121. Hacker's challenge 3 :20 brand-new forensic scenarios & solutions
Author: David Pollino ... ]et al.[
Library: (Semnan)
Subject: Security measures ، Computer networks,Security measures ، Internet,، Computer crimes,، Computer hackers
Classification :
QA
76
.
9
.
H33


122. Handbook of research on information and cyber security in the fourth industrial revolution /
Author: Ziska Fields, University of KwaZulu-Natal, South Africa.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Confidential communications-- Protection.,Electronic information resources-- Access control.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Electronic information resources-- Access control.
Classification :
TK5105
.
59
.
P744
2018e


123. How do rogue nations threaten human rights? -- North Korea represses freedom / Kay Seok -- Iran violates women's rights / Sam Brownback -- Sudanese government engages in genocide / Human Rights Watch -- United States violates human rights worldwide / Vernon Coleman -- Rogue nations undermine the United Nations' mission to promote human rights / Joseph Loconte -- U.S. invasions have not spread democracy in the Middle East / Phyllis Bennis -- How should the global community respond to rogue nations? -- Preemptive force is sometimes necessary to contain rogue nations / National Review -- Preemptive force threatens efforts to contain rogue states / Ivan Eland -- Missile defense system is necessary to protect against rogue nations / Dennis Ross -- Missile defense system is unnecessary / Gwynne Dyer -- Promoting globalization will reduce the threat posed by rogue states / Banning N. Garrett, Dennis M. Sherman -- Globalization
Author: Louise Gerdes, book editor.
Library: Library of Islamic Parliament (Tehran)
Subject:

124. How personal & Internet security works
Author: / Preston Gralla
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer crimes,Internet fraud,Computer security,Internet- Security measures
Classification :
HV6773
.
G7245
2006


125. Human-computer interaction and cybersecurity handbook /
Author: edited by Abbas Moallem
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention, Handbooks, manuals, etc.,Computer networks-- Security measures, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Technology and international relations.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Technology and international relations.
Classification :
TK5105
.
59
.
H86
2019eb


126. 20090601 ,Includes bibliographical references and index. 0
Author: 20090602 ,20090602 0
Library: Library of Islamic Parliament (Tehran)
Subject:

127. Includes bibliographical references (p. 49-51). 0,B
Author: Zeren Tanındı. ,/ Katie Normington.
Library: Library of Islamic Parliament (Tehran)
Subject:

128. Includes bibliographical references (p. 375) and index. 0
Author: Brian M. Fagan.
Library: Library of Islamic Parliament (Tehran)
Subject:

129. Includes bibliographical references (p. 225-231) and index. 0
Author: Andrew Green.
Library: Library of Islamic Parliament (Tehran)
Subject:

130. Information security and digital forensics :
Author: Dasun Weerasinghe (Ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation, Congresses.,Computer networks-- Access control, Congresses.,Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Internet-- Security measures, Congresses.,Computer crimes-- Investigation.,Computer networks-- Access control.,Computer networks-- Security measures.,Computer security.,Informatique.,Internet-- Security measures.
Classification :
QA76
.
9
.
A25
I584
2010


131. International arbi
Author: edited by M.L. Hendrikse, N.H. Margetson, N.J. Margetson.
Library: Library of Islamic Parliament (Tehran)
Subject:

132. Internet denial of service
Author: / Jelena Mirkovic ... [et al.]
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Internet- Security measures,Computer crimes- Prevention
Classification :
TK5105
.
59
.
I5455
2004


133. Internet denial of service: attack and defense mechanisms
Author: Jelena Mirkovic...]et al.[
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Computer networks,Security measures ، Internet,Prevention ، Computer crimes
Classification :
TK
5105
.
59
.
I5455
2005


134. Internet governance in an age of cyber insecurity /
Author: Robert K. Knake.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- United States-- Prevention.,Cyberterrorism-- Prevention-- International cooperation.,Internet governance-- United States.,Internet in espionage-- United States.,Internet-- Security measures-- United States.
Classification :
HV6773
.
2
.
K52
2010


135. Introducing TPCK / Matthew J. Koehler and Punya Mishra -- Bridging digital and cultural divides: TPCK for equity of access to technology / Mario Antonio Kelly -- TPCK in K-6 literacy education: it's not that elemen
Author: edited by AACTE Committee on Innovation and Technology.
Library: Library of Islamic Parliament (Tehran)
Subject:

136. Introduction -- Severing the aesthetic connection -- Texts, readers, and reading formations -- Figuring audiences and readers -- Culture and governmentality -- Acting on the social : art, culture, and government -- Archaeological autopsy : objectifying time and cultural governance -- Civic seeing : museums and the organisation of vision -- Intellectuals, culture, policy : the technical, the practical, and the critical -- The hist
Author: Tony Bennett.
Library: Library of Islamic Parliament (Tehran)
Subject:

137. Introduction to network security
Author: Neal Krawetz.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols -- Textbooks.,Computer networks -- Security measures -- Textbooks.,COMPUTERS -- Internet -- Security.
Classification :
TK5105
.
59
N435
9999


138. JZ6045,<The> hidden face of Eve :
Author: by Lars Kirchhoff. ,William E. Landis, Robin L. Chandler, editors.
Library: Library of Islamic Parliament (Tehran)
Subject:

139. Machine generated contents note: The Context -- Development of Islamic Thought in the -- 20th Century -- Features of the Socio-Economic Development -- in the Occupied Territories and the Intifada -- PART ONE: THE BASIC THEMES IN THE -- THOUGHT OF HAMAS -- The Problem: Israel, Zionism and the Jews -- The Goal: An Islamic Palestinian State -- Sense of Urgency: Mass-Immigration -- of Soviet Jews -- Hostility and Isolation -- The International Community -- The Arab-Muslim Countries -- The Traditional Palestinian Leadership -- Means -- Palestine:Jihad in Form of the Intifdda -- The Arab-Muslim World: Islamisation -- and Democratisation -- Self-Image of Islam -- v Inner Enemy: The Palestinian -- Liberation Organisa
Author: Andrea Nüsse.
Library: Library of Islamic Parliament (Tehran)
Subject:

140. Make a shield from wisdom :
Author: 20090507 0
Library: Library of Islamic Parliament (Tehran)
Subject:
