81. Digital forensics basics :
Author: Nihad A. Hassan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation.,Computer security.,Digital forensic science.,Computer crimes-- Investigation.,Computer security.,Digital forensic science.
Classification :
HV8079
.
C65
.
H377
2019


82. Digital forensics for handheld devices /
Author: Eamon P. Doherty
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cell phones,Computer crimes-- Investigation,Computer security,Forensic sciences
Classification :
HV8079
.
C65
D64
2013


83. Digital forensics for network, Internet, and cloud computing :
Author: Terrence V. Lillard [and others] ; technical editor, Jim Murray.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures.,Computer crimes-- Investigation.,Computer networks-- Security measures.,Computer security.,Computer crimes-- Investigation.,Computer networks-- Security measures.,Computer security.,LAW-- Forensic Science.
Classification :
HV8079
.
C65
D54
2010


84. Digital forensics for network, Internet, and cloud computing
Author: / Terrence V. Lillard ... [et al.]
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer crimes -- Investigation,Computer security,Computer networks -- Security measures,Cloud computing -- Security measures
Classification :
HV
8079
.
C65
D5
2010


85. Digital forensics for network, Internet, and cloud computing :a forensic evidence guide for moving targets and data
Author: Terrence V. Lillard ... ]et al.[ ; technical editor, Jim Murray
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Investigation ، Computer crimes,، Computer security,Security measures ، Computer networks,Security measures ، Cloud computing
Classification :
HV
8079
.
C65
D54
2010


86. Digital security :
Author: Ananda Mitra.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes, Juvenile literature.,Computer networks-- Security measures, Juvenile literature.,Computer security, Juvenile literature.,Cyberterrorism-- Prevention, Juvenile literature.,Internet-- Security measures, Juvenile literature.,Computer crimes.,Computer networks-- Security measures.,Computer security.,Cyberterrorism.,Internet-- Security measures.,Computer crimes.,Computer crimes.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,Cyberterrorism-- Prevention.,Internet-- Security measures.,Internet-- Security measures.
Classification :
HV6773
.
M58
2010


87. Dissecting the hack :
Author: Jayson E. Street [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation.,Computer crimes, Case studies.,Computer networks-- Security measures.,Computer security.,Hackers.,Computer crimes-- Case studies.,Computer crimes-- Investigation.,Computer crimes-- Investigation.,Computer crimes.,Computer hackers.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,Hackers.,TRUE CRIME-- White Collar Crime.
Classification :
HV8079
.
C65
S856
2010b


88. Dissecting the hack :
Author: Jayson E. Street, Brian Baskin, Kristin Sims ; technical editor Brian Martin
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes,Computer networks-- Security measures,Computer security,Cyberterrorism,Hackers,Hacking
Classification :
HV8079
.
C65


89. Emerging Trends in ICT Security.
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Cyberterrorism-- Prevention.,Electronic surveillance.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25


90. EnCase computer forensics
Author: Steve Bunting
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation-- Examinations, Study guides,Computer networks-- Security measures-- Examinations, Study guides,Computer security-- Examinations, Study guides,Electronic data processing personnel-- Certification,Forensic sciences-- Examinations, Study guides
Classification :
QA76
.
3
.
B86
2012


91. EnCase computer forensics
Author: Steve Bunting
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation-- Examinations, Study guides,Computer networks-- Security measures-- Examinations, Study guides,Computer security-- Examinations, Study guides,Electronic data processing personnel-- Certification,Forensic sciences-- Examinations, Study guides
Classification :
QA76
.
3
.
B86
2012


92. Encyclopedia Of Cybercrime
Author: / Edited By Samuel C. McQuade
Library: Library of Islamic Encyclopedia Foundation (Tehran)
Subject: کامپیوترها, -- دایرهالمعارفها, -- ایمنی اطلاعات,Computer crimes -- Encyclopedias, Internet fraud -- Encyclopedias., Computer security -- Encyclopedias.,Computer crimes -- United States -- Encyclopedias., Internet fraud -- United States -- Encyclopedias,جرایم کامپیوتری -- دایره المعارف ها,اینترنت -- تقلب -- دایره المعارف ها
Classification :
HV
6773
.
E53


93. Encyclopedia of cybercrime
Author: / edited by Samuel C. McQuade, III
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer crimes--Encyclopedias,Internet fraud--Encyclopedias,Computer security--Encyclopedias,Internet fraud--Prevention--Encyclopedias,Computer crimes--United States--Encyclopedias,Internet fraud--United States--Encyclopedias,Computer security--United States--Encyclopedias,Internet fraud--United States--Prevention--Encyclopedias
Classification :
HV
,
6773
,.
E53
,
2009


94. Encyclopedia of cybercrime
Author:
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer crimes--Encyclopedias.,Internet fraud--Encyclopedias.,Computer security--Encyclopedias
Classification :
HV6773


95. Encyclopedia of cybercrime
Author: / edited by Samuel C. McQuade, III
Library: Razi Psychiatric Center Library (Tehran)
Subject: Computer crimes--Encyclopedias,Internet fraud--Encyclopedias,Computer security--Encyclopedias,Internet fraud--Prevention--Encyclopedias,Computer crimes--United States--Encyclopedias,Internet fraud--United States--Encyclopedias,Computer security--United States--Encyclopedias,Internet fraud--United States--Prevention--Encyclopedias
Classification :
HV6773
.
E53
2009


96. Encyclopedia of cybercrime
Author: / edited by Samuel C. McQuade, III
Library: Central Library of University of Social Welfare and Rehabilitation Sciences (Tehran)
Subject: Computer crimes--Encyclopedias,Internet fraud--Encyclopedias,Computer security--Encyclopedias,Internet fraud--Prevention--Encyclopedias,Computer crimes--United States--Encyclopedias,Internet fraud--United States--Encyclopedias,Computer security--United States--Encyclopedias,Internet fraud--United States--Prevention--Encyclopedias
Classification :
HV6773
.
E53
2009


97. Enterprise cybersecurity study guide :
Author: Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer security.,Coding theory & cryptology.,Computer crimes-- Prevention.,Computer security.,Computer security.,COMPUTERS-- Data Processing.
Classification :
QA76
.
9
.
A25


98. Forensics in telecommunications, information, and multimedia :
Author: Xuejia Lai...[et al.] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation, Congresses.,Telecommunication systems-- Security measures, Congresses.
Classification :
HV8079
.
C65
I58
2011


99. Foundations of computer security
Author: / David Salomon
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer crimes
Classification :
QA76
.
9
.
A25
,
S266
2006


100. Foundations of computer security
Author: / David Salomon
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer crimes.
Classification :
QA
,
76
.
9
,.
A25
,
S266
,
2006

