61. Computer and intrusion forensics
Author: / George Mohay ... [et al.]
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Data protection,Forensic sciences
Classification :
QA76
.
9
.
A25
,
C628
2003


62. Computer security
Author: Ben Rothke
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Computer security- Handbooks, manuals, etc,Data protection- Handbooks, manuals, etc
Classification :
QA
,
76
.
9
,.
A25
,
R673
,
2005


63. Computer security and information integrity
Author: / IFIP Sec' 90, Espoo (Helsiniki), Finland, 23-25 May, 1990, edited by Klaus Dittrich, Seppo rautakivi, Juhani Saari
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computer security -- Congresses,Data Protection -- Congresses
Classification :
QA
76
.
9
.
A25I45
1990


64. Computer security: 20 things every employee should know
Author: Ben Rothke
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Data Protection,Computer security
Classification :
QA
،
76
.
9
،.
A25
,
R673
،
2004


65. #Counter hack
Author: #Ed Skoudis
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer networks- Security measures ،Data protection
Classification :
#
TK
،#.
S46


66. Crackproof your software :
Author: Pavol Cerven.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Computer security.,Data protection.,Software protection.

67. Critical information infrastructures security
Author: / Erich Rome, Robin Bloomfield (Eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security, Congresses,Information networks, Access control, Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25C75
2010


68. Cryptographic and information security :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Multimedia communications ; Security measures. ; Data encryption (Computer science) ; Data protection. ;

69. Cryptographic and information security :
Author: edited by S. Ramakrishnan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data encryption (Computer science),Data protection.,Multimedia communications-- Security measures.,Computer security.,COMPUTERS / Security / General.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25
C843
2019eb


70. Cyber Spying
Author: / Ted Fair, Michael Nordfelt, Sandra Ring
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security,Data protection,Internet,کامپیوترها -- ایمنی اطلاعات,حفاظت اطلاعات,اینترنت
Classification :
QA76
,.
9
.
F32C9
2005


71. Cyber Threat Intelligence for the Internet of Things
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data protection. ; Computer communication systems. ; Artificial intelligence. ; Application software. ; Security. ;

72. Cyber criminalité :
Author: Éric Filiol ; Phillipe Richard.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer crimes.,Computer security.,Data protection.,criminalité-- Internet.,sécurité informatique.,Criminalité informatique.,Entreprises-- Réseaux d'ordinateurs-- Sécurité-- Mesures.,Protection de l'information (Informatique),Sécurité informatique.,Business enterprises-- Computer networks-- Security measures.,Computer crimes.,Computer security.,Crime informatique.,Criminalité informatique.,criminalité-- Internet.,Data protection.,Fraude.,Internet.,Piratage informatique.,Pirate informatique.,Sécurité des données.,sécurité informatique.,Sécurité informatique.
Classification :
HV6773
.
F55
2006


73. Cyber-security and global information assuranc
Author: / Kenneth J. Knapp, editor
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Information technology--Security measures,Computer security--Management,Cyberspace--Security measures,Data protection.,Computer networks--Security measures
Classification :
QA
,
76
.
9
,.
A25
,
C918
,
2009


74. Cyber-security and global information assurance
Author: / Kenneth J. Knapp, editor
Library: Insurance Research Institute Library (Tehran)
Subject: Information technology, Security measures,Computer security, Management,Cyberspace, Security measures,Data protection,Computer networks, Security measures
Classification :
QA76
.
9
.
C9
2009


75. Cyber-security and global information assurance :
Author: Kenneth J. Knapp [editor].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Cyberspace-- Security measures.,Data protection.,Information technology-- Security measures.,Computer networks-- Security measures.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25
C918
2009eb


76. Cyber-security and global information assurance: threat analysis and response solutions
Author: Kenneth J. Knapp, editor
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Security measures ، Information technology,Management ، Computer security,Security measures ، Cyberspace,، Data protection,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
C918


77. Cyber security standards, practices and industrial applications :
Author: Junaid Ahmed Zubairi, Athar Mahboob.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data protection.,Electronic data processing departments-- Security measures.

78. Cyberlaw, security and privacy /
Author: Sylvia Mercado Kierkegaard (editor).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Law and legislation, Congresses.,Computers-- Law and legislation, Congresses.,Data protection, Congresses.,Computer security-- Law and legislation.,Computers-- Law and legislation.,Data protection.
Classification :
K564
.
C6
I58
2007


79. Cybersecurity Law
Author: \ Jeff Kosseff
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Law and legislation -- United States,Data protection -- Law and legislation -- United States,Hacking -- United States -- Prevention,Cyberterrorism -- Prevention,Privacy, Right of -- United States,Computer networks -- Security measures,Computer security -- Law and legislation,کامپیوترها -- ایمنی اطلاعات -- قوانین و مقررات -- ایالات متحده ,حفاظت اطلاعات -- قوانین و مقررات -- ایالات متحده,تروریسم رایانهای -- پیشگیری
Classification :
KF1263
.
C65
K67
2017

