201. The hacker playbook :
Author: Peter Kim
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention,Computer networks-- Security measures,Computer programming,Computer software-- Testing,Hackers,Penetration testing (Computer security), Handbooks, manuals, etc

202. The hacker playbook 3 :
Author: Peter Kim.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.,Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
K56
2018


203. The hacker playbook 2 :
Author: Peter Kim.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer programming.,Computer software-- Testing.,Hackers.,Penetration testing (Computer security), Handbooks, manuals, etc.

204. The official CHFI study guide (Exam 312-49)
Author: Dave Kleinman, technical editor ; Kevin Cardwell ... [et al.]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Examinations, Study guides,Computer security-- Examinations, Study guides
Classification :
QA76
.
9
.
A25
O34
2007


205. The second economy :
Author: Steve Grobman, Allison Cerra ; foreword by Christopher Young
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes,Computer networks-- Security measures,Computer security,Cyberspace-- Security measures,Cyberterrorism
Classification :
TK5105
.
59


206. The smart girl's guide to privacy :
Author: Violet Blue.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Internet and women.,Internet-- Safety measures.,Internet-- Security measures.,Privacy, Right of.
Classification :
HV6773
.
B56
2015


207. Traceback and Anonymity
Author: \ Xinyuan Wang, Douglas Reeves.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security.,Cyberspace-- Security measures.,Computer crimes-- Prevention.,کامپیوترها -- ایمنی اطلاعات ,فضای مجازی -- تدابیر ایمنی ,جرایم کامپیوتری -- پیشگیری
Classification :
QA
76
.
9
.
W32T7
2015
E-Book
,


208. Traceback and anonymity /
Author: Xinyuan Wang, Douglas Reeves
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer security.,Cyberspace-- Security measures.,Cyberterrorism-- Prevention.
Classification :
QA76
.
9
.
A25


209. UNIX and Linux forensic analysis toolki
Author: / Chris Pogue, Cory Altheide, Todd Haverkos
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: UNIX (Computer file),Linux.,Computer crimes--Investigation,Computer security.,Forensic sciences.
Classification :
HV
,
8079
,.
C65
,
P64
,
2008eb


210. Understanding cyber risk :
Author: Thomas R. Koehler.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Business intelligence.,Computer crimes-- Prevention.,Data protection.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Business enterprises-- Computer networks-- Security measures.,Business intelligence.,Computer crimes-- Prevention.,Data protection.
Classification :
HF5548
.
37
.
K64
2018


211. Unix and Linux forensic analysis DVD toolkit
Author: Pogue, Chris.
Library: Library of Niroo Research Institue (Tehran)
Subject: Investigation ، Computer crimes,، Computer security,، Forensic sciences
Classification :
HV
8079
.
C65P64
2008


212. Vers & virus :
Author: François Paget; sous la direction de Philippe Rosé.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Computer security.,Computer viruses.
Classification :
QA76
.
76
.
C68
F736
2005


213. Virtualization and forensics : a digital forensic investigator's guide to virtual environments
Author: Barrett, Diane.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Investigation ، Computer crimes,Security measures ، Virtual computer systems,، Computer security
Classification :
HV
8079
.
C65
B37
2010


214. Vulnerability analysis and defense for the Interne
Author: / by Abhishek Singh (editor)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer networks--Security measures--Evaluation,Computer crimes--Prevention
Classification :
QA
,
76
.
9
,.
A25
,
V848
,
2008


215. Vulnerability analysis and defense for the Internet
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Computer networks ; Security measures ; Evaluation. ; Computer crimes ; Prevention. ;

216. Vulnerability analysis and defense for the Internet
Author: by Abhishek Singh (editor) ; [with contributions by] Baibhav Singh and Hirosh Joseph.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures-- Evaluation.,Computer security.

217. Web Application Defender's Cookbook :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer networks-- Security measures.,Computer security.,Hackers.
Classification :
QA76
.
9
.
A25
B37
2013eb


218. What every engineer should know about cyber security and digital forensics /
Author: Joanna F. DeFranco
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation,Computer networks-- Security measures,Computer security
Classification :
TK5105
.
59
.
D44
2014


219. Windows Forensic Analysis
Author: \ Harlan Carvey
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer crimes -- Investigation -- United States -- Methodology,Computer networks -- Security measures,Internet -- Security measures,جرایم کامپیوتری -- ایالات متحده -- پیجویی -- روششناسی,شبکههای کامپیوتری -- تدابیر ایمنی,اینترنت -- تدابیر ایمنی
Classification :
E-Book
,

220. Windows forensic analysi
Author: / Harlan Carvey
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Microsoft Windows (Computer file)--Security measures,Computer crimes--Investigation--United States--Methodology,Computer networks--Security measures,Internet--Security measures,Computer security.
Classification :
HV
,
8079
,.
C65
,
C37
,
2007eb

