21. Conquest in cyberspac
Author: / Martin C. Libicki
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Information warfare.,National security.,Cyberterrorism.,Computer networks--Security measures
Classification :
U
,
163
,.
L534
,
2007
,
WEB
22. Conquest in cyberspace :national security and information warfare
Author: Libicki, Martin C.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Information warfare,، National security,، Cyberterrorism,Security measures ، Computer networks
Classification :
U
163
.
L534
2007
23. Critical infrastructure protectio
Author: / E. Goetz and S. Shenoi, editors
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Congresses,Computer security--Congresses,Information networks--Security measures--Congresses
Classification :
TK
,
5105
.
59
,.
C75
,
2008eb
24. Critical infrastructure protection
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer networks ; Security measures ; Congresses. ; Computer security ; Congresses. ; Information networks ; Security measures ; Congresses. ;
25. Critical infrastructure protection
Author: / Javier Lopez, Roberto Setola, Stephen D. Wolthusen (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks--Security measures,Information networks--Security measures,Data encryption (Computer science),Data structures (Computer science),Information technology--Security measures
Classification :
TK5105
.
59
.
C725
2012
26. Critical infrastructure protection
Author: E. Goetz and S. Shenoi, editors
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Congresses ، Computer networks - Security measures,Congresses ، Computer security,Congresses ، Information networks - Security measures
Classification :
TK
5105
.
59
.
C748
2008
27. Critical infrastructure protection
Author: E. Goetz and S. Shenoi, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Information networks-- Security measures, Congresses.
28. Critical infrastructure protection
Author: Javier Lopez, Roberto Setola, Stephen D. Wolthusen (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Data encryption (Computer science),Data structures (Computer science),Information networks-- Security measures,Information technology-- Security measures
Classification :
TK5105
.
59
.
C725
2012eb
29. Critical infrastructure protection I
Author: / Fourth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, ICCIP 2010, Washington, DC, USA, March 15 - 17, 2010. Tyler Moore
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures, Congresses,Computer security, Congresses,Information networks, Security measures, Congresses,Cyberinfrastructure, Security measures, Congresses,Electronic books., local
30. Critical infrastructure protection II
Author: edited by Mauricio Papa, Sujeet Shenoi
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Information networks-- Security measures, Congresses
Classification :
TK5105
.
59
.
C75
2008eb
31. Critical infrastructure protection III
Author: Charles Palmer, Sujeet Shenoi (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Information networks-- Security measures, Congresses
Classification :
TK5105
.
59
.
C75
2009eb
32. Cyber-netwar security in the information age
Author: / edited by Fernando Duarte Carvalho, Eduardo Mateus da Silva
Library: Central Library of Astan Quds Razavi-Hall of Foreign Books (Khorasan Razavi)
Subject: Cyberspace operations (Military science),Information warfare -- Congresses,Computer networks -- Security measures -- Congresses
Classification :
355
.
343
N
279
C
33. Cyber terrorism :
Author: Andrew Michael Colarik.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Asymmetric warfare.,Computer crimes.,Computer networks-- Security measures.,Cyberterrorism.,Information superhighway-- Economic aspects.,Information warfare-- Political aspects.,Asymmetric warfare.,Computer crimes.,Computer networks-- Security measures.,Computerkriminalität,Cyberspace,Cyberterrorism.,Information superhighway-- Economic aspects.,POLITICAL SCIENCE-- Political Freedom & Security-- Terrorism.,Terrorismus
Classification :
HV6773
.
C64
2006eb
34. Cyber warfare
Author: Jason Andress, Steve Winterfeld ; technical editor Lillian Ablon ; foreword by Stephen Northcutt
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Information warfare
Classification :
U163
.
A64
2014
35. Cyber warfare
Author: Jason Andress, Steve Winterfeld ; technical editor Lillian Ablon ; foreword by Stephen Northcutt
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Information warfare
Classification :
U163
.
A64
2014
36. Cyber warfare :
Author: Jason Andress, Steve Winterfeld ; Russ Rogers, technical editor ; foreword by Stephen Northcutt.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Handbooks, manuals, etc.,Information warfare, Handbooks, manuals, etc.
37. Cyber warfare : techniques, tactics and tools for security practitioners
Author: Andress, Jason.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Handbooks, manuals, etc ، Information warfare,Handbooks, manuals, etc ، Computer networks - Security measures
Classification :
U
163
.
A64
2011
38. Cyberwar-Netwar :
Author: edited by Fernando Duarte Carvalho and Eduardo Mateus da Silva.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,HISTORY -- Military -- Biological & Chemical Warfare.,Information warfare -- Congresses.
Classification :
UA929
.
95
.
E43
E358
2006
39. Data-driven security
Author: Jay Jacobs + Bob Rudis
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Information visualization
Classification :
QA76
.
9
.
A25
J324
2014