301. Information technology risk management in enterprise environments
المؤلف: / Jake Kouns, Daniel Minoli
المکتبة: كتابخانه مركزي و مركز اسناد دانشگاه شهيد چمران (خوزستان)
موضوع: Business enterprises--Computer networks--Security measures,Information technology--Security measures,Data protection.,Computer security.,Risk management.
رده :
HF
,
5548
.
37
,.
K68
,
2010


302. Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams
المؤلف: / Jake Kouns, Daniel Minoli
المکتبة: مكتبة معهد بحوث التأمين (طهران)
موضوع: Business enterprises --Computer networks --Security measures,Information technology --Security measures,Data protection,Computer security,Risk management
رده :
HF5548
.
37
.
K6I5
2010


303. Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
المؤلف: Kouns, Jake.,Jake Kouns, Daniel Minoli
المکتبة: كتابخانه و مركز اسناد دانشگاه كردستان (کردستان)
موضوع: ، Business enterprises, Computer networks, Security measures,، Information technology, Security measures,، Data protection,، Computer security,، Risk management
رده :
HF
5548
.
37
.
K68
2010


304. Information technology security and risk management
المؤلف: Slay, Jill
المکتبة: (طهران)
موضوع: ، Computer security,، Data protection,، Risk management
رده :
QA
76
.
9
.
A25S58
2006


305. Information technology security & risk management
المؤلف: Slay, Jill
المکتبة: کتابخانه مرکزی و مرکز اطلاع رسانی دانشگاه فردوسی مشهد (خراسان رضوی)
موضوع: ، Computer security,، Data protection,، Risk assessment
رده :
QA
76
.
9
.
A25
S63
2006


306. Information technology security & risk management
المؤلف: Slay, Jill
المکتبة: المکتبه المرکزيه ومرکز التوثیق بجامعة الشهید باهنر فی کرمان (کرمان)
موضوع: ، Computer security,، Data protection,Security measures ، Information technology
رده :
QA
76
.
9
.
S3
I55
2006


307. Information technology security and risk management
المؤلف: Slay, Jill
المکتبة: كتابخانه مركزی دانشگاه صنعتی شریف (طهران)
موضوع: ، Computer security,، Data protection,، Risk assessment
رده :
QA
76
.
9
.
A25
.
S585
2006


308. Information warfare
المؤلف: / Daniel Ventre
المکتبة: كتابخانه مركزي و مركز اسناد دانشگاه مازندران (مازندران)
موضوع: Business intelligence,Trade secrets,Information technology, Security measures,Computer security, Management,Data protection
رده :
HD38
.
7
.
V4713
2009


309. Information warfare
المؤلف: Daniel Ventre
المکتبة: کتابخانه دانشکده کارآفرینی دانشگاه تهران (طهران)
موضوع: Business intelligence,Trade secrets,Information technology -- Security measures,Computer security -- Management,Data protection
رده :
HD
38
.
7
.
V4713
2009


310. Intelligence computation and evolutionary computation :
المؤلف: Zhenyu Du (ed.).
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computational intelligence -- Congresses.,Evolutionary computation -- Congresses.,Intelligence informatique -- Congrès.

311. International Conference on Computer Networks and Communication Technologies :
المؤلف: S. Smys, Robert Bestak, Joy Iong-Zong Chen, Ivan Kotuliak, editors.
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer networks, Congresses.,Communications Engineering, Networks.,Information Systems Applications (incl. Internet).,Systems and Data Security.,Communications engineering-- telecommunications.,Computer networks.,Computer security.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Information retrieval.
رده :
TK5105
.
5


312. International Conference on Intelligent Computing and Applications :
المؤلف: M. Arun Bhaskar, Subhransu Sekhar Dash, Swagatam Das, Bijaya Ketan Panigrahi, editors.
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Artificial intelligence, Congresses.,Computer security, Congresses.,Computational Intelligence.,Data Mining and Knowledge Discovery.,Signal, Image and Speech Processing.,Artificial intelligence.,Artificial intelligence.,Computer security.,COMPUTERS / General.,Data mining.,Imaging systems & technology.
رده :
Q334


313. International arbi
المؤلف: edited by M.L. Hendrikse, N.H. Margetson, N.J. Margetson.
المکتبة: كتابخانه مجلس شوراي اسلامى (طهران)
موضوع:

314. Introducing TPCK / Matthew J. Koehler and Punya Mishra -- Bridging digital and cultural divides: TPCK for equity of access to technology / Mario Antonio Kelly -- TPCK in K-6 literacy education: it's not that elemen
المؤلف: edited by AACTE Committee on Innovation and Technology.
المکتبة: كتابخانه مجلس شوراي اسلامى (طهران)
موضوع:

315. Introduction to computer and network security :
المؤلف: Richard R. Brooks, Clemson University, South Carolina, USA
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer networks-- Security measures,Computer security,Data encryption (Computer science),Data protection
رده :
QA76
.
9
.
A25
B7745
2014


316. Introduction to e-commerce /
المؤلف: by Zheng Qin.
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Electronic commerce, Case studies.,Electronic commerce.,BUSINESS & ECONOMICS-- E-Commerce-- Auctions & Small Business.,BUSINESS & ECONOMICS-- E-Commerce-- Internet Marketing.,BUSINESS & ECONOMICS-- Mail Order.,BUSINESS & ECONOMICS-- Marketing-- Telemarketing.,COMPUTERS-- Electronic Commerce.,Electronic commerce.,Informatique.
رده :
HF5548
.
32


317. JZ6045,<The> hidden face of Eve :
المؤلف: by Lars Kirchhoff. ,William E. Landis, Robin L. Chandler, editors.
المکتبة: كتابخانه مجلس شوراي اسلامى (طهران)
موضوع:

318. Kali Linux Cookbook - Second Edition.
المؤلف:
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Kali Linux.,Kali Linux.,Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security)
رده :
QA76
.
9
.
A25
.
S385
2017eb


319. Machine learning for networking :
المؤلف: Éric Renault, Paul Mühlethaler, Selma Boumerdassi (eds.).
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Machine learning, Congresses.,Machine learning.
رده :
Q325
.
5


320. Make a shield from wisdom :
المؤلف: 20090507 0
المکتبة: كتابخانه مجلس شوراي اسلامى (طهران)
موضوع:
