1. Advances in Digital Forensics XI :
Author: edited by Gilbert Peterson, Sujeet Shenoi
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Application software.,Computer crimes-- Investigation, Congresses.,Computer science.,Computer security, Congresses.,Computer security.,Computers and civilization.,Data encryption (Computer science),Electronic commerce.,Computer Appl. in Administrative Data Processing.,Computer Science.,Computers and Society.,Data Encryption.,e-Commerce/e-business.,Systems and Data Security.
Classification :
QA76
.
9
.
A25


2. Cisco router and switch forensic
Author: / Dale Liu, lead author and technical editor
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Routers (Computer networks),Computer crimes--Investigation
Classification :
TK
,
5105
.
59
,.
L58
,
2009eb


3. Cisco router and switch forensics
Author: Dale Liu, lead author and technical editor ; James Burton ... [et al.]&
Library: Central Library and Document Center of Shahid Madani University of Azarbayjan (East Azarbaijan)
Subject: Computer networks, Security measures,Routers (Computer networks),Computer crimes, Investigation
Classification :
TK
,
5105
.
59
,.
L58
,
2009


4. Cisco router and switch forensics
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures. ; Routers (Computer networks) ; Computer crimes ; Investigation. ;

5. Computer crime, investigation, and the law /
Author: Chuck Easttom, Jeffrey Taylor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation-- United States.,Computer crimes-- United States.,Computer security.,Internet-- Law and legislation-- United States.,Computer crimes-- Investigation.,Computer crimes-- Investigation.,Computer crimes-- Law and legislation.,Computer crimes.,Computer crimes.,Computer security.,Internet-- Law and legislation.,TRUE CRIME-- White Collar Crime.,United States., 7
Classification :
HV6773
.
2
.
E17
2011eb


6. Computer forensic
Author: / Nathan Clarke
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer networks--Security measures,Computer crimes--Investigation,Forensic sciences.
Classification :
QA
,
76
.
9
,.
A25
,
C527
,
2010eb


7. Computer forensics :
Author: EC-Council Press
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation-- Examinations, Study guides,Computer hackers,Computer security-- Examinations, Study guides,Criminal investigation-- Examinations, Study guides,Electronic evidence
Classification :
HV8079
.
C65
C664
2010


8. Computer forensics :
Author: EC-Council Press.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes -- Investigation -- Examinations -- Study guides.,Computer security -- Examinations -- Study guides.,Criminal investigation -- Examinations -- Study guides.
Classification :
HV8079
.
C65
E236
2010


9. Computer forensics. Volume 5 Investigating wireless networks and devices
Author: EC-Council/Press
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes -- Investigation -- Examinations -- Study guides.,Computer security -- Examinations -- Study guides.,Criminal investigation -- Examinations -- Study guides.

10. Computer forensics and digital investigation with Encase Forensic v7 /
Author: Suzanne Widup.
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computer crimes-- Investigation.,Computer crimes-- Investigation-- Computer programs.,COMPUTERS / Security / General.
Classification :
HV8079
.
C65
W52
2014


11. Computer forensics jumpstart
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Computer networks ; Security measures. ; Computer crimes ; Investigation. ; Forensic sciences. ; Computer crimes ; Investigation. ; fast ; (OCoLC)fst00872065 ;

12. CyberForensics :
Author: Jennifer Bayuk, editor ; foreword by Amit Yoran.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation, Case studies.,Computer Security-- legislation & jurisprudence.,Forensic Sciences.,Internet.,Jurisprudence.,Computer crimes-- Investigation.,LAW-- Forensic Science.,Médecine.
Classification :
HV8079
.
C65
C93
2010


13. Digital Forensics and Cyber Crime
Author: \ Petr Matoušek, Martin Schmiedecker (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer crimes -- Investigation -- Congresses. ,Computer security -- Congresses.,جرایم کامپیوتری -- پیجویی -- کنگره ها,کامپیوترها -- ایمنی اطلاعات -- کنگرهها
Classification :
E-Book
,

14. Digital Forensics and Cyber Crime
Author: \ Joshua I. James , Frank Breitinger (Eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer science,کامپیوتر,a05,a05,Computer crimes -- Investigation -- Congresses.,Computer security -- Congresses.,جرایم کامپیوتری -- پیجویی -- کنگره ها,کامپیوترها -- ایمنی اطلاعات -- کنگرهها
Classification :
HV
8079
.
C65D5
2015
E-Book
,


15. Digital forensics and cyber crime :
Author: Frank Breitinger, Ibrahim Baggili (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation, Congresses.,Computer security, Congresses.,Computer crimes-- Investigation.,Computer security.
Classification :
HV8079
.
C65


16. Digital forensics and cyber crime
Author: Pavel Gladyshev, Marcus K. Rogers (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation, Congresses,Computer security, Congresses
Classification :
HV8079
.
C65
.
I58
2011eb


17. Digital forensics and cyber crime :
Author: Marcus Rogers, Kathryn C. Seigfried-Spellar (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation, Congresses,Computer security, Congresses
Classification :
HV8079
.
C65


18. Digital forensics basics :
Author: Nihad A. Hassan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation.,Computer security.,Digital forensic science.,Computer crimes-- Investigation.,Computer security.,Digital forensic science.
Classification :
HV8079
.
C65
.
H377
2019


19. Digital forensics for handheld devices /
Author: Eamon P. Doherty
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cell phones,Computer crimes-- Investigation,Computer security,Forensic sciences
Classification :
HV8079
.
C65
D64
2013


20. Digital forensics for network, Internet, and cloud computing
Author: / Terrence V. Lillard ... [et al.]
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer crimes -- Investigation,Computer security,Computer networks -- Security measures,Cloud computing -- Security measures
Classification :
HV
8079
.
C65
D5
2010

