1. AVIEN malware defense guide for the Enterprise /
Author: David Harley [and others] ; foreword by Robert S. Vibert.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Computer viruses.,Computer networks-- Security measures.,Computer security-- Management.,Computer viruses.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
A873
2007eb


2. Honeypot frameworks and their applications :
Author: Chee Keong Ng, Lei Pan, Yang Xiang.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Malware (Computer software)-- Prevention.,Computer modelling & simulation.,Computer networking & communications.,Computer security.,Computer security.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Viruses & Malware.,Mathematical physics.,Maths for computer scientists.
Classification :
QA76
.
9
.
A25


3. Malware data science :
Author: by Joshua Saxe with Hillary Sanders.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computer viruses.,Debugging in computer science.,Malware (Computer software),Computer security.,Computer viruses.,COMPUTERS-- Security-- Viruses & Malware.,Debugging in computer science.,Malware (Computer software)
Classification :
QA76
.
76
.
C68
S29
2018


4. PC magazine fighting spyware, viruses, and malware /
Author: Ed Tittel.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computer viruses.,Malware (Computer software),Computer security.,Computer viruses.,Computerbeveiliging.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Computervirussen.,Malware (Computer software),Spyware.
Classification :
QA76
.
9
.
A25
T57
2005eb


5. Preventing ransomware :
Author: Abhijit Mohanta, Mounir Hahad, Kumaraguru Velmurugan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer crimes.,Computer networks-- Security measures.,Computer security.,Malware (Computer software),Coding theory & cryptology.,Computer crimes-- Prevention.,Computer crimes.,Computer networks-- Security measures.,Computer security.,Computer security.,Computer viruses, Trojans & worms.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Viruses & Malware.,Data encryption.,Malware (Computer software)
Classification :
QA76
.
9
.
A25
M64
2018


6. Rootkits and bootkits :
Author: by Alex Matsorov, Eugene Rodionov, and Sergey Bratus.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Malware (Computer software),Computer security.,COMPUTERS-- Security-- Viruses & Malware.,Malware (Computer software)
Classification :
QA76
.
9
.
A25


7. Windows Virus and Malware Troubleshooting
Author: Bettany, Andrew
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer science,، Operating systems )Computers(,، Malware )Computer software(,، Computer security
Classification :
TL
272
.
B37
2017

