141. Mobile malware attacks and defense
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Cell phone systems ; Security measures. ; Mobile communication systems ; Security measures. ; Mobile computing ; Security measures. ; Computer crimes ; Prevention. ; Computer crimes ; Case studies. ; Hackers. ; Wireless Internet ; Security measures. ;

142. Mobile malware attacks and defense
Author: / Ken Dunham, technical editor
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Cell phone systems--Security measures,Mobile communication systems--Security measures,Mobile computing--Security measures,Computer crimes--Prevention,Computer crimes--Case studies,Hackers.,Wireless Internet--Security measures
Classification :
TK
,
5102
.
85
,.
M62
,
2009


143. Network intrusion analysis
Author: Joe Fichera, Steven Bolt
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation-- United States,Computer networks-- Security measures,Computer security,Internet-- Security measures,Intrusion detection systems (Computer security)
Classification :
HV8079
.
C65
F53
2012


145. Online consumer protection :
Author: Kuanchin Chen, Adam Fadlalla [editors].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Consumer protection.,Disclosure of information.,Electronic commerce-- Security measures.,Electronic information resources-- Access control.,Ethical relativism.,Privacy, Right of.,BUSINESS & ECONOMICS-- Commercial Policy.,BUSINESS & ECONOMICS-- Consumer Behavior.,Computer crimes.,Consumer protection.,Disclosure of information.,Electronic commerce-- Security measures.,Electronic information resources-- Access control.,Ethical relativism.,Privacy, Right of.
Classification :
HC79
.
C63
O54
2009eb


146. Operating system forensics /
Author: Ric Messier ; Kevin Mackay, technical editor
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation,Computer security,Operating systems (Computers)-- Security measures
Classification :
HV8079
.
C65
M47
2016


148. Routledge companion to global cyber-security strategy /
Author: edited by Scott N. Romaniuk and Mary Manjikian.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention-- Government policy.,Computer networks-- Security measures-- Government policy.,Computer security-- Government policy.,Cyberspace-- Security measures-- Government policy.,Cyberterrorism-- Prevention-- Government policy.,Internet-- Security measures-- Government policy.,Computer networks-- Security measures-- Government policy,Computer security-- Government policy,COMPUTERS / Internet / Security,HISTORY / Military / Strategy,POLITICAL SCIENCE / Political Freedom & Security / International Security
Classification :
UA163
.
R68
2021


150. Security awareness :
Author: Mark Ciampa, Ph. D.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Confidential communications-- Protection.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computers and IT.,Computers and IT.
Classification :
TK5105
.
59
.
C53
2017


151. The basics of web hacking
Author: Josh Pauli ; Scott White, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Hackers.,Penetration testing (Computer security),Web applications-- Security measures.,Web sites-- Security measures.

152. The death of the internet
Author: edited by Markus Jakobsson
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes,Data protection,Electronic commerce-- Security measures,Internet-- Security measures
Classification :
TK5105
.
875
.
I57
.
J34
2012


153. The fugitive game
Author: / Jonathan Littman
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Mitnick, Kevin D.--(Kevin David),--1963,Computer crimes--United States--Investigation,Hackers--United States--Psychology,Internet--Security measures--United States
Classification :
HV
,
6773
.
2
,.
L57
,
1996


154. The smart girl's guide to privacy :
Author: Violet Blue.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Internet and women.,Internet-- Safety measures.,Internet-- Security measures.,Privacy, Right of.
Classification :
HV6773
.
B56
2015


155. The virtual battlefield :
Author: edited by Christian Czosseck and Kenneth Geers.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Cyberterrorism.,Information warfare.,Computer crimes.,Cyberterrorism.,HISTORY-- Military-- Strategy.,Information warfare.
Classification :
U163
.
V578
2009eb


156. Understanding cyber risk :
Author: Thomas R. Koehler.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Business intelligence.,Computer crimes-- Prevention.,Data protection.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Business enterprises-- Computer networks-- Security measures.,Business intelligence.,Computer crimes-- Prevention.,Data protection.
Classification :
HF5548
.
37
.
K64
2018


157. Vulnerability analysis and defense for the Internet
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Computer networks ; Security measures ; Evaluation. ; Computer crimes ; Prevention. ;

158. Vulnerability analysis and defense for the Internet
Author: by Abhishek Singh (editor) ; [with contributions by] Baibhav Singh and Hirosh Joseph.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures-- Evaluation.,Computer security.

159. What every engineer should know about cyber security and digital forensics /
Author: Joanna F. DeFranco
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation,Computer networks-- Security measures,Computer security
Classification :
TK5105
.
59
.
D44
2014


160. Windows Forensic Analysis
Author: \ Harlan Carvey
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer crimes -- Investigation -- United States -- Methodology,Computer networks -- Security measures,Internet -- Security measures,جرایم کامپیوتری -- ایالات متحده -- پیجویی -- روششناسی,شبکههای کامپیوتری -- تدابیر ایمنی,اینترنت -- تدابیر ایمنی
Classification :
E-Book
,
