181. Stealing the network
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer crimes ; Fiction. ; Computer hackers ; Fiction. ; Computer hackers ; Psychology ; Fiction. ; Computer security ; Fiction. ; Identity theft ; Fiction. ;

182. Stealing the network : how to own an identity
Author: Raven Alder... ]et al.[; Timothy Mullen )Thor(, contributing author and technical editor; Johnny Long, contributing author and technical editor
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Fiction ، Identity theft,Fiction ، Computer crimes,Fiction ، Computer hackers,Fiction ، Computer security,Psychology -- Fiction ، Computer hackers
Classification :
PS
648
.
C65S83


183. Syngress force emerging threat analysis
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer crimes ; Prevention. ; Computer networks ; Security measures. ; Computer security. ;

184. Syngress force emerging threat analysis :
Author: David Maynor ... [et al.]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer networks-- Security measures,Computer security

185. Tangled web
Author: / Richard Power
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer crimes.,Computer security.
Classification :
HV
,
6773
,.
P683
,
2000


186. Targeted cyber attacks
Author: Aditya K. Sood, Richard Enbody ; technical editor Peter Loshin
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer networks-- Security measures,Cyberspace-- Security measures
Classification :
TK5105
.
59
.
S66
2014


187. Techno security's guide to e-discovery and digital forensic
Author: / Jack Wiles, lead author
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer crimes--Investigation,Computer networks--Security measures,Computer security.
Classification :
HV
,
8079
,.
C65
,
W53
,
2007eb


188. Technocrime
Author:
Library: Farabi Faculty Library, University of Tehran (Qom)
Subject: Criminal investigation -- Technological innovations,Computer crimes,Computer security,Social control,Electronic surveillance
Classification :
HV
8073
.
T22
2008


189. <The> Basics of Web Hacking
Author: \ Josh Pauli ; Scott White, technical editor
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer hackers,Computer crimes,هکرها,جرایم کامپیوتری, -- Prevention, -- پیشگیری,a08,a10,a08,a10,Web sites -- Security measures,Web applications-- Security measures,Computer networks-- Security measures,Penetration testing (Computer security),وبگاهها -- تدابیر ایمنی,برنامههای کاربردی وب -- تدابیر ایمنی,شبکههای کامپیوتری -- تدابیر ایمنی, آزمایش نفوذ ( ایمنسازی کامپیوتر)
Classification :
TK5105
.
59
.
P38B3
2013


190. The Best of 2600
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- History.,Computer security-- History.,Hackers-- History.,Telecommunication-- Security measures-- History.,Wiretapping-- History.,Computer crimes.,Computer security.,Hackers.,Telecommunication-- Security measures.,Wiretapping.
Classification :
QA76
.
9
.
A25
G643
2009


191. <The> Law and economics of cybersecurity
Author:
Library: Library of Faculty of Literature and Humanities Sciences of Kashan University (Esfahan)
Subject: Computer crimes,Computer security- Law and legislation- Economic aspects,Online information services- Law and legislation
Classification :
364
.
168
L415


192. The baby harvest :
Author: Chris Rock.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Data protection.,Security, International.

193. The baby harvest :
Author: Chris Rock.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Data protection.,Security, International.

194. The basics of hacking and penetration testing
Author: Patrick Engebretson
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer hackers,Computer software-- Testing,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
2013


195. The basics of hacking and penetration testing :
Author: Patrick Engebretson ; technical editor, James Broad.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer security.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security)

196. The basics of web hacking
Author: Josh Pauli ; Scott White, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Hackers.,Penetration testing (Computer security),Web applications-- Security measures.,Web sites-- Security measures.

197. The basics of web hacking
Author: Josh Pauli
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer hackers,Computer networks-- Security measures,Penetration testing (Computer security),Web applications-- Security measures,Web sites-- Security measures
Classification :
TK5105
.
59
.
P385
2013


198. The best of 2600 :
Author: Emmanuel Goldstein.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- History.,Computer security-- History.,Hackers-- History.,Telecommunication-- Security measures-- History.,Wiretapping-- History.,Computer crimes.,Computer security.,criminalité informatique-- 1980-- 2008.,écoute clandestine-- 1980-- 2008.,hacker-- 1980-- 2008.,Hackers.,sécurité informatique-- 1980-- 2008.,sécurité informatique-- télécommunications-- 1980-- 2008.,Telecommunication-- Security measures.,Wiretapping.
Classification :
QA76
.
9
.
A25
G643
2008


199. The death of the internet
Author: edited by Markus Jakobsson
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes,Data protection,Electronic commerce-- Security measures,Internet-- Security measures
Classification :
TK5105
.
875
.
I57
.
J34
2012


200. The hacker diaries
Author: / Dan Verton
Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)
Subject: Computer security,Computer hackers- Interviews,Computer hackers- Psychology,Computer crimes
Classification :
QA76
.
9
.
A25V47
2002

