21. Digital forensics for handheld devices /
Author: Eamon P. Doherty
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cell phones,Computer crimes-- Investigation,Computer security,Forensic sciences
Classification :
HV8079
.
C65
D64
2013


22. Digital forensics for network, Internet, and cloud computing :
Author: Terrence V. Lillard [and others] ; technical editor, Jim Murray.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures.,Computer crimes-- Investigation.,Computer networks-- Security measures.,Computer security.,Computer crimes-- Investigation.,Computer networks-- Security measures.,Computer security.,LAW-- Forensic Science.
Classification :
HV8079
.
C65
D54
2010


23. Digital forensics for network, Internet, and cloud computing
Author: / Terrence V. Lillard ... [et al.]
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer crimes -- Investigation,Computer security,Computer networks -- Security measures,Cloud computing -- Security measures
Classification :
HV
8079
.
C65
D5
2010


24. Digital forensics for network, Internet, and cloud computing :a forensic evidence guide for moving targets and data
Author: Terrence V. Lillard ... ]et al.[ ; technical editor, Jim Murray
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Investigation ، Computer crimes,، Computer security,Security measures ، Computer networks,Security measures ، Cloud computing
Classification :
HV
8079
.
C65
D54
2010


25. Dissecting the hack :
Author: Jayson E. Street [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation.,Computer crimes, Case studies.,Computer networks-- Security measures.,Computer security.,Hackers.,Computer crimes-- Case studies.,Computer crimes-- Investigation.,Computer crimes-- Investigation.,Computer crimes.,Computer hackers.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,Hackers.,TRUE CRIME-- White Collar Crime.
Classification :
HV8079
.
C65
S856
2010b


26. EnCase computer forensics
Author: Steve Bunting
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation-- Examinations, Study guides,Computer networks-- Security measures-- Examinations, Study guides,Computer security-- Examinations, Study guides,Electronic data processing personnel-- Certification,Forensic sciences-- Examinations, Study guides
Classification :
QA76
.
3
.
B86
2012


27. EnCase computer forensics
Author: Steve Bunting
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation-- Examinations, Study guides,Computer networks-- Security measures-- Examinations, Study guides,Computer security-- Examinations, Study guides,Electronic data processing personnel-- Certification,Forensic sciences-- Examinations, Study guides
Classification :
QA76
.
3
.
B86
2012


28. Forensics in telecommunications, information, and multimedia :
Author: Xuejia Lai...[et al.] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation, Congresses.,Telecommunication systems-- Security measures, Congresses.
Classification :
HV8079
.
C65
I58
2011


29. Fundamentals of network forensics :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation.,Computer networks-- Security measures.,Cyber intelligence (Computer security)
Classification :
TK5105
.
59


30. Hacking exposed computer forensics
Author: Chris Davis, David Cowen, Aaron Philipp
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Computer crimes, Investigation,Computer security,Forensic sciences
Classification :
HV
,
8079
,.
C65
,
D35
,
2010


31. Incident response
Author: / Chris Prosise & Kevin Mandia
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer crimes,Computer crimes- Investigation,Computer security
Classification :
HV6773
.
P766
2001


32. Incident response
Author: / E. Eugene Schultz, Russell Shumway
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Compuer crimes- Investigation
Classification :
TK
5105
.
59
+


33. Incident response
Author: / Douglas Schweitzer
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer crimes- Investigation,Computer security
Classification :
HV8079
.
C65
,
S39
2003


34. Incident response
Author: Douglas Schweitzer
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Computer crimes- Investigation,Computer security
Classification :
HV
,
8079
,.
C6I79
,
2003


35. Incident response & computer forensics /
Author: Chris Prosise, Kevin Mandia.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation.,Computer security.,Forensic sciences.,Computer crimes-- Investigation.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Forensic sciences.
Classification :
QA76
.
9
.
A25
P76
2003eb


36. Information security and digital forensics :
Author: Dasun Weerasinghe (Ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation, Congresses.,Computer networks-- Access control, Congresses.,Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Internet-- Security measures, Congresses.,Computer crimes-- Investigation.,Computer networks-- Access control.,Computer networks-- Security measures.,Computer security.,Informatique.,Internet-- Security measures.
Classification :
QA76
.
9
.
A25
I584
2010


37. Internet Forensics
Author: \ Robert Jones.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer crimes-- Investigation.,Internet.,Computer security.,جرایم کامپیوتری -- پیجویی ,اینترنت ,کامپیوترها -- ایمنی اطلاعات
Classification :
HV
8079
.
J6I5
2005
E-Book
,


38. Internet forensics
Author: / Robert Jones
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer crimes--Investigation,Internet.,Computer security.,Internet.,Delitos informaaticos--Investigaciaon,Seguridad informaatica.,Forensische wetenschappen.--gtt,Computercriminaliteit.--gtt,Internet.--gtt
Classification :
HV
,
8079
,.
C65
,
J663
,
2005


39. Internet forensics
Author: by Robert Jones
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation,Computer security
Classification :
HV8079
.
C65
J66
2006


40. Introductory computer forensics :
Author: Xiaodong Lin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation.,Digital forensic science.,Computer crimes-- Investigation.,Computer security.,Computers-- Interactive & Multimedia.,Computers-- Security-- General.,Crime & criminology.,Digital forensic science.,Forensic science.,Graphical & digital media applications.,Medical-- Forensic Medicine.,Social Science-- Criminology.
Classification :
HV8079
.
C65

