Seven deadliest Microsoft attacks
Author: / Rob Kraus ... [et al.]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer viruses.,Computer security.
Classification :
QA
,
76
.
76
,.
C68
,
S48
,
2010


90. Seven deadliest Microsoft attacks /
Author: Rob Kraus [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computer viruses.,Virus informatiques.,Computer security.,Computer viruses.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
76
.
C68
S43
2010


91. TechTV's security alert
Author: / Becky Worley
Library: (South Khorasan)
Subject: Computer security,Computer networks--Security measures
Classification :
QA76
.
9
.
A25
,
W69
2004


92. Techniques virales avancees /
Author: Eric Filiol.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computer viruses.,Computer security.,Computer viruses.
Classification :
QA76
.
9
.
A25
F55
2007eb


93. The Browser Hacker's Handbook /
Author: Wade Alcorn, Christian Frichot, Michele Orrù.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Browsers (Computer programs)-- Security measures.,Computer networks-- Access control.,Computer networks-- Security measures.
Classification :
QA76
.
9
.
A25
.
A384
2014
.
A393
2014


94. The CEH prep guide :
Author: Ronald L. Krutz, Russell Dean Vines.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations, Study guides.,Computer security-- Testing-- Examinations, Study guides.,Hackers.,Computer networks-- Examinations.,Computer networks-- Security measures-- Examinations.,Hackers.
Classification :
QA76
.
9
.
A25
K79
2007eb


95. The Secure online business handbook :
Author: [consultant editor, Jonathan Reuvid].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Business-- Data processing.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
S3755
2004


96. The complete computer virus handbook
Author: Frost, David
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer viruses , Electronic data processing departments Security measures
Classification :
QA
76
.
76
.
C68
F76
1990


97. Trojan horse /
Author: Marc Cerasini ; based on the series by Joel Surnow & Robert Cochran.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Award presentations-- California-- Los Angeles, Fiction.,Computer viruses, Fiction.,Terrorism-- Prevention, Fiction.,Award presentations-- California-- Los Angeles, Fiction.,Award presentations.,Computer viruses, Fiction.,Computer viruses.,Terrorism-- Prevention, Fiction.,Terrorism-- Prevention.,California, Los Angeles., 7
Classification :
PS3603
.
E73
T76
2006


98. Trojans, worms, and spyware
Author: / Michael Erbschloe
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer viruses,Spyware (Computer software)
Classification :
QA76
.
9
.
A25
,
E7424
2005


99. Trojans, worms, and spyware :
Author: Michael Erbschloe
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Computer viruses
Classification :
QA76
.
9
.
A25
E7424
2005

