41. Malware Forensics Field Guide for Linux Systems /
Author: Cameron H. Malin, Eoghan Casey, James M. Aquilina ; Curtis W. Rose, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Linux,Computer crimes-- Investigation, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Computer viruses, Handbooks, manuals, etc.,Forensic sciences, Handbooks, manuals, etc.,Malware (Computer software), Handbooks, manuals, etc.
Classification :
QA
76
.
76
.
C68
.
M32
2014


42. Malware forensics :
Author: James M. Aquilina, Eoghan Casey, Cameron H. Malin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation.,Computer security.,Computer viruses-- Identification.
Classification :
HV
A68
2008

43. Mastering Windows network forensics and investigation
Author: Steve Anson, Steve Bunting
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Microsoft Windows )Computer file(,، Computer crimes -- Investigation,، Computer networks -- Security measures
Classification :
HV
8079
.
C65A58


44. Mastering Windows network forensics and investigation
Author: / Steve Anson, Steve Bunting
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Microsoft Windows (Computer file),Computer crimes--Investigation,Computer networks--Security measures
Classification :
HV
,
8079
,.
C65
,
A57
,
2007


45. Mastering Windows network forensics and investigation
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Microsoft Windows (Computer file),Computer crimes-- Investigation,Computer security

46. Network intrusion analysis
Author: Joe Fichera, Steven Bolt
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation-- United States,Computer networks-- Security measures,Computer security,Internet-- Security measures,Intrusion detection systems (Computer security)
Classification :
HV8079
.
C65
F53
2012


47. Operating system forensics /
Author: Ric Messier ; Kevin Mackay, technical editor
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation,Computer security,Operating systems (Computers)-- Security measures
Classification :
HV8079
.
C65
M47
2016


48. Practical Cyber Forensics :
Author: by Niranjan Reddy.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation.,Computer networks-- Security measures.,Computer security.,Computer crimes-- Investigation.,Computer networks-- Security measures.,Computer security.
Classification :
HV8079
.
C65
R44
2019


49. Practical cyber forensics :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer crimes ; Investigation ; Computer networks ; Security measures ; Computer security ; Forensic sciences ; Technological innovations ; Electronic evidence ; Evidence, Criminal ; Criminal investigation ;

50. Scene of the cybercrime
Author:
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer networks- Security measures,Computer crimes- Investigation,Forensic sciences
Classification :
QA76
.
9
.
A25
,
C765
2008


51. Scene of the cybercrime
Author:
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer networks- Security measures,Computer crimes- Investigation,Forensic sciences
Classification :
QA76
.
9
.
A25
,
C765
2008


52. Scene of the cybercrime
Author: Michael Cross
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation,Computer networks-- Security measures,Computer security,Forensic sciences
Classification :
QA76
.
9
.
A25
C765
2008


53. Techno security's guide to e-discovery and digital forensic
Author: / Jack Wiles, lead author
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer crimes--Investigation,Computer networks--Security measures,Computer security.
Classification :
HV
,
8079
,.
C65
,
W53
,
2007eb


54. Technocrime
Author:
Library: Farabi Faculty Library, University of Tehran (Qom)
Subject: Criminal investigation -- Technological innovations,Computer crimes,Computer security,Social control,Electronic surveillance
Classification :
HV
8073
.
T22
2008


55. UNIX and Linux forensic analysis toolki
Author: / Chris Pogue, Cory Altheide, Todd Haverkos
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: UNIX (Computer file),Linux.,Computer crimes--Investigation,Computer security.,Forensic sciences.
Classification :
HV
,
8079
,.
C65
,
P64
,
2008eb


56. Unix and Linux forensic analysis DVD toolkit
Author: Pogue, Chris.
Library: Library of Niroo Research Institue (Tehran)
Subject: Investigation ، Computer crimes,، Computer security,، Forensic sciences
Classification :
HV
8079
.
C65P64
2008


57. Virtualization and forensics : a digital forensic investigator's guide to virtual environments
Author: Barrett, Diane.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Investigation ، Computer crimes,Security measures ، Virtual computer systems,، Computer security
Classification :
HV
8079
.
C65
B37
2010


58. What every engineer should know about cyber security and digital forensics /
Author: Joanna F. DeFranco
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation,Computer networks-- Security measures,Computer security
Classification :
TK5105
.
59
.
D44
2014


59. Windows Forensic Analysis
Author: \ Harlan Carvey
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer crimes -- Investigation -- United States -- Methodology,Computer networks -- Security measures,Internet -- Security measures,جرایم کامپیوتری -- ایالات متحده -- پیجویی -- روششناسی,شبکههای کامپیوتری -- تدابیر ایمنی,اینترنت -- تدابیر ایمنی
Classification :
E-Book
,

60. Windows forensic analysi
Author: / Harlan Carvey
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Microsoft Windows (Computer file)--Security measures,Computer crimes--Investigation--United States--Methodology,Computer networks--Security measures,Internet--Security measures,Computer security.
Classification :
HV
,
8079
,.
C65
,
C37
,
2007eb

