161. Critical approaches to international security /
Author: K. M.
Library: Library of Islamic Parliament (Tehran)
Subject:

162. Critical information infrastructure security :
Author: Sandro Bologna, Bernhard Hämmerli, Dimitris Gritzalis, Stephen Wolthusen (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses
Classification :
QA76
.
9
.
A25
C75
2011


163. Critical infrastructure protection
Author: / Javier Lopez, Roberto Setola, Stephen D. Wolthusen (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks--Security measures,Information networks--Security measures,Data encryption (Computer science),Data structures (Computer science),Information technology--Security measures
Classification :
TK5105
.
59
.
C725
2012


164. Critical infrastructure protection
Author: Javier Lopez, Roberto Setola, Stephen D. Wolthusen (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Data encryption (Computer science),Data structures (Computer science),Information networks-- Security measures,Information technology-- Security measures
Classification :
TK5105
.
59
.
C725
2012eb


165. Critical infrastructure protection V :
Author: Jonathan Butts, Sujeet Shenoi (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Cyberinfrastructure-- Security measures, Congresses.
Classification :
TK5105
.
59
.
I35
2011


166. Critical infrastructure security and resilience :
Author: Dimitris Gritzalis, Marianthi Theocharidou and George Stergiopoulos, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Computer security-- Government policy.,Cyber intelligence (Computer security),Computer Appl. in Administrative Data Processing.,Computer Communication Networks.,Cybercrime.,Security Science and Technology.,Security.,Systems and Data Security.,Computer science.,Computer security-- Government policy.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Cyber intelligence (Computer security)
Classification :
QA76
.
9
.
A25
C75
2019


167. Cryptology and network security :
Author: Jan Camenisch, Panos Papadimitratos (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Computer Communication Networks.,Computers and Society.,Cryptology.,Information Systems and Communication Service.,Software Engineering/Programming and Operating Systems.,Computer networking & communications.,Computer networks-- Security measures.,Computers-- Hardware-- Network Hardware.,Computers-- Online Services-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- General.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Data encryption.,Ethical & social aspects of IT.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25


168. Cyber criminalité :
Author: Éric Filiol ; Phillipe Richard.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer crimes.,Computer security.,Data protection.,criminalité-- Internet.,sécurité informatique.,Criminalité informatique.,Entreprises-- Réseaux d'ordinateurs-- Sécurité-- Mesures.,Protection de l'information (Informatique),Sécurité informatique.,Business enterprises-- Computer networks-- Security measures.,Computer crimes.,Computer security.,Crime informatique.,Criminalité informatique.,criminalité-- Internet.,Data protection.,Fraude.,Internet.,Piratage informatique.,Pirate informatique.,Sécurité des données.,sécurité informatique.,Sécurité informatique.
Classification :
HV6773
.
F55
2006


169. Cyber infrastructure protection
Author: Tarek Saadawi, Louis Jordan, Jr. editors
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Cyberinfrastructure, Security measures,Computer networks, Security measures

170. Cyber infrastructure protection /
Author: Tarek Saadawi, Louis Jordan, editors
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Cyberinfrastructure-- Security measures
Classification :
U413
.
A66
C93
2011


171. Cyber-security and global information assuranc
Author: / Kenneth J. Knapp, editor
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Information technology--Security measures,Computer security--Management,Cyberspace--Security measures,Data protection.,Computer networks--Security measures
Classification :
QA
,
76
.
9
,.
A25
,
C918
,
2009


172. Cyber-security and global information assurance
Author: / Kenneth J. Knapp, editor
Library: Insurance Research Institute Library (Tehran)
Subject: Information technology, Security measures,Computer security, Management,Cyberspace, Security measures,Data protection,Computer networks, Security measures
Classification :
QA76
.
9
.
C9
2009


173. Cyber-security and global information assurance :
Author: Kenneth J. Knapp [editor].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Cyberspace-- Security measures.,Data protection.,Information technology-- Security measures.,Computer networks-- Security measures.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25
C918
2009eb


174. Cyber-security and global information assurance: threat analysis and response solutions
Author: Kenneth J. Knapp, editor
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Security measures ، Information technology,Management ، Computer security,Security measures ، Cyberspace,، Data protection,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
C918


175. Cyber security awareness for CEOs and management
Author: David Willson ; contributing editor, Henry Dalziel.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer crimes-- Prevention.,Computer security.,Corporations-- Security measures.,Data protection.

176. Cyber security standards, practices and industrial applications :
Author: Junaid Ahmed Zubairi, Athar Mahboob.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data protection.,Electronic data processing departments-- Security measures.

177. Cybersecurity Law
Author: \ Jeff Kosseff
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Law and legislation -- United States,Data protection -- Law and legislation -- United States,Hacking -- United States -- Prevention,Cyberterrorism -- Prevention,Privacy, Right of -- United States,Computer networks -- Security measures,Computer security -- Law and legislation,کامپیوترها -- ایمنی اطلاعات -- قوانین و مقررات -- ایالات متحده ,حفاظت اطلاعات -- قوانین و مقررات -- ایالات متحده,تروریسم رایانهای -- پیشگیری
Classification :
KF1263
.
C65
K67
2017


178. Cybersecurity awareness among students and faculty /
Author: by Abbas Moallem.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Universities and colleges-- Security measures.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Security-- General.,COMPUTERS-- Social Aspects-- Human-Computer Interaction.,LAW-- Forensic Science.,Universities and colleges-- Security measures.
Classification :
QA76
.
9
.
A25
M654
2019eb


179. Cybersecurity, cyberanalysis, and warning /
Author: Kerry T. Norwood and Sandra P. Catwell, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Automatic data collection systems.,Computer crimes-- United States-- Prevention.,Computer networks-- Security measures-- United States.,Cyberterrorism-- United States-- Prevention.,Electronic government information-- Access control-- United States.,Electronic government information-- Protection-- Government policy-- United States.,Automatic data collection systems.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Cyberterrorism-- Prevention.,Electronic government information-- Access control.,POLITICAL SCIENCE-- Public Affairs & Administration.,United States., 7
Classification :
TK5105
.
59


180. Cybersecurity law
Author: / Jeff Kosseff,Kosseff, Jeff
Library: Special Library of Law (Tehran)
Subject: Computer security -- Law and legislation -- United States,Data protection -- Law and legislation -- United States,Hacking -- United States -- Prevention,Cyberterrorism -- Prevention,Privacy, Right of -- United States,Computer networks -- Security measures,Computer security -- Law and legislation
Classification :
KF1263
.
C65
K67
2017
,
DB4420

