1. Cyber Attacks
Author: / Edward Amoroso, John R. Vacca.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Cyberterrorism, United States, Prevention,Computer networks, Security measures,Cyberspace, Security measures,Computer crimes, United States, Prevention,National security, United States
Classification :
HV6773
,.
2
.
A47
2013


2. Cyber Attacks: Protecting National Infrastructure
Author: /Edward G. Amoroso
Library: Library of Islamic Encyclopedia Foundation (Tehran)
Subject: Cyberterrorism -- United States -- Prevention.,Computer networks -- Security measures.,Cyberspace -- Security measures,Computer crimes -- United States -- Prevention.,تروریسم رایانهای -- ایالات متحده -- پیشگیری, امنیت ملی -- ایالات متحده
Classification :
HV6773
.
3
.
A4


3. Cyber terrorism :
Author: Andrew Michael Colarik.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Asymmetric warfare.,Computer crimes.,Computer networks-- Security measures.,Cyberterrorism.,Information superhighway-- Economic aspects.,Information warfare-- Political aspects.,Asymmetric warfare.,Computer crimes.,Computer networks-- Security measures.,Computerkriminalität,Cyberspace,Cyberterrorism.,Information superhighway-- Economic aspects.,POLITICAL SCIENCE-- Political Freedom & Security-- Terrorism.,Terrorismus
Classification :
HV6773
.
C64
2006eb


4. Cybersecurity policies and strategies for cyberwarfare prevention /
Author: Jean-Loup Richet, University of Nantes, France.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Cyber intelligence (Computer security),Cyberspace operations (Military science),Cyberterrorism-- Prevention.
Classification :
HV6773
.
15
.
C97
C923
2015


5. Managing cyber attacks in international law, business, and relations: in search of cyber peace
Author: / Scott J. Shackelford
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Information warfare (International law),Cyberspace,Cyberterrorism,Computer crimes,Computer networks,-- Security measures,-- Security measures
Classification :
343
.
0999
S524M
2014


6. Routledge companion to global cyber-security strategy /
Author: edited by Scott N. Romaniuk and Mary Manjikian.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention-- Government policy.,Computer networks-- Security measures-- Government policy.,Computer security-- Government policy.,Cyberspace-- Security measures-- Government policy.,Cyberterrorism-- Prevention-- Government policy.,Internet-- Security measures-- Government policy.,Computer networks-- Security measures-- Government policy,Computer security-- Government policy,COMPUTERS / Internet / Security,HISTORY / Military / Strategy,POLITICAL SCIENCE / Political Freedom & Security / International Security
Classification :
UA163
.
R68
2021


7. The second economy :
Author: Steve Grobman, Allison Cerra ; foreword by Christopher Young
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes,Computer networks-- Security measures,Computer security,Cyberspace-- Security measures,Cyberterrorism
Classification :
TK5105
.
59

