1. AVIEN malware defense guide for the Enterpris
Author: / David Harley ... [et al.]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Computer security--Management,Computer viruses.,Malware (Computer software)
Classification :
QA
,
76
.
9
,.
A873
,
2007


2. AVIEN malware defense guide for the Enterprise /
Author: David Harley [and others] ; foreword by Robert S. Vibert.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Computer viruses.,Computer networks-- Security measures.,Computer security-- Management.,Computer viruses.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
A873
2007eb


3. AVIEN malware defense guide for the Enterprise
Author: / David Harley ... [et al.]
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security- Management,Computer networks- Security measures,Computer viruses
Classification :
QA76
.
9
.
A25
,
A873
2007


4. AVIEN malware defense guide for the Enterprise
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Management. ; Computer networks ; Security measures. ; Computer viruses. ;

5. Automatic defense against zero-day polymorphic worms in communication networks
Author: Mohssen Mohammed, Al-Sakib Khan Pathan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer algorithms.,Computer networks-- Security measures.,Computer viruses.,Machine theory.

6. CYA :
Author: Henrik Walther ; Patrick Santry, technical editor
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Client/server computing.,Computer networks-- Security measures.,Electronic mail systems-- Security measures.

7. Computer viruses and malware
Author: / by John Aycock
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer viruses,Computer networks- Security measures
Classification :
QA76
.
76
.
C68
,
A96
2006


8. Configuring Symantec Antivirus, Corporate Editio
Author: / Laura E. Hunter ... [et al.]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer viruses.,Computer security.,Computer networks--Security measures
Classification :
QA
,
76
.
76
,.
C68
,
C66
,
2003eb


9. Configuring Symantec Antivirus, Corporate Edition
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer viruses. ; Computer security. ; Computer networks ; Security measures. ;

10. Configuring Symantec Antivirus, Corporate Edition
Author: Laura E. Hunter ... [et al.] ; Robert J. Shimonski, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer viruses.

11. Cryptography and network security :
Author: William Stallings.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Chiffrement (Informatique),Cryptographie à clé publique.,Cryptographie-- Réseaux d'ordinateurs.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Coding theory.,Computer networks-- Security measures.,Computer security.,Computersicherheit,Data encryption (Computer science),Internet,Internet.,Kryptologie,Rechnernetz
Classification :
TK5105
.
59
.
S713
2006


12. Defense and detection strategies against Internet worm
Author: / Jose Nazario
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer networks--Security measures,Computer viruses.
Classification :
QA
,
76
.
9
,.
A25
,
N38
,
2004eb


13. Defense and detection strategies against Internet worms
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Computer networks ; Security measures. ; Computer viruses. ;

14. Defense and detection strategies against Internet worms
Author: / Jose Nazario
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer networks- Security measures,Computer viruses
Classification :
QA76
.
9
.
A25
,
N38
2004


15. Defense and detection strategies against Internet worms
Author: Jose Nazario
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Computer networks -- Security measures,، Computer viruses
Classification :
QA
76
.
9
.
A25N29


16. Defense and detection strategies against Internet worms
Author: / Jose Nazario
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer networks- Security measures,Computer viruses
Classification :
QA76
.
9
.
A25
,
N38
2004


17. Digital security :
Author: Ananda Mitra.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes, Juvenile literature.,Computer networks-- Security measures, Juvenile literature.,Computer security, Juvenile literature.,Cyberterrorism-- Prevention, Juvenile literature.,Internet-- Security measures, Juvenile literature.,Computer crimes.,Computer networks-- Security measures.,Computer security.,Cyberterrorism.,Internet-- Security measures.,Computer crimes.,Computer crimes.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,Cyberterrorism-- Prevention.,Internet-- Security measures.,Internet-- Security measures.
Classification :
HV6773
.
M58
2010


18. Disruptive security technologies with mobile code and peer-to-peer networks
Author: / R.R. Brooks
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Peer-to-peer architecture (Computer networks),Computer networks--Security measures,Computer viruses.
Classification :
TK5105
.
525
.
B76
2005


19. Elements of computer security
Author: / David Salomon
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security,Computer networks, Security measures
Classification :
QA76
.
9
.
A2S35
2010


20. Fundamentals of network security /
Author: John E. Canavan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,COMPUTER INFORMATION SECURITY.,Computer networks-- Security measures.,COMPUTER NETWORKS.,COMPUTER PROGRAM INTEGRITY.,Computer security.,COMPUTER VIRUSES.,COMPUTERS.,OPERATING SYSTEMS (COMPUTERS),Réseaux d'ordinateurs-- Mesures de sûreté.
Classification :
QA76
.
9
.
A25
C364
2001

