61. Malware detection
Author: Mihai Christodorescu ... ]et al.[
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Computer networks- Security measures,، Computer viruses
Classification :
QA
76
.
9
.
A25
M3182
2007


62. Malware forensics :
Author: James M. Aquilina, Eoghan Casey, Cameron H. Malin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation.,Computer security.,Computer viruses-- Identification.
Classification :
HV
A68
2008

63. Microsoft Windows 7 in depth /
Author: Robert Cowart and Brian Knittel
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Microsoft Windows (Computer file),Operating systems (Computers)
Classification :
QA76
.
76
.
O63
C68336
2010


64. Official certified ethical hacker review guide
Author: / Steven DeFino
Library: (South Khorasan)
Subject: Electronic data processing personnel--Certification,Computer security--Examinations--Study guides,Penetration testing (Computer security)--Study guides,Computer hackers--Examinations--Study guides,Computer networks--Examinations--Study guides
Classification :
QA76
.
3
.
D445
2010


65. Online terrorist propaganda, recruitment and radicalization /
Author: edited by John R. Vacca
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Internet and terrorism.,Internet-- Political aspects.,Radicalization-- Computer network resources.,Social media-- Political aspects.,Terrorism-- Computer network resources.,Terrorists-- Recruiting-- Technological innovations.,Terrorists-- Recruiting.,COMPUTERS-- Internet-- General.,Internet and terrorism.,Internet-- Political aspects.,POLITICAL SCIENCE-- Political Freedom & Security-- International Security.,POLITICAL SCIENCE-- Political Freedom & Security-- Terrorism.,Social media-- Political aspects.,Terrorists-- Recruiting.
Classification :
HV6431
.
O559
2020


66. PC magazine fighting spyware, viruses, and malware
Author: / Ed Tittel
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer viruses.,Spyware (Computer software)
Classification :
QA
,
76
.
9
,.
A25
,
T57
,
2005


67. PC magazine fighting spyware, viruses, and malware
Author: / Ed Tittel
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer viruses,Spyware (Computer software)
Classification :
QA76
.
9
.
A25
,
T57
2005


68. PC magazine fighting spyware, viruses, and malware /
Author: Ed Tittel.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computer viruses.,Malware (Computer software),Computer security.,Computer viruses.,Computerbeveiliging.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Computervirussen.,Malware (Computer software),Spyware.
Classification :
QA76
.
9
.
A25
T57
2005eb


69. PC magazine fighting spyware, viruses, and malware /
Author: Ed Tittel.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computer viruses.,Malware (Computer software),Spyware (Computer software),Computer security.,Computer viruses.,Computerbeveiliging.,Computervirussen.,Malware (Computer software),Spyware (Computer software),Spyware.
Classification :
QA76
.
9
.
A25
T57
2005


70. Preventing ransomware :
Author: Abhijit Mohanta, Mounir Hahad, Kumaraguru Velmurugan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer crimes.,Computer networks-- Security measures.,Computer security.,Malware (Computer software),Coding theory & cryptology.,Computer crimes-- Prevention.,Computer crimes.,Computer networks-- Security measures.,Computer security.,Computer security.,Computer viruses, Trojans & worms.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Viruses & Malware.,Data encryption.,Malware (Computer software)
Classification :
QA76
.
9
.
A25
M64
2018


71. Protocol :
Author: Alexander R. Galloway.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols.,Computer networks-- Management.,Computer networks-- Security measures.,Electronic data processing-- Distributed processing.,Protocoles de réseaux d'ordinateurs.,Réseaux d'ordinateurs-- Gestion.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Traitement réparti.,Beheersing.,Computer network protocols.,Computer network protocols.,Computer networks-- Management.,Computer networks-- Management.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Culturele aspecten.,Electrical & Computer Engineering.,Electronic data processing-- Distributed processing.,Electronic data processing-- Distributed processing.,Engineering & Applied Sciences.,Programmeertalen.,Protocollen (informatica),Telecommunications.
Classification :
TK5105
.
59
.
G35
2004


72. Rootkits and bootkits :
Author: by Alex Matsorov, Eugene Rodionov, and Sergey Bratus.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Malware (Computer software),Computer security.,COMPUTERS-- Security-- Viruses & Malware.,Malware (Computer software)
Classification :
QA76
.
9
.
A25


73. Securing the network from malicious code : a complete guide to defending against viruses, worms, and trojans
Author: Douglas Schweitzer
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,Prevention ، Computer viruses
Classification :
TK
5105
.
59
.
S38S4


74. Seguridad PC
Author: Alexis Burgos.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computer viruses -- Protection.,Microcomputers -- Security measures.

75. Selected papers in network and system administration
Author: edited by Eric Anderson, Mark Burgess and Alva Couch
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: Management ، Computer systems,Management ، Computer networks
Classification :
QA
76
.
24
.
S45


76. Seven deadliest Microsoft attacks
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer viruses. ; Computer security. ;

77. Seven deadliest Microsoft attacks
Author: / Rob Kraus ... [et al.]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer viruses.,Computer security.
Classification :
QA
,
76
.
76
,.
C68
,
S48
,
2010


78. Seven deadliest Microsoft attacks
Author: Rob Kraus ... ]et al.[ ; technical editor, Chris Griffin
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer viruses,، Computer security
Classification :
QA
76
.
76
.
C68
S48
2010


79. Seven deadliest Microsoft attacks /
Author: Rob Kraus [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computer viruses.,Virus informatiques.,Computer security.,Computer viruses.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
76
.
C68
S43
2010


80. TechTV's security alert
Author: / Becky Worley
Library: (South Khorasan)
Subject: Computer security,Computer networks--Security measures
Classification :
QA76
.
9
.
A25
,
W69
2004

