1. Cyber war :
Author: Richard A. Clarke and Robert K. Knake.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cyberspace operations (Military science)-- United States.,Cyberterrorism-- United States-- Prevention.,Cyberterrorism-- United States.,Information warfare-- United States-- Prevention.,Information warfare-- United States.,Bekämpfung,Computer networks-- Security measures.,Computerkriminalität,Cyberspace operations (Military science),Cyberterrorism-- Prevention.,Cyberterrorism.,Cyberterrorism.,Information warfare-- Prevention.,Information warfare.,Informationskrigföring.,Internet,National security-- United States.,POLITICAL SCIENCE-- Political Freedom & Security-- International Security.,Sabotage-- United States-- Prevention.,Terrorism-- United States-- Prevention.,Terrorismus,United States.,USA, 7, 7
Classification :
HV6773
.
2
.
C57
2010


2. Digital security :
Author: Ananda Mitra.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes, Juvenile literature.,Computer networks-- Security measures, Juvenile literature.,Computer security, Juvenile literature.,Cyberterrorism-- Prevention, Juvenile literature.,Internet-- Security measures, Juvenile literature.,Computer crimes.,Computer networks-- Security measures.,Computer security.,Cyberterrorism.,Internet-- Security measures.,Computer crimes.,Computer crimes.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,Cyberterrorism-- Prevention.,Internet-- Security measures.,Internet-- Security measures.
Classification :
HV6773
.
M58
2010


3. Implementing homeland security for enterprise IT
Author: / Michael Erbschloe
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Internet- Security measures,Computer networks- Security measures,Cyberterrorism
Classification :
QA76
.
9
.
A25
,
E74
2004


4. Routledge companion to global cyber-security strategy /
Author: edited by Scott N. Romaniuk and Mary Manjikian.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention-- Government policy.,Computer networks-- Security measures-- Government policy.,Computer security-- Government policy.,Cyberspace-- Security measures-- Government policy.,Cyberterrorism-- Prevention-- Government policy.,Internet-- Security measures-- Government policy.,Computer networks-- Security measures-- Government policy,Computer security-- Government policy,COMPUTERS / Internet / Security,HISTORY / Military / Strategy,POLITICAL SCIENCE / Political Freedom & Security / International Security
Classification :
UA163
.
R68
2021


5. Securing the information infrastructur
Author: / Joseph M. Kizza, Florence M. Kizza
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Cyberterrorism.,Internet--Security measures,Computer networks--Security measures,Information superhighway--Security measures
Classification :
HV
,
6773
,.
K59
,
2008eb


6. Securing the information infrastructure /
Author: Joseph M. Kizza, Florence M. Kizza.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Cyberterrorism.,Information superhighway-- Security measures.,Internet-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Computersicherheit,Cyberterrorism.,Datensicherung,Information superhighway-- Security measures.,Internet-- Security measures.,Internet.
Classification :
HV6773
.
K59
2008eb


7. Securing the information infrastructure
Author: Kizza, Joseph Migga.
Library: Library of Niroo Research Institue (Tehran)
Subject: ، Cyberterrorism,Security measures ، Internet,Security measures ، Computer networks,Security measures ، Information superhighway
Classification :
HV
6773
.
K59
2008


8. Securing the information infrastructure
Author: Joseph M. Kizza, Florence M. Kizza.
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Cyberterrorism,Internet -- Security measures,Computer networks -- Security measures,Information superhighway -- Security
Classification :
HV
،
6773
،.
K59
،
2008


9. Securing the information infrastructure
Author: / Joseph M. Kizza, Florence M. Kizza.
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Cyberterrorism.,Internet--Security measures.,Computer networks--Security measures,Information superhighway--Security measures.
Classification :
HV
6773
.
K59
2008


10. Surviving cyberwar /
Author: Richard Stiennon
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Civil defense-- United States,Computer networks-- Security measures-- United States,Cyberspace-- Security measures,Cyberterrorism-- United States-- Prevention,Information warfare-- United States
Classification :
U163
.
S73
2010


11. Toward a safer and more secure cyberspace /
Author: Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Cyberterrorism-- Prevention.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Cyberterrorism-- Prevention.
Classification :
QA76
.
9
.
A25
T695
2007eb


12. گام به گام با امنیت سایبری: راهبرد مدیران در امنیت اطلاعات
Author: / مولف دژان کوژتیچ,Steps to Cybersecurity The Managers Information Security Strategy Manual9
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: شبکههای کامپیوتری -- تدابیر ایمنی,Security measures -- Computer networks,فضای مجازی -- تدابیر ایمنی,Security measures -- Cyberspace,تکنولوژی اطلاعات -- تدابیر ایمنی,Security measures -- Information technology,اینترنت -- تدابیر ایمنی,Security measures -- Internet,تروریسم رایانهای,Cyberterrorism
Classification :
TK
۵۱۰
/
۵
/
ک
۹
گ
۲ ۱۳۹۵

