1. An Investigation into the Detection and Mitigation of Denial of Service (DoS) Attacks
Author: \ S.V. Raghavan and E. Dawson, editors.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Denial of service attacks.,Computer networks-- Security measures.,Computer crimes-- Prevention.,حملههای منجر به قطع سرویسدهی ,شبکههای کامپیوتری -- تدابیر ایمنی,جرایم کامپیوتری -- پیشگیری
Classification :
TK
5105
.
59
.
I5
2011
E-Book
,


2. An investigation into the detection and mitigation of Denial of Service (DoS) attacks
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Denial of service attacks. ; Computer networks ; Security measures. ; Computer crimes ; Prevention. ;

3. An investigation into the detection and mitigation of Denial of Service (DoS) attacks
Author: / S.V. Raghavan and E. Dawson, editors
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Denial of service attacks.,Computer networks--Security measures,Computer crimes--Prevention
Classification :
TK
,
5105
.
59
,.
I57
,
2011


4. Cyber security :
Author: Jack Caravelli and Nigel Jones.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures-- Government policy.,Security, International.,BUSINESS & ECONOMICS / Industrial Management,BUSINESS & ECONOMICS / Management,BUSINESS & ECONOMICS / Management Science,BUSINESS & ECONOMICS / Organizational Behavior,Computer crimes-- Prevention.,Computer networks-- Security measures-- Government policy.,Security, International.
Classification :
TK5105
.
59
.
C364
2019eb


5. Cyber security
Author: Jack Caravelli and Nigel Jones,Caravelli, Jack,
Library: Faculty of Law and Political Sciences (Tehran)
Subject: Computer networks,Computer crimes,Security, International.,Government policy.,Security measures,Prevention.
Classification :
TK5105
.
59
.
C36


6. Cyber security awareness for CEOs and management
Author: David Willson ; contributing editor, Henry Dalziel.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer crimes-- Prevention.,Computer security.,Corporations-- Security measures.,Data protection.

7. Cyber threat!: how to manage the growing risk of cyber attacks
Author: Ulsch, N. MacDonnell
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Security measures ، Corporations,Computer networks Security measures ، Business enterprises,Prevention ، Computer crimes,، Computer security,Security measures ، Computer networks,، BUSINESS & ECONOMICS / Information Management
Classification :
HD
30
.
2
.
U47


8. Cybersecurity
Author: Thomas J. Mowbray ; technical editor, Rob Shimonski.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer security.,Cyberspace-- Security measures.,Information technology-- Security measures.

9. Cybersecurity, cyberanalysis, and warning /
Author: Kerry T. Norwood and Sandra P. Catwell, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Automatic data collection systems.,Computer crimes-- United States-- Prevention.,Computer networks-- Security measures-- United States.,Cyberterrorism-- United States-- Prevention.,Electronic government information-- Access control-- United States.,Electronic government information-- Protection-- Government policy-- United States.,Automatic data collection systems.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Cyberterrorism-- Prevention.,Electronic government information-- Access control.,POLITICAL SCIENCE-- Public Affairs & Administration.,United States., 7
Classification :
TK5105
.
59


10. Hacking web apps :
Author: Mike Shema
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Application software-- Security measures,Computer crimes-- Prevention,Computer networks-- Security measures,Computer security,Web site development-- Security measures
Classification :
TK5105
.
59
.
S5234
2012


11. Handbook of research on information and cyber security in the fourth industrial revolution /
Author: Ziska Fields, University of KwaZulu-Natal, South Africa.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Confidential communications-- Protection.,Electronic information resources-- Access control.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Electronic information resources-- Access control.
Classification :
TK5105
.
59
.
P744
2018e


12. Handbook of research on information security and assurance
Author: / Jatinder N.D. Gupta, Sushil K. Sharma [editors].
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer networks -- Security measures,Electronic information resources--Access control,Computer crimes--Prevention
Classification :
TK
5105
.
59
.
H353
2009
R


13. How to define and build an effective cyber threat intelligence capability
Author: Henry Dalziel ; [contributing editors, Eric Olson, James Carnall].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- United States-- Prevention.,Computer networks-- Security measures-- United States.,Cyber intelligence (Computer security)-- United States.,Cyberterrorism-- United States-- Prevention.,National security-- United States.

14. Human-computer interaction and cybersecurity handbook /
Author: edited by Abbas Moallem
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention, Handbooks, manuals, etc.,Computer networks-- Security measures, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Technology and international relations.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Technology and international relations.
Classification :
TK5105
.
59
.
H86
2019eb


15. Internet denial of service
Author: / Jelena Mirkovic ... [et al.]
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Internet- Security measures,Computer crimes- Prevention
Classification :
TK5105
.
59
.
I5455
2004


16. Internet denial of service: attack and defense mechanisms
Author: Jelena Mirkovic...]et al.[
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Computer networks,Security measures ، Internet,Prevention ، Computer crimes
Classification :
TK
5105
.
59
.
I5455
2005


17. Managing a network vulnerability assessment
Author: / Thomas R. Peltier, Justin Peltier, and John A. Blackley
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Risk assessment,Computer crimes- Prevention
Classification :
TK5105
.
59
.
P453
2003


18. Network attacks and exploitation :
Author: Matthew Monte
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer crimes-- Prevention.,Computer security.,Corporations-- Security measures.
Classification :
HF5548
.
37
M665
2015eb


19. Practical cyber intelligence :
Author: Wilson Bautista Jr.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Cyber intelligence (Computer security),Cyberterrorism-- Prevention.,Information technology-- Security measures.,Coding theory & cryptology.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer science.,COMPUTERS / Security / General,Cyber intelligence (Computer security),Cybernetics & systems theory.,Cyberterrorism-- Prevention.,Data encryption.,Information technology-- Security measures.
Classification :
HV6773


20. Preventing ransomware :
Author: Abhijit Mohanta, Mounir Hahad, Kumaraguru Velmurugan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer crimes.,Computer networks-- Security measures.,Computer security.,Malware (Computer software),Coding theory & cryptology.,Computer crimes-- Prevention.,Computer crimes.,Computer networks-- Security measures.,Computer security.,Computer security.,Computer viruses, Trojans & worms.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Viruses & Malware.,Data encryption.,Malware (Computer software)
Classification :
QA76
.
9
.
A25
M64
2018

