1. Advances in intelligence and security informatics
Author: Wenji Mao, Fei-Yue Wang
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,National security
Classification :
QA76
.
9
.
A25
M36
2012


2. Conquest in cyberspac
Author: / Martin C. Libicki
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Information warfare.,National security.,Cyberterrorism.,Computer networks--Security measures
Classification :
U
,
163
,.
L534
,
2007
,
WEB


3. Conquest in cyberspace :national security and information warfare
Author: Libicki, Martin C.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Information warfare,، National security,، Cyberterrorism,Security measures ، Computer networks
Classification :
U
163
.
L534
2007


4. Critical issues facing the Middle East :
Author: edited by James A. Russell.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network resources.,National security-- Middle East.,Computer network resources.,Economic history.,HISTORY-- Military-- Other.,Military readiness.,National security.,Politics and government,TECHNOLOGY & ENGINEERING-- Military Science.,Middle East, Defenses.,Middle East, Economic conditions, 21st century.,Middle East, Politics and government, 21st century.,Middle East., 0, 0, 0, 7
Classification :
UA832
.
C75
2006eb


5. Cyber attacks :
Author: Edward Amoroso.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- United States.,Cyberterrorism-- United States-- Prevention.,National security-- United States.,Computer security.,Cyberterrorism-- Prevention.,National security.,POLITICAL SCIENCE-- Political Freedom & Security-- Terrorism.,United States., 7
Classification :
HV6773
.
2
.
A47
2011


6. Developments and advances in defense and security :
Author: editors, Álvaro Rocha and Robson Pacheo Pereira.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Military policy, Congresses.,National security, Congresses.,Computer security.,HISTORY / Military / Other.,Military policy.,National security.,TECHNOLOGY & ENGINEERING / Military Science.
Classification :
UA10
.
5


7. Developments and advances in defense and security :
Author: Álvaro Rocha, Teresa Guarda, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Military policy, Congresses.,National security, Congresses.,Artificial intelligence.,Computer security.,HISTORY-- Military-- Other.,Military policy.,National security.,TECHNOLOGY & ENGINEERING-- Military Science.
Classification :
UA10
.
5


8. Digital defense: a cybersecurity primer
Author: Pelton, Joseph N.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Computer security,، National security
Classification :
QA
76
.
9
.
A25
P45
2015


9. Intelligence and security informatics
Author: / Christopher C. Yang ... [et al.] (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Expert systems (Computer science)--United States--Congresses,Computer security--United States--Congresses,National security--United States--Congresses,Computer crimes--Investigation--Congresses
Classification :
QA
,
76
.
76
,.
E95
,
I86
,
2008


10. Intelligence and security informatics
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Expert systems (Computer science) ; United States ; Congresses. ; Computer security ; United States ; Congresses. ; National security ; United States ; Congresses. ; Computer crimes ; Investigation ; Congresses. ;

11. Intelligence and security informatics : IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, Ga, USA, May 19-20, 2005 : proceedings
Author: Paul Kantor... ]et al.[ )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Expert systems )Computer science(,Congresses ، Data mining,Congresses ، Computer security,Congresses ، National security
Classification :
QA
76
.
L28
Vol
.
3495


12. Intelligence and security informatics for international security
Author: Hsinchun Chen.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data mining.,Expert systems (Computer science),National security.,Security, International.

13. Invisible threats :
Author: ed. by Umberto Gori and Ivo Paparela
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Economic aspects,Computer crimes-- Political aspects,National security
Classification :
HV6773
.
I58
2006


14. Protecting persons while protecting the peopl
Author: / Cecilia S. Gal, Paul B. Kantor, Michael E. Lesk, (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,National security--Congresses,Privacy, Right of--Congresses,Information society--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
A554
,
2008


15. Protecting persons while protecting the people
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ; National security ; Congresses. ; Privacy, Right of ; Congresses. ; Information society ; Congresses. ; Internet ; Privatsph?re ; Anonymit?t ; Identit?tsverwaltung ; Computersicherheit ; Datensicherung. ; Netzwerkverwaltu

16. جرائم نوظهور علیه امنیت ملی (قتل هدفمند، بیوتروریسم و جرایم سایبری)
Author: / تالیف محمد صدریارحامی، مهدی حقیقیان,صدری ارحامی
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: امنیت ملی ,National security,ترور دولتی,Targeted killing,تروریسم میکربی,Bioterrorism,جرایم کامپیوتری,Computer crimes,-- ایران ,-- Iran,a01,a01,a03,a03,a02,a02,a04,a04
Classification :
DSR
۱۶۵۲
/
ص
۴
ج
۴ ۱۳۹۸


17. سیاستهای تهدید و امنیت سایبری
Author: / [میریام دانکاولتی],دان کاولتی,Dunn Cavelty
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: کامپیوترها,Computer security,کامپیوترها,Computers Security,تهدید,Threats,تهدید,Threats,امنیت ملی ,National security, -- ایمنی اطلاعات, -- سیاست دولت, --Government policy, -- سیاست دولت, -- Government policy, -- سیاست دولت, -- Government policy, -- ایالات متحده, -- United States,-- ایالات متحده,-- United States, -- ایالات متحده, -- United States, -- ایالات متحده, -- United States,-- ایالات متحده ,-- United States,a06,a06,a08,a08,a10,a10,a12,a12,a14,a14
Classification :
QA
۷۶
/
۹
/
آ
۲۵
د
۲ ۱۳۸۹


18. معمای ادوارد اسنودن و ماجرای جاسوسی آمریکا از شبکههای اجتماعی
Author: /مولف محمدمهدی مختاری.,مختاری
Library: National Library and Archives of Islamic Republic of Iran (Tehran)
Subject: اسنودن,Snowden,، ادوارد ج.,, Edward J.,، ۱۹۸۳ - م.,ایالات متحده,United States,. آژانس امنیت ملی,. National Security Agency,افشاگری,Whistle blowing,جرایم کامپیوتری,Computer crimes,جاسوسی,Espionage, -- ایالات متحده, -- United State, -- ایالات متحده, -- United States, -- ایالات متحده, -- United States
Classification :
JF
۱۵۲۵
/
الف
۷
م
۳ ۱۳۹۵

