561. The official CHFI study guide (Exam 312-49)
Author: Dave Kleinman, technical editor ; Kevin Cardwell ... [et al.]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Examinations, Study guides,Computer security-- Examinations, Study guides
Classification :
QA76
.
9
.
A25
O34
2007


562. The official (ISC)² CISSP CBK reference /
Author: John Warsinkse ; with Mark Graff, Kevin Henry, Christopher Hoover, Ben Malisow, Sean Murphy, C. Paul Oakes, George Pajari, Jeff T. Parker, David Seidl, Mike Vasquez.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Administrative agencies-- Information resources management-- Security measures-- United States-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations, Study guides.,Computers-- Access control-- Examinations, Study guides.,Telecommunications engineers-- Certification-- United States.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer networks-- Security measures-- Examinations.,Telecommunications engineers-- Certification.,United States., 7
Classification :
TK5105
.
59


563. The second economy :
Author: Steve Grobman, Allison Cerra ; foreword by Christopher Young
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes,Computer networks-- Security measures,Computer security,Cyberspace-- Security measures,Cyberterrorism
Classification :
TK5105
.
59


564. The smart girl's guide to privacy :
Author: Violet Blue.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Internet and women.,Internet-- Safety measures.,Internet-- Security measures.,Privacy, Right of.
Classification :
HV6773
.
B56
2015


565. The traditional problem of evil: suffering and evil actions -- Another problem of evil: divine hiddenness -- Miracles as a problem of evil -- The ignorance defense -- Identifying, interpreting, and certifying revelation -- Should God's power be understood as omnipotence? -- A process Christian theism and the problems of evil. 0
Author: James A. Keller.
Library: Library of Islamic Parliament (Tehran)
Subject:

566. The virtual battlefield :
Author: edited by Christian Czosseck and Kenneth Geers.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Cyberterrorism.,Information warfare.,Computer crimes.,Cyberterrorism.,HISTORY-- Military-- Strategy.,Information warfare.
Classification :
U163
.
V578
2009eb


567. Traceback and Anonymity
Author: \ Xinyuan Wang, Douglas Reeves.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security.,Cyberspace-- Security measures.,Computer crimes-- Prevention.,کامپیوترها -- ایمنی اطلاعات ,فضای مجازی -- تدابیر ایمنی ,جرایم کامپیوتری -- پیشگیری
Classification :
QA
76
.
9
.
W32T7
2015
E-Book
,


568. Traceback and anonymity /
Author: Xinyuan Wang, Douglas Reeves
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer security.,Cyberspace-- Security measures.,Cyberterrorism-- Prevention.
Classification :
QA76
.
9
.
A25


569. UNIX and Linux forensic analysis toolki
Author: / Chris Pogue, Cory Altheide, Todd Haverkos
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: UNIX (Computer file),Linux.,Computer crimes--Investigation,Computer security.,Forensic sciences.
Classification :
HV
,
8079
,.
C65
,
P64
,
2008eb


570. Understanding cyber risk :
Author: Thomas R. Koehler.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Business intelligence.,Computer crimes-- Prevention.,Data protection.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Business enterprises-- Computer networks-- Security measures.,Business intelligence.,Computer crimes-- Prevention.,Data protection.
Classification :
HF5548
.
37
.
K64
2018


571. Unix and Linux forensic analysis DVD toolkit
Author: Pogue, Chris.
Library: Library of Niroo Research Institue (Tehran)
Subject: Investigation ، Computer crimes,، Computer security,، Forensic sciences
Classification :
HV
8079
.
C65P64
2008


572. Vers & virus :
Author: François Paget; sous la direction de Philippe Rosé.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Computer security.,Computer viruses.
Classification :
QA76
.
76
.
C68
F736
2005


573. Virtualization and forensics : a digital forensic investigator's guide to virtual environments
Author: Barrett, Diane.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Investigation ، Computer crimes,Security measures ، Virtual computer systems,، Computer security
Classification :
HV
8079
.
C65
B37
2010


574. Vulnerability analysis and defense for the Interne
Author: / by Abhishek Singh (editor)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer networks--Security measures--Evaluation,Computer crimes--Prevention
Classification :
QA
,
76
.
9
,.
A25
,
V848
,
2008


575. Vulnerability analysis and defense for the Internet
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Computer networks ; Security measures ; Evaluation. ; Computer crimes ; Prevention. ;

576. Vulnerability analysis and defense for the Internet
Author: by Abhishek Singh (editor) ; [with contributions by] Baibhav Singh and Hirosh Joseph.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures-- Evaluation.,Computer security.

577. Web Application Defender's Cookbook :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer security.,Hackers.
Classification :
QA76
.
9
.
A25
B37
2013eb


578. What every engineer should know about cyber security and digital forensics /
Author: Joanna F. DeFranco
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation,Computer networks-- Security measures,Computer security
Classification :
TK5105
.
59
.
D44
2014


579. Windows Forensic Analysis
Author: \ Harlan Carvey
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer crimes -- Investigation -- United States -- Methodology,Computer networks -- Security measures,Internet -- Security measures,جرایم کامپیوتری -- ایالات متحده -- پیجویی -- روششناسی,شبکههای کامپیوتری -- تدابیر ایمنی,اینترنت -- تدابیر ایمنی
Classification :
E-Book
,

580. Windows forensic analysi
Author: / Harlan Carvey
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Microsoft Windows (Computer file)--Security measures,Computer crimes--Investigation--United States--Methodology,Computer networks--Security measures,Internet--Security measures,Computer security.
Classification :
HV
,
8079
,.
C65
,
C37
,
2007eb

