• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۳۰ پاسخ غیر تکراری از ۳۰ پاسخ تکراری در مدت زمان ۰,۵۰ ثانیه یافت شد.

1. Cisco router and switch forensic

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Dale Liu, lead author and technical editor

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer networks--Security measures,Routers (Computer networks),Computer crimes--Investigation

Classification :
TK
,
5105
.
59
,.
L58
,
2009eb

2. Cisco router and switch forensics

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Dale Liu, lead author and technical editor ; James Burton ... [et al.]&

Library: Central Library and Document Center of Shahid Madani University of Azarbayjan (East Azarbaijan)

Subject: Computer networks, Security measures,Routers (Computer networks),Computer crimes, Investigation

Classification :
TK
,
5105
.
59
,.
L58
,
2009

3. Cisco router and switch forensics

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer networks ; Security measures. ; Routers (Computer networks) ; Computer crimes ; Investigation. ;

Classification :

4. Computer forensic

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Nathan Clarke

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer security.,Computer networks--Security measures,Computer crimes--Investigation,Forensic sciences.

Classification :
QA
,
76
.
9
,.
A25
,
C527
,
2010eb

5. Computer forensics jumpstart

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer security. ; Computer networks ; Security measures. ; Computer crimes ; Investigation. ; Forensic sciences. ; Computer crimes ; Investigation. ; fast ; (OCoLC)fst00872065 ;

Classification :

6. Digital forensics for network, Internet, and cloud computing :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Terrence V. Lillard [and others] ; technical editor, Jim Murray.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Cloud computing-- Security measures.,Computer crimes-- Investigation.,Computer networks-- Security measures.,Computer security.,Computer crimes-- Investigation.,Computer networks-- Security measures.,Computer security.,LAW-- Forensic Science.

Classification :
HV8079
.
C65
D54
2010

7. Digital forensics for network, Internet, and cloud computing

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Terrence V. Lillard ... [et al.]

Library: Campus International Library of Kish University of Tehran (Hormozgan)

Subject: Computer crimes -- Investigation,Computer security,Computer networks -- Security measures,Cloud computing -- Security measures

Classification :
HV
8079
.
C65
D5
2010

8. Digital forensics for network, Internet, and cloud computing :a forensic evidence guide for moving targets and data

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Terrence V. Lillard ... ]et al.[ ; technical editor, Jim Murray

Library: Library of Razi Metallurgical Research Center (Tehran)

Subject: Investigation ، Computer crimes,، Computer security,Security measures ، Computer networks,Security measures ، Cloud computing

Classification :
HV
8079
.
C65
D54
2010

9. Dissecting the hack :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jayson E. Street [and others].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Investigation.,Computer crimes, Case studies.,Computer networks-- Security measures.,Computer security.,Hackers.,Computer crimes-- Case studies.,Computer crimes-- Investigation.,Computer crimes-- Investigation.,Computer crimes.,Computer hackers.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,Hackers.,TRUE CRIME-- White Collar Crime.

Classification :
HV8079
.
C65
S856
2010b

10. EnCase computer forensics

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Steve Bunting

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Investigation-- Examinations, Study guides,Computer networks-- Security measures-- Examinations, Study guides,Computer security-- Examinations, Study guides,Electronic data processing personnel-- Certification,Forensic sciences-- Examinations, Study guides

Classification :
QA76
.
3
.
B86
2012

11. EnCase computer forensics

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Steve Bunting

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Investigation-- Examinations, Study guides,Computer networks-- Security measures-- Examinations, Study guides,Computer security-- Examinations, Study guides,Electronic data processing personnel-- Certification,Forensic sciences-- Examinations, Study guides

Classification :
QA76
.
3
.
B86
2012

12. Fundamentals of network forensics :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Investigation.,Computer networks-- Security measures.,Cyber intelligence (Computer security)

Classification :
TK5105
.
59

13. Incident response

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / E. Eugene Schultz, Russell Shumway

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Compuer crimes- Investigation

Classification :
TK
5105
.
59
+

14. Mastering Windows network forensics and investigation

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Steve Anson, Steve Bunting

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Microsoft Windows )Computer file(,، Computer crimes -- Investigation,، Computer networks -- Security measures

Classification :
HV
8079
.
C65A58

15. Mastering Windows network forensics and investigation

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Steve Anson, Steve Bunting

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Microsoft Windows (Computer file),Computer crimes--Investigation,Computer networks--Security measures

Classification :
HV
,
8079
,.
C65
,
A57
,
2007

16. Network intrusion analysis

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Joe Fichera, Steven Bolt

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Investigation-- United States,Computer networks-- Security measures,Computer security,Internet-- Security measures,Intrusion detection systems (Computer security)

Classification :
HV8079
.
C65
F53
2012

17. Practical Cyber Forensics :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: by Niranjan Reddy.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Investigation.,Computer networks-- Security measures.,Computer security.,Computer crimes-- Investigation.,Computer networks-- Security measures.,Computer security.

Classification :
HV8079
.
C65
R44
2019

18. Practical cyber forensics :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer crimes ; Investigation ; Computer networks ; Security measures ; Computer security ; Forensic sciences ; Technological innovations ; Electronic evidence ; Evidence, Criminal ; Criminal investigation ;

Classification :

19. Scene of the cybercrime

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer security,Computer networks- Security measures,Computer crimes- Investigation,Forensic sciences

Classification :
QA76
.
9
.
A25
,
C765
2008

20. Scene of the cybercrime

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer security,Computer networks- Security measures,Computer crimes- Investigation,Forensic sciences

Classification :
QA76
.
9
.
A25
,
C765
2008
  • »
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival