521. The art of enterprise information architecture
المؤلف:
المکتبة: (قم)
موضوع:
رده :
HD
30
.
2
.
A77
2010
522. The art of enterprise information architecture :
المؤلف: Mario Godinez [and others].
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Business enterprises-- Computer networks-- Security measures.,Information technology-- Management.,Information technology-- Security measures.,Management information systems.,Business & Economics.,Business enterprises-- Computer networks-- Security measures.,Business enterprises-- Computer networks-- Security measures.,Computer Science.,Engineering & Applied Sciences.,Information technology-- Management.,Information technology-- Management.,Information technology-- Security measures.,Information technology-- Security measures.,Management information systems.,Management information systems.,Management Theory.,Management.
رده :
HD30
.
2
.
A77
2010
523. The art of enterprise information architecture. a systems-based approach for unlocking business insight
المؤلف: Mario Godinez ... ]et al.[
المکتبة: کتابخانه مرکز پژوهش متالورژی رازی (طهران)
موضوع: ، Information technology- Management,، Management information systems,، Business enterprises- Computer networks- Security measures,، Information technology- Security measures
رده :
HD
30
.
2
.
A77
2010
524. The basics of information security
المؤلف: Jason Andress.
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer networks-- Security measures.,Computer security.,Information resources management.
525. The basics of information security : understanding the fundamentals of InfoSec in theory and practice
المؤلف: Andress, Jason.
المکتبة: کتابخانه مرکز پژوهش متالورژی رازی (طهران)
موضوع: ، Computer security,Security measures ، Computer networks,، Information resources management
رده :
QA
76
.
9
.
A25
A5453
2011
526. The business case for network security
المؤلف: / Catherine Paquet, Warren Saxe
المکتبة: کتابخانه مرکزی و مرکز اطلاع رسانی دانشگاه محقق اردبیلی ره (أردبیل)
موضوع: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management
رده :
TK5105
.
59
.
P37
2005
527. The business case for network security
المؤلف: / Catherine Paquet, Warren Saxe
المکتبة: کتابخانه مرکزی و مرکز اطلاع رسانی دانشگاه محقق اردبیلی ره (أردبیل)
موضوع: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management
رده :
TK5105
.
59
.
P37
2005
528. The information systems security officer's guide :
المؤلف: Dr. Gerald L. Kovaich
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer networks-- Security measures,Computer security
529. The official (ISC)² CISSP CBK reference /
المؤلف: John Warsinkse ; with Mark Graff, Kevin Henry, Christopher Hoover, Ben Malisow, Sean Murphy, C. Paul Oakes, George Pajari, Jeff T. Parker, David Seidl, Mike Vasquez.
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Administrative agencies-- Information resources management-- Security measures-- United States-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations, Study guides.,Computers-- Access control-- Examinations, Study guides.,Telecommunications engineers-- Certification-- United States.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer networks-- Security measures-- Examinations.,Telecommunications engineers-- Certification.,United States., 7
رده :
TK5105
.
59
530. The roots of reading comprehension instruction / P. David Pearson -- The development of children's reading comprehension / Scott G. Paris and Ellen E. Hamilton -- In search of the "simple view" of reading comprehension / James V. Hoffman -- Identifying and describing constructively responsive comprehension strategies in new and traditional forms of reading / Peter Afflerbach and Byeong-Young Cho -- Helping readers make sense of print : research that supports a whole language pedagogy / Kenneth S. Goodman and Yetta M. Goodman -- The role of cognitive flexibility in reading comprehension : past, present, and future / Kelly B. Cartwright -- Ways of meaning making : sociocultural perspectives on reading comprehension / James Gavelek and Patrick Bresnahan -- Transactional theory and critical theory in reading comprehension / James S. Damico, Gerald Campano, and Jerome C. Harste -- Grounding reading comprehension in the neuroscience literatures / George G. Hruby -- Text comprehension : a retrospective, perspective, and prospective / Emily Fox and Patricia A. Alexander -- Disciplinary comprehension / Cynthia Shanahan -- The agency and artistry of meaning makers within and across digital spaces / Robert J. Tierney -- Comprehension and computer technology : past results, current knowledge, and future promises / Michael L. Kamil and Helen Kim Chou -- Motivation and reading comprehension / Samuel D. Miller and Beverly S. Faircloth -- Vocabulary and reading comprehension : the nexus of meaning / James F. Baumann -- Cognitive strategy instruction / Janice A. Dole, Jeffery D. Nokes, and Dina Drits -- Metacognitive processes and reading comprehension / Linda Baker and Lisa Carter Beall -- Self-regulated comprehension / Dixie D. Massey -- Formal and informal measures of reading comprehension / Lauren Leslie and Joanne Caldwell -- Assessing comprehension of young children / Katherine A. Dougherty Stahl -- Approaches to teaching reading comprehension / Taffy E. Raphael ... [et al.] -- Comprehension and discussion of text / Janice F. Almasi and Keli Garas-York -- Comprehension instruction in kindergarten through grade three / Cathy Collins Block and Jan Lacina -- Developing higher order comprehension in the middle grades / Ruth Wharton-McDonald and Shannon Swiger -- Improving adolescent comprehension : developing comprehension strategies in the content areas / Mark W. Conley -- Comprehension difficulties among struggling readers / Richard L. Allington and Ann McGill-Franzen -- Reading comprehension and diversity in historical perspective : literacy, power, and native Hawaiians / Kathryn H. Au and Julie Kaomea -- Culturally relevant pedagogy and reading comprehension / Colleen M. Fairbanks ... [et al.] -- Reading comprehension and English language learners / Kathryn Prater -- Family literacy and reading comprehension / Patricia A. Edwards and Jennifer D. Turner -- Improving comprehension instruction through quality professional development / Misty Sailors -- Public policy and the future of reading comprehension research / Cathy Roller -- Where to from here? : themes, trends, and questions / Gerald G. Duffy ... [et al.]. 0
المؤلف: edited by Susan E. Israel, Gerald G. Duffy.
