101. Foundations of computer security
Author: Salomon, David, 1938-
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer security ► Computer crimes
Classification :
005
S174f


102. Foundations of computer security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Computer crimes. ;

103. Foundations of computer security
Author: / David Salomon
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer crimes
Classification :
QA76
.
9
.
A25
,
S266
2006


104. Foundations of computer security
Author: David Salomon.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Computer security.

105. Fundamentals of network forensics :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation.,Computer networks-- Security measures.,Cyber intelligence (Computer security)
Classification :
TK5105
.
59


106. Hack proofing your identity in the information age
Author: Teri Bidwell ; Michael Cross, technical editor ; Ryan Russell, technical reviewer.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Computer security.,Identification cards-- Forgeries.,Impostors and imposture.,Internet fraud.
Classification :
QA76
.
9
.
A25
B534
2002eb


107. Hack proofing your identity in the information age: protect your family on the Internet!
Author: Bidwell, Teri
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,Forgeries ، Identification cards,، Computer crimes,، Imposters and imposture
Classification :
QA
76
.
9
.
A25
B53
2002


108. Hack proofing your identity in the information age: protect your family on the Internet!
Author: Bidwell, Teri
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: ، computer security,Forgeries ، Identification cards,، Computer crimes.,، Imposters and imposture
Classification :
QA
76
.
9
.
A25
B53


109. Hacked :
Author: Charlie Mitchell.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention-- Government policy-- United States.,Computer security-- Government policy-- United States.,Cyber intelligence (Computer security),Internet-- Government policy-- United States.,Computer crimes-- Government policy-- United States.,Computer hackers.,Computer security-- Government policy-- United States.,Computer security-- Government policy.,COMPUTERS-- Security-- General.,Computersicherheit,Cyber intelligence (Computer security),Cyber intelligence (Computer security),Cyberspace.,Internet-- Government policy-- United States.,Internet-- Government policy.,Internet-- Government policy.,United States.,USA, 7, 7
Classification :
TK5105
.
875
.
I57
M575
2016


110. Hacker's challenge 3 :20 brand-new forensic scenarios & solutions
Author: David Pollino ... ]et al.[
Library: (Semnan)
Subject: Security measures ، Computer networks,Security measures ، Internet,، Computer crimes,، Computer hackers
Classification :
QA
76
.
9
.
H33


111. Hacking exposed computer forensics
Author: Chris Davis, David Cowen, Aaron Philipp
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Computer crimes, Investigation,Computer security,Forensic sciences
Classification :
HV
,
8079
,.
C65
,
D35
,
2010


112. Hacking web apps :
Author: Mike Shema
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Application software-- Security measures,Computer crimes-- Prevention,Computer networks-- Security measures,Computer security,Web site development-- Security measures
Classification :
TK5105
.
59
.
S5234
2012


113. Handbook of research on computational forensics, digital crime, and investigation :
Author: [edited by] Chang-Tsun Li.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer crimes.,Computer security.,Forensic sciences.,Computer crimes-- Prevention.,Computer crimes.,Computer security.,Forensic sciences.,LAW-- Forensic Science.
Classification :
HV6773
.
H374
2010eb


114. Handbook of research on digital crime, cyberspace security, and information assurance /
Author: Maria Manuela Cruz-Cunha, Polytechnic Institute of Cavado and Ave, Portugal, Irene Maria Portela, Polytechnic Institute of C�avado and Ave, Portugal.
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computer crimes.,Computer security.,Computer networks-- Security measures.,Data protection.,Information technology.
Classification :
HV6773
.
H375
2015


115. Handbook of research on information and cyber security in the fourth industrial revolution /
Author: Ziska Fields, University of KwaZulu-Natal, South Africa.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Confidential communications-- Protection.,Electronic information resources-- Access control.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Electronic information resources-- Access control.
Classification :
TK5105
.
59
.
P744
2018e


116. Handbook of research on information security and assurance
Author: / Jatinder N.D. Gupta, Sushil K. Sharma [editors].
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer networks -- Security measures,Electronic information resources--Access control,Computer crimes--Prevention
Classification :
TK
5105
.
59
.
H353
2009
R


117. How personal & Internet security works
Author: / Preston Gralla
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer crimes,Internet fraud,Computer security,Internet- Security measures
Classification :
HV6773
.
G7245
2006


118. How to define and build an effective cyber threat intelligence capability
Author: Henry Dalziel ; [contributing editors, Eric Olson, James Carnall].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- United States-- Prevention.,Computer networks-- Security measures-- United States.,Cyber intelligence (Computer security)-- United States.,Cyberterrorism-- United States-- Prevention.,National security-- United States.

119. Human-computer interaction and cybersecurity handbook /
Author: edited by Abbas Moallem
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention, Handbooks, manuals, etc.,Computer networks-- Security measures, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Technology and international relations.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Technology and international relations.
Classification :
TK5105
.
59
.
H86
2019eb


120. Incident response
Author: / Chris Prosise & Kevin Mandia
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer crimes,Computer crimes- Investigation,Computer security
Classification :
HV6773
.
P766
2001

