1. Advances in intelligence and security informatics
Author: Wenji Mao, Fei-Yue Wang
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,National security
Classification :
QA76
.
9
.
A25
M36
2012


2. Big data, emerging technologies and intelligence
Author: / Miah Hammond-Errey.,Hammond-Errey, Miah,
Library: Library of College of Science University of Tehran (Tehran)
Subject: Intelligence service,National security,Cyber intelligence (Computer security),Electronic surveillance,Big data.,Australia.,Australia.,Australia.,Australia.

3. Conquest in cyberspac
Author: / Martin C. Libicki
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Information warfare.,National security.,Cyberterrorism.,Computer networks--Security measures
Classification :
U
,
163
,.
L534
,
2007
,
WEB


4. Conquest in cyberspace :national security and information warfare
Author: Libicki, Martin C.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Information warfare,، National security,، Cyberterrorism,Security measures ، Computer networks
Classification :
U
163
.
L534
2007


5. Critical issues facing the Middle East :
Author: edited by James A. Russell.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer network resources.,National security-- Middle East.,Computer network resources.,Economic history.,HISTORY-- Military-- Other.,Military readiness.,National security.,Politics and government,TECHNOLOGY & ENGINEERING-- Military Science.,Middle East, Defenses.,Middle East, Economic conditions, 21st century.,Middle East, Politics and government, 21st century.,Middle East., 0, 0, 0, 7
Classification :
UA832
.
C75
2006eb


6. Cyber attacks :
Author: Edward Amoroso.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- United States.,Cyberterrorism-- United States-- Prevention.,National security-- United States.,Computer security.,Cyberterrorism-- Prevention.,National security.,POLITICAL SCIENCE-- Political Freedom & Security-- Terrorism.,United States., 7
Classification :
HV6773
.
2
.
A47
2011


7. Developments and advances in defense and security :
Author: editors, Álvaro Rocha and Robson Pacheo Pereira.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Military policy, Congresses.,National security, Congresses.,Computer security.,HISTORY / Military / Other.,Military policy.,National security.,TECHNOLOGY & ENGINEERING / Military Science.
Classification :
UA10
.
5


8. Developments and advances in defense and security :
Author: Álvaro Rocha, Teresa Guarda, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Military policy, Congresses.,National security, Congresses.,Artificial intelligence.,Computer security.,HISTORY-- Military-- Other.,Military policy.,National security.,TECHNOLOGY & ENGINEERING-- Military Science.
Classification :
UA10
.
5


9. Digital defense: a cybersecurity primer
Author: Pelton, Joseph N.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Computer security,، National security
Classification :
QA
76
.
9
.
A25
P45
2015


10. Intelligence and security informatics
Author: / Christopher C. Yang ... [et al.] (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Expert systems (Computer science)--United States--Congresses,Computer security--United States--Congresses,National security--United States--Congresses,Computer crimes--Investigation--Congresses
Classification :
QA
,
76
.
76
,.
E95
,
I86
,
2008


11. Intelligence and security informatics
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Expert systems (Computer science) ; United States ; Congresses. ; Computer security ; United States ; Congresses. ; National security ; United States ; Congresses. ; Computer crimes ; Investigation ; Congresses. ;

12. Intelligence and security informatics : IEEE International Conference on Intelligence and Security Informatics, ISI 2005, Atlanta, Ga, USA, May 19-20, 2005 : proceedings
Author: Paul Kantor... ]et al.[ )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Expert systems )Computer science(,Congresses ، Data mining,Congresses ، Computer security,Congresses ، National security
Classification :
QA
76
.
L28
Vol
.
3495


13. Intelligence and security informatics for international security
Author: Hsinchun Chen.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data mining.,Expert systems (Computer science),National security.,Security, International.

