121. Incident response
Author: / E. Eugene Schultz, Russell Shumway
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Compuer crimes- Investigation
Classification :
TK
5105
.
59
+


122. Incident response
Author: / Douglas Schweitzer
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer crimes- Investigation,Computer security
Classification :
HV8079
.
C65
,
S39
2003


123. Incident response
Author: Douglas Schweitzer
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Computer crimes- Investigation,Computer security
Classification :
HV
,
8079
,.
C6I79
,
2003


124. Incident response & computer forensics /
Author: Chris Prosise, Kevin Mandia.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation.,Computer security.,Forensic sciences.,Computer crimes-- Investigation.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Forensic sciences.
Classification :
QA76
.
9
.
A25
P76
2003eb


125. Information security and digital forensics :
Author: Dasun Weerasinghe (Ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation, Congresses.,Computer networks-- Access control, Congresses.,Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Internet-- Security measures, Congresses.,Computer crimes-- Investigation.,Computer networks-- Access control.,Computer networks-- Security measures.,Computer security.,Informatique.,Internet-- Security measures.
Classification :
QA76
.
9
.
A25
I584
2010


126. Information warfare :
Author: Michael Erbschloe.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Cyberterrorism.,Information warfare.,Computer crimes.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Cyberterrorism.,Information warfare.
Classification :
U163
.
E66
2001eb


127. Insider threat :
Author: Eric Cole, Sandra Ring
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Commercial crimes,Computer networks-- Security measures,Computer security,Hackers

128. Insider threat
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Commercial crimes. ; Computer hackers. ; Computer networks ; Security measures. ; Computer security. ;

129. Insider threat
Author: / Eric Cole, Sandra Ring
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Commercial crimes.,Computer networks--Security measures,Computer security.,Computer hackers.

130. Internet Forensics
Author: \ Robert Jones.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer crimes-- Investigation.,Internet.,Computer security.,جرایم کامپیوتری -- پیجویی ,اینترنت ,کامپیوترها -- ایمنی اطلاعات
Classification :
HV
8079
.
J6I5
2005
E-Book
,


131. Internet denial of service
Author: / Jelena Mirkovic ... [et al.]
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Internet- Security measures,Computer crimes- Prevention
Classification :
TK5105
.
59
.
I5455
2004


132. Internet denial of service: attack and defense mechanisms
Author: Jelena Mirkovic...]et al.[
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Computer networks,Security measures ، Internet,Prevention ، Computer crimes
Classification :
TK
5105
.
59
.
I5455
2005


133. Internet forensics
Author: / Robert Jones
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer crimes--Investigation,Internet.,Computer security.,Internet.,Delitos informaaticos--Investigaciaon,Seguridad informaatica.,Forensische wetenschappen.--gtt,Computercriminaliteit.--gtt,Internet.--gtt
Classification :
HV
,
8079
,.
C65
,
J663
,
2005


134. Internet forensics
Author: by Robert Jones
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation,Computer security
Classification :
HV8079
.
C65
J66
2006


135. Introduction to cyber-warfare :
Author: Paulo Shakarian, Jana Shakarian & Andrew Ruef ; foreword by Sushil Jajodia
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes,Cyberspace-- Security measures,Cyberterrorism,Data protection,Information warfare, Case studies
Classification :
U163
.
S438
2013


136. Introductory computer forensics :
Author: Xiaodong Lin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation.,Digital forensic science.,Computer crimes-- Investigation.,Computer security.,Computers-- Interactive & Multimedia.,Computers-- Security-- General.,Crime & criminology.,Digital forensic science.,Forensic science.,Graphical & digital media applications.,Medical-- Forensic Medicine.,Social Science-- Criminology.
Classification :
HV8079
.
C65


137. Invisible threats :
Author: ed. by Umberto Gori and Ivo Paparela
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Economic aspects,Computer crimes-- Political aspects,National security
Classification :
HV6773
.
I58
2006


138. Mac OS X, iPod, and iPhone forensic analysis DVD toolkit /
Author: Ryan R. Kubasiak, Sean Morrissey, lead authors ; [contributing authors], Walter Barr ... [et al.] ; Jesse Varsalone, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Computer security.,Data recovery (Computer science),Macintosh (Computer)

139. Mafiaboy :
Author: Michael Calce and Craig Silverman.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Calce, Michael.,Calce, Michael.,Calce, Michael.,Calce, Michael.,Computer crimes.,Computer security.,Hackers-- Canada, Biography.,Criminalité informatique.,Pirates informatiques-- Canada, Biographies.,Sécurité informatique.,Computer crimes.,Computer security.,Hackers.,Canada., 7
Classification :
HV6773
.
C34
2008


140. Malware
Author: / Ed Skoudis with Lenny Zeltser
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer networks--Security measures,Computer crimes.
Classification :
QA
,
76
.
9
,.
A25
,
S58
,
2004

