1. Adversarial machine learning
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Machine learning. ; Computer security. ; COMPUTERS / Security / General. ; bisacsh ;
2. An Introduction to Information Security and ISO 27001 : A Pocket Guide
Author: Watkins, Steve G.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Network security,، COMPUTERS / Security / General
Classification :
HD
30
.
38
.
W3
2008
3. Computer forensics and digital investigation with Encase Forensic v7 /
Author: Suzanne Widup.
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computer crimes-- Investigation.,Computer crimes-- Investigation-- Computer programs.,COMPUTERS / Security / General.
Classification :
HV8079
.
C65
W52
2014
4. Cyber-security and information warfare /
Author: Nicholas J. Daras, editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Information warfare.,Computer security.,COMPUTERS / Security / General,Information warfare.
Classification :
QA76
.
9
.
A25
5. Cybersecurity in Germany /
Author: Martin Schallbruch, Isabel Skierka.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Germany.,Computer security.,Computer security.,COMPUTERS-- Security-- General.,Ethical & social aspects of IT.,Public administration.,Germany., 7
Classification :
QA76
.
9
.
A25
6. Data mining and machine learning in cybersecurity
Author: Dua, Sumeet.
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: ، Data mining,، Machine learning,، Computer security,، Computers- Database Management - Data Mining,، Computers- Software Development & Engineering-Systems Analysis & Design,، Computers -Security - General
Classification :
QA
76
.
9
.
D343
D825
2011
7. Der IT Security Manager :
Author: Heinrich Kersten, Gerhard Klett ; herausgegeben von Heinrich Kersten und Klaus-Dieter Wolfenstetter.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures.,COMPUTERS / Security / General.,Data protection.
Classification :
QA76
.
9
.
A25
H456
9999
8. Fault tolerant architectures for cryptography and hardware security /
Author: Sikhar Patranabis, Debdeep Mukhopadhyay, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Fault-tolerant computing.,Computer security.,COMPUTERS-- Security-- General.,Fault-tolerant computing.
Classification :
QA76
.
9
.
F38
9. Firewalls don't stop dragons :
Author: Carey Parker.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computer security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
P357
2018eb
10. Grundlagen und Anwendung von Information Security Awareness :
Author: Kristin Weber, Andreas E. Schütz und Tobias Fertig.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Computer security.,COMPUTERS-- Security-- General.,Data protection.
Classification :
QA76
.
9
.
A25
11. Handbook of Image-based Security Techniques /
Author: Shivendra Shivani, Suneeta Agarwal, Jasjit S. Suri.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Cryptography.,Image processing.,Computer security.,COMPUTERS-- Security-- General.,Cryptography.,Image processing.
Classification :
QA76
.
9
.
A25
12. Hands-on machine learning for cybersecurity :
Author: Soma Halder, Sinan Ozdemir.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Machine learning.,Computer security.,COMPUTERS / Security / General,Machine learning.
Classification :
QA76
.
9
.
A25
13. Information Security :
Author: edited by Ali Ismail Awad and Michael Fairhurst.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Security systems.,Computer security.,COMPUTERS-- Security-- General.,Data protection.,security of data.,Security systems.
Classification :
QA76
.
9
.
A25
I56
2018eb
14. Information security across federal agencies :
Author: Shane Palmer, editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cyber intelligence (Computer security)-- United States.,COMPUTERS-- Security-- General.,Cyber intelligence (Computer security),United States., 7
Classification :
KF27
.
I546
2016
15. OpenVPN Cookbook - Second Edition.
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Extranets (Computer networks),COMPUTERS-- Networking-- General.,COMPUTERS-- Security-- General.,COMPUTERS-- System Administration-- General.,Extranets (Computer networks)
Classification :
T55
.
4-60
.
8
16. Penetration testing with Raspberry Pi :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Kali Linux.,Kali Linux.,Penetration testing (Computer security),Raspberry Pi (Computer),COMPUTERS-- Hardware-- General.,COMPUTERS-- Microprocessors.,COMPUTERS-- Security-- Networking.,Penetration testing (Computer security),Raspberry Pi (Computer)
Classification :
QA76
.
9
.
A25
M37
2016eb
17. Proceedings of International Symposium on Sensor Networks, Systems and Security :
Author: Nageswara S.V. Rao, Richard R. Brooks, Chase Q. Wu, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Sensor networks, Congresses.,Communications engineering / telecommunications.,Computer security.,COMPUTERS / General.,Imaging systems & technology.,Network hardware.,Sensor networks.
Classification :
TK7872
.
D48
18. Professional Red teaming :
Author: Jacob G. Oakley.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computer security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
19. Security for service oriented architectures
Author: Williams, Walter,Walter Williams
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Service-oriented architecture )Computer science(,Security measures ، Computer networks,، Computer security,، COMPUTERS / Software Development & Engineering / General,، COMPUTERS / Security / General,، COMPUTERS / Internet / General
Classification :
TK
5105
.
5828
.
W5
20. Security in the digital world :
Author: Graham Day.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Computer security.,COMPUTERS-- Security-- General.,Data protection.
Classification :
QA76
.
9
.
A25