14. Invisible threats :
Author: ed. by Umberto Gori and Ivo Paparela
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Economic aspects,Computer crimes-- Political aspects,National security
Classification :
HV6773
.
I58
2006


15. Protecting persons while protecting the peopl
Author: / Cecilia S. Gal, Paul B. Kantor, Michael E. Lesk, (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,National security--Congresses,Privacy, Right of--Congresses,Information society--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
A554
,
2008


16. Protecting persons while protecting the people
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ; National security ; Congresses. ; Privacy, Right of ; Congresses. ; Information society ; Congresses. ; Internet ; Privatsph?re ; Anonymit?t ; Identit?tsverwaltung ; Computersicherheit ; Datensicherung. ; Netzwerkverwaltu

17. پیشگیری از جرایم سایبری علیه امنیت ملی در ایران
Author: / تالیف محمد شکری.,شکری
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: جرایم کامپیوتری,Computer crimes,فضای مجازی,Cyberspace,امنیت ملی ,National security, -- پیشگیری, -- Prevention, -- تدابیر ایمنی, -- Security measures,-- ایران,-- Iran,-- ایران,-- Iran,-- ایران ,-- Iran,a01,a01,a03,a03,a02,a02
Classification :
HV
۶۷۷۳
/
ش
۸
پ
۹ ۱۳۹۹


18. تبلیغ علیه نظام جمهوری اسلامی ایران در فضای مجازی
Author: / تالیف حسن بیگدلی.,بیگدلی
Library: Criminal Science and Criminology Research Institute library (Tehran)
Subject: حقوق جزا ,Criminal law,تبلیغات ضد اسلامی,Propaganda, Anti-Islamic,امنیت ملی ,National security,جرایم کامپیوتری,Computer crimes,اسلامستیزی در رسانههای گروهی,Islamophobia in mass media,فضای مجازی,Cyberspace,جرایم علیه امنیت عمومی,Offenses against public safety,-- قوانین و مقررات ,-- Law and legislation, -- قوانین و مقررات, -- Law and legislation, -- جنبههای حقوقی, -- Legal aspects, -- ایران , -- Iran, -- ایران, -- Iran,-- ایران ,-- Iran,-- ایران,-- Iran, -- ایران, -- Iran, -- ایران, -- Iran,a04,a04,a01,a01,a02,a02,a07,a07,a03,a03,a06,a06,a08,a08
Classification :
KMH3800
.
B5T3
1399


19. تبلیغ علیه نظام جمهوری اسلامی ایران در فضای مجازی
Author: / تالیف حسن بیگدلی.,بیگدلی
Library: Faculty of Law and Political Sciences (Tehran)
Subject: حقوق جزا ,Criminal law,تبلیغات ضد اسلامی,Propaganda, Anti-Islamic,امنیت ملی ,National security,جرایم کامپیوتری,Computer crimes,اسلامستیزی در رسانههای گروهی,Islamophobia in mass media,فضای مجازی,Cyberspace,جرایم علیه امنیت عمومی,Offenses against public safety,-- قوانین و مقررات ,-- Law and legislation, -- قوانین و مقررات, -- Law and legislation, -- جنبههای حقوقی, -- Legal aspects, -- ایران , -- Iran, -- ایران, -- Iran,-- ایران ,-- Iran,-- ایران,-- Iran, -- ایران, -- Iran, -- ایران, -- Iran,a04,a04,a01,a01,a02,a02,a07,a07,a03,a03,a06,a06,a08,a08
Classification :
KMH3800
.
B5T3


20. جرائم نوظهور علیه امنیت ملی (قتل هدفمند، بیوتروریسم و جرایم سایبری)
Author: / تالیف محمد صدریارحامی، مهدی حقیقیان,صدری ارحامی
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: امنیت ملی ,National security,ترور دولتی,Targeted killing,تروریسم میکربی,Bioterrorism,جرایم کامپیوتری,Computer crimes,-- ایران ,-- Iran,a01,a01,a03,a03,a02,a02,a04,a04
Classification :
DSR
۱۶۵۲
/
ص
۴
ج
۴ ۱۳۹۸

