1. Cyber terrorism
Author: / by Joseph F. Gustin,Gustin, Joseph F.
Library: Special Library of Law (Tehran)
Subject: Computer crimes -- Prevention,Cyberterrorism -- Prevention,Computer security,Facility management
Classification :
HV6773
.
G87
2004
,
DB3933


2. Cyber terrorism
Author: / by Joseph F. Gustin
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer crimes- Prevention,Cyberterrorism- Prevention,Computer security,Facility management
Classification :
HV6773
.
G87
2004


3. Cyber terrorism
Author: / by Joseph F. Gustin
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer crimes- Prevention,Cyberterrorism- Prevention,Computer security,Facility management
Classification :
HV6773
.
G87
2004


4. Cybersecurity Policies and Strategies for Cyberwarfare Prevention
Author: / Jean-Loup Richet,Richet, Jean-Loup
Library: Special Library of Law (Tehran)
Subject: Cyberterrorism -- Prevention,Cyber intelligence (Computer security),Cyberspace operations (Military science),Computer crimes -- Prevention
Classification :
HV6773
.
15
.
C97
R525
2015
,
DB6589


5. Cybersecurity policies and strategies for cyberwarfare prevention /
Author: Jean-Loup Richet, University of Nantes, France.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Cyber intelligence (Computer security),Cyberspace operations (Military science),Cyberterrorism-- Prevention.
Classification :
HV6773
.
15
.
C97
C923
2015


6. Emerging Trends in ICT Security.
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Cyberterrorism-- Prevention.,Electronic surveillance.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25


7. New threats and countermeasures in digital crime and cyber terrorism /
Author: [edited by] Maurice Dawson, Marwan Omar.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer security.,Cyberterrorism-- Prevention.
Classification :
HV6773
.
N4745
2015


8. Practical cyber intelligence :
Author: Wilson Bautista Jr.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Cyber intelligence (Computer security),Cyberterrorism-- Prevention.,Information technology-- Security measures.,Coding theory & cryptology.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer science.,COMPUTERS / Security / General,Cyber intelligence (Computer security),Cybernetics & systems theory.,Cyberterrorism-- Prevention.,Data encryption.,Information technology-- Security measures.
Classification :
HV6773


9. Traceback and anonymity /
Author: Xinyuan Wang, Douglas Reeves
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer security.,Cyberspace-- Security measures.,Cyberterrorism-- Prevention.
Classification :
QA76
.
9
.
A25

