141. Invisible threats :
Author: ed. by Umberto Gori and Ivo Paparela
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Economic aspects,Computer crimes-- Political aspects,National security
Classification :
HV6773
.
I58
2006


142. Mac OS X, iPod, and iPhone forensic analysis DVD toolkit /
Author: Ryan R. Kubasiak, Sean Morrissey, lead authors ; [contributing authors], Walter Barr ... [et al.] ; Jesse Varsalone, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Computer security.,Data recovery (Computer science),Macintosh (Computer)

143. Machine Learning Forensics for Law Enforcement, Security, and Intelligence
Author: / Jesus Mena,Mena, Jesus
Library: Special Library of Law (Tehran)
Subject: Machine learning,Electronic evidence,Computer security,Forensic sciences -- Data processing,Computer crimes -- Investigation
Classification :
HV8073
.
M45
2011
,
DB5810


144. Mafiaboy :
Author: Michael Calce and Craig Silverman.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Calce, Michael.,Calce, Michael.,Calce, Michael.,Calce, Michael.,Computer crimes.,Computer security.,Hackers-- Canada, Biography.,Criminalité informatique.,Pirates informatiques-- Canada, Biographies.,Sécurité informatique.,Computer crimes.,Computer security.,Hackers.,Canada., 7
Classification :
HV6773
.
C34
2008


145. Malware
Author: / Ed Skoudis with Lenny Zeltser
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer networks--Security measures,Computer crimes.
Classification :
QA
,
76
.
9
,.
A25
,
S58
,
2004


146. Malware Forensics Field Guide for Linux Systems /
Author: Cameron H. Malin, Eoghan Casey, James M. Aquilina ; Curtis W. Rose, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Linux,Computer crimes-- Investigation, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Computer viruses, Handbooks, manuals, etc.,Forensic sciences, Handbooks, manuals, etc.,Malware (Computer software), Handbooks, manuals, etc.
Classification :
QA
76
.
76
.
C68
.
M32
2014


147. Malware forensics :
Author: James M. Aquilina, Eoghan Casey, Cameron H. Malin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation.,Computer security.,Computer viruses-- Identification.
Classification :
HV
A68
2008

148. Managing a network vulnerability assessment
Author: / Thomas R. Peltier, Justin Peltier, and John A. Blackley
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Risk assessment,Computer crimes- Prevention
Classification :
TK5105
.
59
.
P453
2003


149. Managing cyber attacks in international law, business, and relations: in search of cyber peace
Author: / Scott J. Shackelford
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Information warfare (International law),Cyberspace,Cyberterrorism,Computer crimes,Computer networks,-- Security measures,-- Security measures
Classification :
343
.
0999
S524M
2014


150. Managing the human factor in information security :
Author: David Lacey.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Electronic data processing departments-- Security measures.,Industries-- Security measures.,Information technology-- Security measures.,Management-- Employee participation.,Management information systems-- Human factors.,BUSINESS & ECONOMICS-- Corporate Governance.,BUSINESS & ECONOMICS-- Leadership.,BUSINESS & ECONOMICS-- Organizational Development.,BUSINESS & ECONOMICS-- Workplace Culture.,Computer crimes-- Prevention.,Electronic data processing departments-- Security measures.,Industries-- Security measures.,Information technology-- Security measures.,Informatique.,Management-- Employee participation.,Management information systems-- Human factors.,Protection des données.,Sécurité.
Classification :
HF5548
.
37
.
L33
2009eb


151. Managing the human factor in information security: how to win over staff and influence business managers
Author: Lacey, David.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Information technology,Security measures ، Industries,Prevention ، Computer crimes,Employee participation ، Management,Security measures ، Electronic data processing departments,Human factors ، Management information systems
Classification :
HF
5548
.
37
.
L33
2009


152. Mastering Windows network forensics and investigation
Author: Steve Anson, Steve Bunting
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Microsoft Windows )Computer file(,، Computer crimes -- Investigation,، Computer networks -- Security measures
Classification :
HV
8079
.
C65A58


153. Mastering Windows network forensics and investigation
Author: / Steve Anson, Steve Bunting
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Microsoft Windows (Computer file),Computer crimes--Investigation,Computer networks--Security measures
Classification :
HV
,
8079
,.
C65
,
A57
,
2007


154. Mastering Windows network forensics and investigation
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Microsoft Windows (Computer file),Computer crimes-- Investigation,Computer security

155. Network attacks and exploitation :
Author: Matthew Monte
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer crimes-- Prevention.,Computer security.,Corporations-- Security measures.
Classification :
HF5548
.
37
M665
2015eb


156. Network attacks & exploitation :a framework
Author: Monte, Matthew
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Computer security,Prevention ، Computer crimes,Prevention ، Computer crimes,، Computer security
Classification :
TK
5105
.
59
.
M64


157. Network intrusion analysis
Author: Joe Fichera, Steven Bolt
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation-- United States,Computer networks-- Security measures,Computer security,Internet-- Security measures,Intrusion detection systems (Computer security)
Classification :
HV8079
.
C65
F53
2012


158. Networks and network analysis for defence and security
Author: / Anthony J. Masys, editor
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures,Communication, Network analysis,Computer crimes,COMPUTERS / Security / Networking, bisacsh
Classification :
E-BOOK

159. New threats and countermeasures in digital crime and cyber terrorism /
Author: [edited by] Maurice Dawson, Marwan Omar.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer security.,Cyberterrorism-- Prevention.
Classification :
HV6773
.
N4745
2015

