101. Enterprise cybersecurity study guide :
Author: Scott E. Donaldson, Stanley G. Siegel, Chris K. Williams, Abdul Aslam.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer security.,Coding theory & cryptology.,Computer crimes-- Prevention.,Computer security.,Computer security.,COMPUTERS-- Data Processing.
Classification :
QA76
.
9
.
A25


102. Forensics in telecommunications, information, and multimedia :
Author: Xuejia Lai...[et al.] (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation, Congresses.,Telecommunication systems-- Security measures, Congresses.
Classification :
HV8079
.
C65
I58
2011


103. Foundations of computer security
Author: / David Salomon
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer crimes
Classification :
QA76
.
9
.
A25
,
S266
2006


104. Foundations of computer security
Author: / David Salomon
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer crimes.
Classification :
QA
,
76
.
9
,.
A25
,
S266
,
2006


105. Foundations of computer security
Author: Salomon, David, 1938-
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer security ► Computer crimes
Classification :
005
S174f


106. Foundations of computer security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Computer crimes. ;

107. Foundations of computer security
Author: / David Salomon
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer crimes
Classification :
QA76
.
9
.
A25
,
S266
2006


108. Foundations of computer security
Author: David Salomon.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Computer security.

109. Fundamentals of network forensics :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation.,Computer networks-- Security measures.,Cyber intelligence (Computer security)
Classification :
TK5105
.
59


110. Hack proofing your identity in the information age
Author: Teri Bidwell ; Michael Cross, technical editor ; Ryan Russell, technical reviewer.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Computer security.,Identification cards-- Forgeries.,Impostors and imposture.,Internet fraud.
Classification :
QA76
.
9
.
A25
B534
2002eb


111. Hack proofing your identity in the information age: protect your family on the Internet!
Author: Bidwell, Teri
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,Forgeries ، Identification cards,، Computer crimes,، Imposters and imposture
Classification :
QA
76
.
9
.
A25
B53
2002


112. Hack proofing your identity in the information age: protect your family on the Internet!
Author: Bidwell, Teri
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: ، computer security,Forgeries ، Identification cards,، Computer crimes.,، Imposters and imposture
Classification :
QA
76
.
9
.
A25
B53


113. Hacked :
Author: Charlie Mitchell.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention-- Government policy-- United States.,Computer security-- Government policy-- United States.,Cyber intelligence (Computer security),Internet-- Government policy-- United States.,Computer crimes-- Government policy-- United States.,Computer hackers.,Computer security-- Government policy-- United States.,Computer security-- Government policy.,COMPUTERS-- Security-- General.,Computersicherheit,Cyber intelligence (Computer security),Cyber intelligence (Computer security),Cyberspace.,Internet-- Government policy-- United States.,Internet-- Government policy.,Internet-- Government policy.,United States.,USA, 7, 7
Classification :
TK5105
.
875
.
I57
M575
2016


114. Hacker's challenge 3 :20 brand-new forensic scenarios & solutions
Author: David Pollino ... ]et al.[
Library: (Semnan)
Subject: Security measures ، Computer networks,Security measures ، Internet,، Computer crimes,، Computer hackers
Classification :
QA
76
.
9
.
H33


115. Hacking exposed computer forensics
Author: Chris Davis, David Cowen, Aaron Philipp
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Computer crimes, Investigation,Computer security,Forensic sciences
Classification :
HV
,
8079
,.
C65
,
D35
,
2010


116. Hacking web apps :
Author: Mike Shema
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Application software-- Security measures,Computer crimes-- Prevention,Computer networks-- Security measures,Computer security,Web site development-- Security measures
Classification :
TK5105
.
59
.
S5234
2012


117. Handbook of research on computational forensics, digital crime, and investigation :
Author: [edited by] Chang-Tsun Li.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer crimes.,Computer security.,Forensic sciences.,Computer crimes-- Prevention.,Computer crimes.,Computer security.,Forensic sciences.,LAW-- Forensic Science.
Classification :
HV6773
.
H374
2010eb


118. Handbook of research on digital crime, cyberspace security, and information assurance /
Author: Maria Manuela Cruz-Cunha, Polytechnic Institute of Cavado and Ave, Portugal, Irene Maria Portela, Polytechnic Institute of C�avado and Ave, Portugal.
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computer crimes.,Computer security.,Computer networks-- Security measures.,Data protection.,Information technology.
Classification :
HV6773
.
H375
2015


119. Handbook of research on information and cyber security in the fourth industrial revolution /
Author: Ziska Fields, University of KwaZulu-Natal, South Africa.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Confidential communications-- Protection.,Electronic information resources-- Access control.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Electronic information resources-- Access control.
Classification :
TK5105
.
59
.
P744
2018e


120. Handbook of research on information security and assurance
Author: / Jatinder N.D. Gupta, Sushil K. Sharma [editors].
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer networks -- Security measures,Electronic information resources--Access control,Computer crimes--Prevention
Classification :
TK
5105
.
59
.
H353
2009
R

