21. Routledge companion to global cyber-security strategy /
Author: edited by Scott N. Romaniuk and Mary Manjikian.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention-- Government policy.,Computer networks-- Security measures-- Government policy.,Computer security-- Government policy.,Cyberspace-- Security measures-- Government policy.,Cyberterrorism-- Prevention-- Government policy.,Internet-- Security measures-- Government policy.,Computer networks-- Security measures-- Government policy,Computer security-- Government policy,COMPUTERS / Internet / Security,HISTORY / Military / Strategy,POLITICAL SCIENCE / Political Freedom & Security / International Security
Classification :
UA163
.
R68
2021


22. Security and privacy in social network
Author: / Yaniv Altshuler ... [et al., editors]
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Online social networks, Security measures,Data encryption (Computer science),Data protection,Computer crimes, Prevention,Electronic books
Classification :
E-BOOK

23. Security awareness :
Author: Mark Ciampa, Ph. D.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Confidential communications-- Protection.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computers and IT.,Computers and IT.
Classification :
TK5105
.
59
.
C53
2017


24. Seven deadliest social network attacks
Author: Carl Timm, Richard Perez ; technical editor, Adam Ely
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Web 2.0, Security measures,Online social networks, Security measures,Computer networks, Security measures,Computer security,Malware (Computer software), Prevention,Computer crimes, Prevention
Classification :
TK
،
5105
.
88817
،.
T56
،
2010


25. Spring Security 3.1
Author: Robert Winch, Peter Mularien
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer networks-- Security measures,Malware (Computer software)-- Prevention,Web sites-- Design,Web sites-- Security measures
Classification :
TK5105
.
59
.
W563
2012


26. Syngress force emerging threat analysis
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer crimes ; Prevention. ; Computer networks ; Security measures. ; Computer security. ;

27. Syngress force emerging threat analysis :
Author: David Maynor ... [et al.]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer networks-- Security measures,Computer security

28. Targeted cyber attacks
Author: Aditya K. Sood, Richard Enbody ; technical editor Peter Loshin
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer networks-- Security measures,Cyberspace-- Security measures
Classification :
TK5105
.
59
.
S66
2014


29. The basics of web hacking
Author: Josh Pauli ; Scott White, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Hackers.,Penetration testing (Computer security),Web applications-- Security measures.,Web sites-- Security measures.

30. The basics of web hacking
Author: Josh Pauli
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer hackers,Computer networks-- Security measures,Penetration testing (Computer security),Web applications-- Security measures,Web sites-- Security measures
Classification :
TK5105
.
59
.
P385
2013


31. The hacker playbook :
Author: Peter Kim
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer networks-- Security measures,Computer programming,Computer software-- Testing,Hackers,Penetration testing (Computer security), Handbooks, manuals, etc

32. The hacker playbook 3 :
Author: Peter Kim.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
K56
2018


33. The hacker playbook 2 :
Author: Peter Kim.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.

34. Understanding cyber risk :
Author: Thomas R. Koehler.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Business intelligence.,Computer crimes-- Prevention.,Data protection.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Business enterprises-- Computer networks-- Security measures.,Business intelligence.,Computer crimes-- Prevention.,Data protection.
Classification :
HF5548
.
37
.
K64
2018


35. Vulnerability analysis and defense for the Interne
Author: / by Abhishek Singh (editor)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer networks--Security measures--Evaluation,Computer crimes--Prevention
Classification :
QA
,
76
.
9
,.
A25
,
V848
,
2008


36. Vulnerability analysis and defense for the Internet
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Computer networks ; Security measures ; Evaluation. ; Computer crimes ; Prevention. ;

37. Vulnerability analysis and defense for the Internet
Author: by Abhishek Singh (editor) ; [with contributions by] Baibhav Singh and Hirosh Joseph.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures-- Evaluation.,Computer security.

38. Web Application Defender's Cookbook :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer security.,Hackers.
Classification :
QA76
.
9
.
A25
B37
2013eb

