1. Incident response
Author: / Douglas Schweitzer
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer crimes- Investigation,Computer security
Classification :
HV8079
.
C65
,
S39
2003


2. Incident response
Author: Douglas Schweitzer
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Computer crimes- Investigation,Computer security
Classification :
HV
,
8079
,.
C6I79
,
2003


3. Securing the network from malicious code : a complete guide to defending against viruses, worms, and trojans
Author: Schweitzer, Douglas
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,Prevention ، Computer viruses
Classification :
TK
5105
.
59
.
S38S4

