1. AVIEN malware defense guide for the Enterpris
Author: / David Harley ... [et al.]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Computer security--Management,Computer viruses.,Malware (Computer software)
Classification :
QA
,
76
.
9
,.
A873
,
2007


2. AVIEN malware defense guide for the Enterprise /
Author: David Harley [and others] ; foreword by Robert S. Vibert.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Computer viruses.,Computer networks-- Security measures.,Computer security-- Management.,Computer viruses.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
A873
2007eb


3. AVIEN malware defense guide for the Enterprise
Author: / David Harley ... [et al.]
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security- Management,Computer networks- Security measures,Computer viruses
Classification :
QA76
.
9
.
A25
,
A873
2007


4. AVIEN malware defense guide for the Enterprise
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Management. ; Computer networks ; Security measures. ; Computer viruses. ;

5. Absolute beginner's guide to security, spam, spyware & viruses
Author: Walker, Andy
Library: (Semnan)
Subject: ، Computer security,، Computer viruses
Classification :
QA
76
.
9
.
W3A2


6. Automatic defense against zero-day polymorphic worms in communication networks
Author: Mohssen Mohammed, Al-Sakib Khan Pathan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer algorithms.,Computer networks-- Security measures.,Computer viruses.,Machine theory.

7. Computer viruses and malware
Author: / by John Aycock
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer viruses,Computer networks- Security measures
Classification :
QA76
.
76
.
C68
,
A96
2006


8. Computers under attack : intruders, worms, and viruses
Author: edited by Peter J. Denning
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer security , Computer viruses
Classification :
QA
76
.
9
.
A25
C667
1990


9. Computers under attack : intruders, worms, and viruses
Author: edited by Peter J. Denning
Library: Library of Niroo Research Institue (Tehran)
Subject: ، Computer security,، Computer viruses
Classification :
QA
76
.
9
.
A25C667
1990


10. Configuring Symantec Antivirus, Corporate Editio
Author: / Laura E. Hunter ... [et al.]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer viruses.,Computer security.,Computer networks--Security measures
Classification :
QA
,
76
.
76
,.
C68
,
C66
,
2003eb


11. Configuring Symantec Antivirus, Corporate Edition
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer viruses. ; Computer security. ; Computer networks ; Security measures. ;

12. Configuring Symantec Antivirus, Corporate Edition
Author: Laura E. Hunter ... [et al.] ; Robert J. Shimonski, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer viruses.

13. Defense and detection strategies against Internet worm
Author: / Jose Nazario
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer networks--Security measures,Computer viruses.
Classification :
QA
,
76
.
9
,.
A25
,
N38
,
2004eb


14. Defense and detection strategies against Internet worms
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Computer networks ; Security measures. ; Computer viruses. ;

15. Defense and detection strategies against Internet worms
Author: / Jose Nazario
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer networks- Security measures,Computer viruses
Classification :
QA76
.
9
.
A25
,
N38
2004


16. Defense and detection strategies against Internet worms
Author: Jose Nazario
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Computer networks -- Security measures,، Computer viruses
Classification :
QA
76
.
9
.
A25N29


17. Defense and detection strategies against Internet worms
Author: / Jose Nazario
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer networks- Security measures,Computer viruses
Classification :
QA76
.
9
.
A25
,
N38
2004


18. Disruptive security technologies with mobile code and peer-to-peer networks
Author: / R.R. Brooks
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Peer-to-peer architecture (Computer networks),Computer networks--Security measures,Computer viruses.
Classification :
TK5105
.
525
.
B76
2005


19. E-mail virus protection handbook
Author: / Syngress Publishing, Inc.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Electronic mail systems , Security measures , Handbooks, manuals, etc,Computer viruses,ETSPASTRAD,Ressources internet
Classification :
E-BOOK