المکتبة: كتابخانه مجلس شوراي اسلامى (طهران)
موضوع:
531. The state of the art in intrusion prevention and detection
المؤلف: edited by Al-Sakib Khan Pathan.
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer networks -- Security measures.,Computer security.,Computers -- Access control.
رده :
QA76
.
9
.
A25
E358
9999
532. The superpowers -- "The Arabs are coming!" -- "Jihad!" -- The co-opted caliphate and the stumbling Jihad -- The year 711 -- Picking up the pieces after Rome -- The myth of Poitiers -- The fall and rise of the Umayyads -- Saving the popes -- An empire of force and faith -- Carolingian Jihads: Roncesvalles and Saxony -- The great mosque -- The first Europe, briefly -- Equipoise--delicate and doomed -- Disequilibrium Pelayo's revenge -- Knowledge transmitted, rationa
المؤلف: David Levering Lewis.
المکتبة: كتابخانه مجلس شوراي اسلامى (طهران)
موضوع:
533. Toward a safer and more secure cyberspace /
المؤلف: Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors.
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer networks-- Security measures.,Computer security.,Cyberterrorism-- Prevention.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Cyberterrorism-- Prevention.
رده :
QA76
.
9
.
A25
T695
2007eb
534. Transactions on large-scale data- and knowledge-centered systems XXXVII /
المؤلف: edited by Abdelkader Hameurlain, Roland Wagner.
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data mining, Congresses.,Database management, Congresses.,Artificial intelligence.,Artificial intelligence.,Computer networks.,Computer science.,Computer security.,Computer security.,Computers-- Database Management-- Data Mining.,Computers-- Hardware-- Network Hardware.,Computers-- Intelligence (AI) & Semantics.,Computers-- Operating Systems-- General.,Computers-- Security-- General.,Computers-- Software Development & Engineering-- General.,Data mining.,Data mining.,Network hardware.,Operating systems (Computers),Operating systems.,Software engineering.,Software Engineering.
رده :
QA76
.
9
.
A25
535. Transactions on large-scale data- and knowledge-centered systems XXXVIII :
المؤلف: Abdelkader Hameurlain, Roland Wagner, Sven Hartmann, Hui Ma (eds.).
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data mining, Congresses.,Database management, Congresses.,Computer networks-- Security measures.,Computer security.,Data mining.,Database management.
رده :
QA76
.
9
.
A25
536. Transformational security awareness :
المؤلف: Perry Carpenter.
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer networks-- Security measures.,Computer security.,BUSINESS & ECONOMICS-- Production & Operations Management.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Operating Systems-- General.
رده :
QA76
.
9
.
A25
C37
2019eb
537. Transforming cybersecurity using COBIT 5
المؤلف: [by ISACA].
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Business enterprises -- Computer networks -- Security measures.,COBIT (Information technology management standard),Computer security.
538. Tribe of Hackers :
المؤلف: Marcus J. Carey & Jennifer Jin.
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,Computers.,Data protection.,Risk management.,Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Security-- Cryptography.,Computers.,Data protection.,Risk management.
رده :
HF5548
.
37
C37
2019eb
539. Tribe of hackers :
المؤلف: Marcus J, Carey and Jennifer Jin.
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,Data protection.,Risk management.,Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,Data protection.,Risk management.
540. Trust, Privacy and Security in Digital Business
المؤلف: \ Simone Fischer-Hübner, Costas Lambrinoudakis, Javier Lopez (eds.)
المکتبة: کتابخانه زبانهای خارجی و منابع اسلامی (قم)
موضوع: Business enterprises -- Computer networks -- Security measures -- Congresses.,Computer security -- Management -- Congresses.,شرکتهای اقتصادی -- شبکههای کامپیوتری -- تدابیر ایمنی -- کنگره ها, کامپیوترها -- ایمنی اطلاعات -- مدیریت -- کنگره ها
رده :
QA76
.
9
.
A25
T7
2015
E-Book
,