41. Cyber criminalité :
Author: Éric Filiol ; Phillipe Richard.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer crimes.,Computer security.,Data protection.,criminalité-- Internet.,sécurité informatique.,Criminalité informatique.,Entreprises-- Réseaux d'ordinateurs-- Sécurité-- Mesures.,Protection de l'information (Informatique),Sécurité informatique.,Business enterprises-- Computer networks-- Security measures.,Computer crimes.,Computer security.,Crime informatique.,Criminalité informatique.,criminalité-- Internet.,Data protection.,Fraude.,Internet.,Piratage informatique.,Pirate informatique.,Sécurité des données.,sécurité informatique.,Sécurité informatique.
Classification :
HV6773
.
F55
2006


42. Cyber fraud :
Author: editor-in-chief, James Graham ; executive editors, Rick Howard, Ralph Thomas, Steven Winterfeld ; authors and editors, Kellie Bryan [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer crimes.,Computer security.,Computer crimes-- Prevention.,Computer crimes.,Computer security.,Databrott-- prevention.,IT-säkerhet.
Classification :
HV6773
.
H69
2009


43. Cyber security :
Author: Jack Caravelli and Nigel Jones.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures-- Government policy.,Security, International.,BUSINESS & ECONOMICS / Industrial Management,BUSINESS & ECONOMICS / Management,BUSINESS & ECONOMICS / Management Science,BUSINESS & ECONOMICS / Organizational Behavior,Computer crimes-- Prevention.,Computer networks-- Security measures-- Government policy.,Security, International.
Classification :
TK5105
.
59
.
C364
2019eb


44. Cyber security :
Author: David Sutton.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Computer security.,Cyber intelligence (Computer security),Computer crimes.,Computer security.,COMPUTERS-- Data Processing.,Cyber intelligence (Computer security)
Classification :
QA76
.
9
.
A25
S88
2017eb


45. Cyber security
Author: Jack Caravelli and Nigel Jones,Caravelli, Jack,
Library: Faculty of Law and Political Sciences (Tehran)
Subject: Computer networks,Computer crimes,Security, International.,Government policy.,Security measures,Prevention.
Classification :
TK5105
.
59
.
C36


46. Cyber security awareness for CEOs and management
Author: David Willson ; contributing editor, Henry Dalziel.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer crimes-- Prevention.,Computer security.,Corporations-- Security measures.,Data protection.

47. Cyber terrorism :
Author: Andrew Michael Colarik.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Asymmetric warfare.,Computer crimes.,Computer networks-- Security measures.,Cyberterrorism.,Information superhighway-- Economic aspects.,Information warfare-- Political aspects.,Asymmetric warfare.,Computer crimes.,Computer networks-- Security measures.,Computerkriminalität,Cyberspace,Cyberterrorism.,Information superhighway-- Economic aspects.,POLITICAL SCIENCE-- Political Freedom & Security-- Terrorism.,Terrorismus
Classification :
HV6773
.
C64
2006eb


48. Cyber terrorism
Author: / by Joseph F. Gustin
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer crimes- Prevention,Cyberterrorism- Prevention,Computer security,Facility management
Classification :
HV6773
.
G87
2004


49. Cyber terrorism
Author: / by Joseph F. Gustin
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer crimes- Prevention,Cyberterrorism- Prevention,Computer security,Facility management
Classification :
HV6773
.
G87
2004


50. Cyber threat!: how to manage the growing risk of cyber attacks
Author: Ulsch, N. MacDonnell
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Security measures ، Corporations,Computer networks Security measures ، Business enterprises,Prevention ، Computer crimes,، Computer security,Security measures ، Computer networks,، BUSINESS & ECONOMICS / Information Management
Classification :
HD
30
.
2
.
U47


51. Cyber warfare :
Author: Paul Rosenzweig
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention-- Government policy,Computer security-- Government policy-- United States,Cyberspace-- Security measures,Cyberterrorism-- Prevention,Information warfare
Classification :
U163
.
R68
2013


52. Cyber warfare
Author:
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computer security,Cyberspace operations (Military science),Computer crimes,Computer networks--Security measures
Classification :
005
.
8
C994
2015
21


53. CyberForensics :
Author: Jennifer Bayuk, editor ; foreword by Amit Yoran.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation, Case studies.,Computer Security-- legislation & jurisprudence.,Forensic Sciences.,Internet.,Jurisprudence.,Computer crimes-- Investigation.,LAW-- Forensic Science.,Médecine.
Classification :
HV8079
.
C65
C93
2010


54. CyberShock
Author: / by Winn Schwartau
Library: Library of Faculty of World Studies University of Tehran (Tehran)
Subject: Computer security,Computer hackers,Computer crimes
Classification :
QA
76
.
9
A25
S3537
2000


55. Cybercrime
Author: / Cambridge
Library: Library of Institute Comparative of Faculty of Law and Political Science University of Tehran (Tehran)
Subject: Computer crimes,Computer security
Classification :
HV6773
.
W33


56. Cybercrime and cybersecurity in the global south
Author: Nir Kshetri.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes -- Developing countries.,Computer security -- Developing countries.,Internet -- Security measures -- Developing countries.
Classification :
HV6773
.
N575
9999


57. Cybercrime and cyberwarfare
Author: Igor Bernik.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Computer networks-- Security measures.,Internet.
Classification :
HV6773
.
B47
2014eb


58. Cybercrime and espionage :
Author: Will Gragido, John Pirc ; Russ Rogers, technical editor
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business intelligence,Computer crimes,Computer crimes-- Prevention,Espionage,Security systems,Threats-- Safety measures
Classification :
HV6773
.
G73
2011


59. Cybercrimes
Author: / Sumit Ghosh ... Ed
Library: Farabi Faculty Library, University of Tehran (Qom)
Subject: Computer crimes,Computer security
Classification :
HV
6773
.
C93
2010


60. Cybercrimes
Author: / Sumit Ghosh ... Ed
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer crimes.,Computer security.
Classification :
HV
,
6773
,.
C93
,
2010

