81. Computer viruses: what they are, how they work, and how to avoid them
Author: / by Jonathan L. Mayo,Reprint of 1989 ed., pub.by windcrest books, New York.
Library: National Library and Archives of Islamic Republic of Iran (Tehran)
Subject: Computer viruses
Classification :
QA76
.
76
.
C68M33


82. Computer viruses :what they are, how they work, how to avoid them
Author: Mayo, Jonathan L.
Library: Library of Mofid University (Qom)
Subject:
Classification :
QA
75
.
5
.
M3
C6
1989


83. Computer viruses : what they are, how they work, how to avoid them
Author: Mayo, Jonathan L.
Library: Central library and information center (Khorasan Razavi)
Subject: ، Computer viruses
Classification :
QA
76
.
76
.
C68
M33
1990


84. Computer viruses: what they are, how they work, how to avoid them
Author: Mayo, Jonathan L.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Computer viruses
Classification :
QA
76
.
76
.
C68
M33


85. Computer viruses : what they are, how they work, how to avoid them
Author: Mayo, Jonathan L.
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer viruses
Classification :
QA
76
.
76
.
C68
.
M33
1989


86. Computer viruses : what they are, how they work, how to avoid them
Author: Mayo, Jonathan L.
Library: Library of Niroo Research Institue (Tehran)
Subject: ، Computer viruses
Classification :
QA
76
.
76
.
C68M33
1989


87. Computer viruses, worms, data diddlers, killer programs, and other threats to your system :
Author: John McAfee and Colin Haynes ; foreword by John C. Dvorak.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer viruses.,Computer viruses.,Computervirus,Virus informatiques.
Classification :
QA76
.
76
.
C68
M38
1989


88. Computers under attack :
Author: /edited by Peter J. Denning.
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer security.,Computer viruses.
Classification :
QA76
.
9
.
A25
C6
1990


89. Computers under attack
Author: / Peter J. denning, editor
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computers -- Access control,Computer viruses
Classification :
QA
76
.
9
.
A25C667
1990


90. Computers under attack; intruders, werms and viruses
Author:
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computers- Access control ► Computer viruses
Classification :
006
C738


91. Computers under attack; intruders, werms and viruses
Author:
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computers- Access control ► Computer viruses
Classification :
006
C738


92. Computers under attack : intruders, worms, and viruses
Author: edited by Peter J. Denning
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer security , Computer viruses
Classification :
QA
76
.
9
.
A25
C667
1990


93. Computers under attack : intruders, worms, and viruses
Author: edited by Peter J. Denning
Library: Library of Niroo Research Institue (Tehran)
Subject: ، Computer security,، Computer viruses
Classification :
QA
76
.
9
.
A25C667
1990


94. Computerviren und ihre Vermeidung :
Author: von Howard Fuhs.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.
Classification :
QA76
.
9
.
A25
V664
1993


95. Configuring Symantec Antivirus, Corporate Editio
Author: / Laura E. Hunter ... [et al.]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer viruses.,Computer security.,Computer networks--Security measures
Classification :
QA
,
76
.
76
,.
C68
,
C66
,
2003eb


96. Configuring Symantec Antivirus, Corporate Edition
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer viruses. ; Computer security. ; Computer networks ; Security measures. ;

97. Configuring Symantec Antivirus, Corporate Edition
Author: Laura E. Hunter ... [et al.] ; Robert J. Shimonski, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer viruses.

98. Conflicting models for the origin of life
Author: / edited by Stoyan K. Smoukov, Joseph Seckbach, Richard Gordon.
Library: Library of College of Science University of Tehran (Tehran)
Subject: Life (Biology),a04

99. Cryptography and network security :
Author: William Stallings.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Coding theory.,Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Chiffrement (Informatique),Cryptographie à clé publique.,Cryptographie-- Réseaux d'ordinateurs.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Coding theory.,Computer networks-- Security measures.,Computer security.,Computersicherheit,Data encryption (Computer science),Internet,Internet.,Kryptologie,Rechnernetz
Classification :
TK5105
.
59
.
S713
2006


100. Cuckoo malware analysis
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer viruses,Malware (Computer software)
Classification :
QA76
.
76
.
C68
.
O483
2013

