21. E-mail virus protection handbook
Author: Syngress Media.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer viruses.,Electronic mail systems-- Security measures.

22. Information security
Author:
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer security,Data protection,Computer viruses,Cryptography
Classification :
QA
76
.
9
.
I5
2004


23. Malicious cryptography
Author: / Adam Young, Moti Yung
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Cryptography.,Computer viruses--Prevention,Data protection.
Classification :
QA
,
76
.
9
,.
A25
,
Y65
,
2004


24. Malicious cryptography :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Cryptography ; Computer viruses ; Prevention ; Data protection ;

25. Malicious cryptography :
Author: Adam Young, Moti Yung
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Computer viruses-- Prevention,Cryptography,Data protection
Classification :
QA76
.
9
.
A25


26. Malware Forensics Field Guide for Linux Systems /
Author: Cameron H. Malin, Eoghan Casey, James M. Aquilina ; Curtis W. Rose, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Linux,Computer crimes-- Investigation, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Computer viruses, Handbooks, manuals, etc.,Forensic sciences, Handbooks, manuals, etc.,Malware (Computer software), Handbooks, manuals, etc.
Classification :
QA
76
.
76
.
C68
.
M32
2014


27. Malware data science :
Author: by Joshua Saxe with Hillary Sanders.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computer viruses.,Debugging in computer science.,Malware (Computer software),Computer security.,Computer viruses.,COMPUTERS-- Security-- Viruses & Malware.,Debugging in computer science.,Malware (Computer software)
Classification :
QA76
.
76
.
C68
S29
2018


28. Malware detection
Author: Mihai Christodorescu ... ]et al.[
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Computer networks- Security measures,، Computer viruses
Classification :
QA
76
.
9
.
A25
M3182
2007


29. Malware forensics :
Author: James M. Aquilina, Eoghan Casey, Cameron H. Malin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation.,Computer security.,Computer viruses-- Identification.
Classification :
HV
A68
2008

30. PC magazine fighting spyware, viruses, and malware
Author: / Ed Tittel
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer viruses,Spyware (Computer software)
Classification :
QA76
.
9
.
A25
,
T57
2005


31. PC magazine fighting spyware, viruses, and malware /
Author: Ed Tittel.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computer viruses.,Malware (Computer software),Computer security.,Computer viruses.,Computerbeveiliging.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Computervirussen.,Malware (Computer software),Spyware.
Classification :
QA76
.
9
.
A25
T57
2005eb


32. PC magazine fighting spyware, viruses, and malware /
Author: Ed Tittel.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computer viruses.,Malware (Computer software),Spyware (Computer software),Computer security.,Computer viruses.,Computerbeveiliging.,Computervirussen.,Malware (Computer software),Spyware (Computer software),Spyware.
Classification :
QA76
.
9
.
A25
T57
2005


33. PC magazine fighting spyware, viruses, and malware
Author: / Ed Tittel
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer viruses.,Spyware (Computer software)
Classification :
QA
,
76
.
9
,.
A25
,
T57
,
2005


34. Practical malware analysis : the hands-on guide to dissecting malicious software
Author: Sikorski, Michael
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Malware (Computer software) ► Computer viruses ► Debugging in computer science ► Computer security
Classification :
005
S279p


35. Practical malware analysis : the hands-on guide to dissecting malicious software
Author: Sikorski, Michael
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Malware (Computer software) ► Computer viruses ► Debugging in computer science ► Computer security
Classification :
005
S279p


36. Practical malware analysis : the hands-on guide to dissecting malicious software
Author: Sikorski, Michael
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Malware (Computer software) ► Computer viruses ► Debugging in computer science ► Computer security
Classification :
005
S279p


37. Practical malware analysis : the hands-on guide to dissecting malicious software
Author: Sikorski, Michael
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Malware (Computer software) ► Computer viruses ► Debugging in computer science ► Computer security
Classification :
005
S279p


38. Practical malware analysis : the hands-on guide to dissecting malicious software
Author: Sikorski, Michael
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Malware (Computer software) ► Computer viruses ► Debugging in computer science ► Computer security
Classification :
005
S279p


39. Practical malware analysis : the hands-on guide to dissecting malicious software
Author: Sikorski, Michael
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Malware (Computer software) ► Computer viruses ► Debugging in computer science ► Computer security
Classification :
005
S279p


40. Practical malware analysis : the hands-on guide to dissecting malicious software
Author: Sikorski, Michael
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Malware (Computer software) ► Computer viruses ► Debugging in computer science ► Computer security
Classification :
005
S279p

