181. PC magazine fighting spyware, viruses, and malware /
Author: Ed Tittel.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computer viruses.,Malware (Computer software),Computer security.,Computer viruses.,Computerbeveiliging.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Computervirussen.,Malware (Computer software),Spyware.
Classification :
QA76
.
9
.
A25
T57
2005eb


182. PC magazine fighting spyware, viruses, and malware /
Author: Ed Tittel.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Computer viruses.,Malware (Computer software),Spyware (Computer software),Computer security.,Computer viruses.,Computerbeveiliging.,Computervirussen.,Malware (Computer software),Spyware (Computer software),Spyware.
Classification :
QA76
.
9
.
A25
T57
2005


183. PC magazine fighting spyware, viruses, and malware
Author: / Ed Tittel
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer viruses.,Spyware (Computer software)
Classification :
QA
,
76
.
9
,.
A25
,
T57
,
2005


184. PC viruses, detection, analysis and cure
Author: Solomon, Alan 1948-
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer viruses
Classification :
005
S689p


185. Pc anti-Virus book
Author: / Alan Solomon and Tim Kay
Library: Central Library and Document Center of Arak University (Markazi)
Subject: Computer viruses
Classification :
005
.
8
S689p


186. Polymers in regenerative medicine :
Author: edited by Manuel Monléon Pradas, Maria J. Vicent
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Nanomedicine-- trends,Nanomedicine.,Polymers.,Regenerative medicine-- trends,Regenerative medicine.,Tissue engineering-- trends,Tissue engineering.
Classification :
R857
.
M3


187. Practical malware analysis : the hands-on guide to dissecting malicious software
Author: Sikorski, Michael
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Malware (Computer software) ► Computer viruses ► Debugging in computer science ► Computer security
Classification :
005
S279p


188. Practical malware analysis : the hands-on guide to dissecting malicious software
Author: Sikorski, Michael
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Malware (Computer software) ► Computer viruses ► Debugging in computer science ► Computer security
Classification :
005
S279p


189. Practical malware analysis : the hands-on guide to dissecting malicious software
Author: Sikorski, Michael
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Malware (Computer software) ► Computer viruses ► Debugging in computer science ► Computer security
Classification :
005
S279p


190. Practical malware analysis : the hands-on guide to dissecting malicious software
Author: Sikorski, Michael
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Malware (Computer software) ► Computer viruses ► Debugging in computer science ► Computer security
Classification :
005
S279p


191. Practical malware analysis : the hands-on guide to dissecting malicious software
Author: Sikorski, Michael
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Malware (Computer software) ► Computer viruses ► Debugging in computer science ► Computer security
Classification :
005
S279p


192. Practical malware analysis : the hands-on guide to dissecting malicious software
Author: Sikorski, Michael
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Malware (Computer software) ► Computer viruses ► Debugging in computer science ► Computer security
Classification :
005
S279p


193. Practical malware analysis : the hands-on guide to dissecting malicious software
Author: Sikorski, Michael
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Malware (Computer software) ► Computer viruses ► Debugging in computer science ► Computer security
Classification :
005
S279p


194. Practical malware analysis : the hands-on guide to dissecting malicious software
Author: Sikorski, Michael
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Malware (Computer software) ► Computer viruses ► Debugging in computer science ► Computer security
Classification :
005
S279p


195. Practical malware analysis : the hands-on guide to dissecting malicious software
Author: Sikorski, Michael
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Malware (Computer software) ► Computer viruses ► Debugging in computer science ► Computer security
Classification :
005
S279p


196. Practical malware analysis : the hands-on guide to dissecting malicious software
Author: Sikorski, Michael
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Malware (Computer software) ► Computer viruses ► Debugging in computer science ► Computer security
Classification :
005
S279p


197. Preventing ransomware :
Author: Abhijit Mohanta, Mounir Hahad, Kumaraguru Velmurugan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Computer crimes.,Computer networks-- Security measures.,Computer security.,Malware (Computer software),Coding theory & cryptology.,Computer crimes-- Prevention.,Computer crimes.,Computer networks-- Security measures.,Computer security.,Computer security.,Computer viruses, Trojans & worms.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Viruses & Malware.,Data encryption.,Malware (Computer software)
Classification :
QA76
.
9
.
A25
M64
2018


198. Protocol :
Author: Alexander R. Galloway.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network protocols.,Computer networks-- Management.,Computer networks-- Security measures.,Electronic data processing-- Distributed processing.,Protocoles de réseaux d'ordinateurs.,Réseaux d'ordinateurs-- Gestion.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Traitement réparti.,Beheersing.,Computer network protocols.,Computer network protocols.,Computer networks-- Management.,Computer networks-- Management.,Computer networks-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Culturele aspecten.,Electrical & Computer Engineering.,Electronic data processing-- Distributed processing.,Electronic data processing-- Distributed processing.,Engineering & Applied Sciences.,Programmeertalen.,Protocollen (informatica),Telecommunications.
Classification :
TK5105
.
59
.
G35
2004


199. Rice Genetics II :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Rice-- Genetics, Congresses.,Arroz (congressos),Rice-- Genetics.,TECHNOLOGY & ENGINEERING-- Agriculture-- Agronomy-- Crop Science.
Classification :
SB191
.
R5
I45
1990eb


200. Robert Slade's guide to computer viruses
Author:
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computer viruses
Classification :
005
.
8
R639
1996
20

