1. Cisco router and switch forensic
Author: / Dale Liu, lead author and technical editor
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Routers (Computer networks),Computer crimes--Investigation
Classification :
TK
,
5105
.
59
,.
L58
,
2009eb


2. Cisco router and switch forensics
Author: Dale Liu, lead author and technical editor ; James Burton ... [et al.]&
Library: Central Library and Document Center of Shahid Madani University of Azarbayjan (East Azarbaijan)
Subject: Computer networks, Security measures,Routers (Computer networks),Computer crimes, Investigation
Classification :
TK
,
5105
.
59
,.
L58
,
2009


3. Cisco router and switch forensics
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ; Routers (Computer networks) ; Computer crimes ; Investigation. ;

4. Computer forensic
Author: / Nathan Clarke
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer networks--Security measures,Computer crimes--Investigation,Forensic sciences.
Classification :
QA
,
76
.
9
,.
A25
,
C527
,
2010eb


5. Computer forensics jumpstart
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Computer networks ; Security measures. ; Computer crimes ; Investigation. ; Forensic sciences. ; Computer crimes ; Investigation. ; fast ; (OCoLC)fst00872065 ;

6. Digital forensics for network, Internet, and cloud computing :
Author: Terrence V. Lillard [and others] ; technical editor, Jim Murray.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures.,Computer crimes-- Investigation.,Computer networks-- Security measures.,Computer security.,Computer crimes-- Investigation.,Computer networks-- Security measures.,Computer security.,LAW-- Forensic Science.
Classification :
HV8079
.
C65
D54
2010


7. Digital forensics for network, Internet, and cloud computing
Author: / Terrence V. Lillard ... [et al.]
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer crimes -- Investigation,Computer security,Computer networks -- Security measures,Cloud computing -- Security measures
Classification :
HV
8079
.
C65
D5
2010


8. Digital forensics for network, Internet, and cloud computing :a forensic evidence guide for moving targets and data
Author: Terrence V. Lillard ... ]et al.[ ; technical editor, Jim Murray
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Investigation ، Computer crimes,، Computer security,Security measures ، Computer networks,Security measures ، Cloud computing
Classification :
HV
8079
.
C65
D54
2010


9. Dissecting the hack :
Author: Jayson E. Street [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation.,Computer crimes, Case studies.,Computer networks-- Security measures.,Computer security.,Hackers.,Computer crimes-- Case studies.,Computer crimes-- Investigation.,Computer crimes-- Investigation.,Computer crimes.,Computer hackers.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,Hackers.,TRUE CRIME-- White Collar Crime.
Classification :
HV8079
.
C65
S856
2010b


10. EnCase computer forensics
Author: Steve Bunting
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation-- Examinations, Study guides,Computer networks-- Security measures-- Examinations, Study guides,Computer security-- Examinations, Study guides,Electronic data processing personnel-- Certification,Forensic sciences-- Examinations, Study guides
Classification :
QA76
.
3
.
B86
2012


11. EnCase computer forensics
Author: Steve Bunting
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation-- Examinations, Study guides,Computer networks-- Security measures-- Examinations, Study guides,Computer security-- Examinations, Study guides,Electronic data processing personnel-- Certification,Forensic sciences-- Examinations, Study guides
Classification :
QA76
.
3
.
B86
2012


12. Fundamentals of network forensics :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation.,Computer networks-- Security measures.,Cyber intelligence (Computer security)
Classification :
TK5105
.
59


13. Incident response
Author: / E. Eugene Schultz, Russell Shumway
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Compuer crimes- Investigation
Classification :
TK
5105
.
59
+


14. Mastering Windows network forensics and investigation
Author: Steve Anson, Steve Bunting
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Microsoft Windows )Computer file(,، Computer crimes -- Investigation,، Computer networks -- Security measures
Classification :
HV
8079
.
C65A58


15. Mastering Windows network forensics and investigation
Author: / Steve Anson, Steve Bunting
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Microsoft Windows (Computer file),Computer crimes--Investigation,Computer networks--Security measures
Classification :
HV
,
8079
,.
C65
,
A57
,
2007


16. Network intrusion analysis
Author: Joe Fichera, Steven Bolt
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation-- United States,Computer networks-- Security measures,Computer security,Internet-- Security measures,Intrusion detection systems (Computer security)
Classification :
HV8079
.
C65
F53
2012


17. Practical Cyber Forensics :
Author: by Niranjan Reddy.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation.,Computer networks-- Security measures.,Computer security.,Computer crimes-- Investigation.,Computer networks-- Security measures.,Computer security.
Classification :
HV8079
.
C65
R44
2019


18. Practical cyber forensics :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer crimes ; Investigation ; Computer networks ; Security measures ; Computer security ; Forensic sciences ; Technological innovations ; Electronic evidence ; Evidence, Criminal ; Criminal investigation ;

19. Scene of the cybercrime
Author:
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer networks- Security measures,Computer crimes- Investigation,Forensic sciences
Classification :
QA76
.
9
.
A25
,
C765
2008


20. Scene of the cybercrime
Author:
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer networks- Security measures,Computer crimes- Investigation,Forensic sciences
Classification :
QA76
.
9
.
A25
,
C765
2008

