81. Information systems security and privacy :
المؤلف: edited by Paolo Mori, Steven Furnell, Olivier Camp.
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Data encryption (Computer science),Data protection.
رده :
QA76
.
9
.
A25


82. Information technology risk management and compliance in modern organizations.
المؤلف: / Manish Gupta...[et al.]
المکتبة: المكتبة المركزية لجامعة الطب في أصفهان (أصبهان)
موضوع: Business enterprises-- Computer networks-- Security measures. , Information technology-- Security measures. , Data protection, Computer security, Risk management.
رده :
HF5548
.
37
.
I5
2018


83. Information technology risk management in enterprise environments
المؤلف:
المکتبة: كتابخانه مركزي و مركز اسناد دانشگاه مازندران (مازندران)
موضوع: Business enterprises ; Computer networks ; Security measures. ; Information technology ; Security measures. ; Data protection. ; Computer security. ; Risk management. ;

84. Information technology risk management in enterprise environments :
المؤلف: Jake Kouns, Daniel Minoli.
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.,Risk management.

85. Information technology risk management in enterprise environments
المؤلف: / Jake Kouns, Daniel Minoli
المکتبة: المكتبة المركزية لجامعة إيلام (إیلام)
موضوع: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
رده :
HF5548
.
37
.
K68
2010


86. Information technology risk management in enterprise environments
المؤلف: / Jake Kouns, Daniel Minoli
المکتبة: كتابخانه مركزي و مركز اسناد دانشگاه تهران (طهران)
موضوع: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
رده :
HF5548
.
37
.
K68
2010


87. Information technology risk management in enterprise environments
المؤلف: Jake Kouns, Daniel Minoli
المکتبة: کتابخانه دانشکده مدیریت دانشگاه تهران (طهران)
موضوع: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer Security,Risk Management

88. Information technology risk management in enterprise environments
المؤلف: / Jake Kouns, Daniel Minoli
المکتبة: كتابخانه مركزي و مركز اسناد دانشگاه شهيد چمران (خوزستان)
موضوع: Business enterprises--Computer networks--Security measures,Information technology--Security measures,Data protection.,Computer security.,Risk management.
رده :
HF
,
5548
.
37
,.
K68
,
2010


89. Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams
المؤلف: / Jake Kouns, Daniel Minoli
المکتبة: مكتبة معهد بحوث التأمين (طهران)
موضوع: Business enterprises --Computer networks --Security measures,Information technology --Security measures,Data protection,Computer security,Risk management
رده :
HF5548
.
37
.
K6I5
2010


90. Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
المؤلف: Kouns, Jake.,Jake Kouns, Daniel Minoli
المکتبة: كتابخانه و مركز اسناد دانشگاه كردستان (کردستان)
موضوع: ، Business enterprises, Computer networks, Security measures,، Information technology, Security measures,، Data protection,، Computer security,، Risk management
رده :
HF
5548
.
37
.
K68
2010


91. Instant Netcat starter
المؤلف: K.C. Yerrid
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer networks-- Security measures,Data protection,TCP/IP (Computer network protocol)
رده :
TK5105
.
59
.
Y47
2013


92. International CIIP handbook 2006 :
المؤلف: Isabelle Abele-Wigert and Myriam Dunn ; series editors, Andreas Wenger and Victor Mauer.
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer networks-- Security measures-- Government policy.,Data protection-- Government policy.,Information policy.,Information superhighway-- Government policy.,National security.,Security, International.,Computer networks-- Security measures-- Government policy.,Data protection-- Government policy.,Information policy.,Information superhighway-- Government policy.,National security.,Security, International.

93. Introduction to computer and network security :
المؤلف: Richard R. Brooks, Clemson University, South Carolina, USA
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer networks-- Security measures,Computer security,Data encryption (Computer science),Data protection
رده :
QA76
.
9
.
A25
B7745
2014


94. Introduction to hardware security and trust
المؤلف: Mohammad Tehranipoor
المکتبة: کتابخانه مرکزی دانشگاه صنعتی همدان (همدان)
موضوع: ، Computer security,، Computer input-output equipment,، Data protection,Security measures ، Computer networks,Security measures ، Information technology,، Computer input-output equipment,Security measures ، Computer networks
رده :
QA
76
.
9
.
I58


95. Kali Linux Cookbook - Second Edition.
المؤلف:
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Kali Linux.,Kali Linux.,Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security)
رده :
QA76
.
9
.
A25
.
S385
2017eb


96. LAN times guide to security and data integrity
المؤلف: / Marc Farley, Tom Stearns, and Jeffrey Hsu
المکتبة: كتابخانه مركزي و مركز اسناد دانشگاه شهيد چمران (خوزستان)
موضوع: Local area networks (Computer networks)- Security measures,Computer security,Data protection
رده :
TK5105
.
59
.
F37
1996


97. LAN times guide to security and data integrity
المؤلف: Farley, Marc.
المکتبة: (طهران)
موضوع: Local area networks )Computer networks( - Security measures , Computer security , Data protection
رده :
TK
5105
.
59
.
F37
1996


98. Mastering network security /
المؤلف: Chris Brenton
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer networks-- Security measures,Computer security,Data protection
رده :
QA76
.
9
.
A25
B757
1998


99. Metasploit Penetration Testing Cookbook :
المؤلف:
المکتبة: کتابخانه مطالعات اسلامی به زبان های اروپایی (قم)
موضوع: Computer networks-- Security measures.,Computer security-- Management.,Computers-- Access control.,Data protection.,Information technology-- Security measures.,Computer networking & communications.,Computer networks-- Security measures.,Computer security-- Management.,Computer security.,Computers-- Access control.,Computers-- Networking-- Security.,Computers-- Security-- General.,Computers-- System Administration-- General.,Data protection.,Information technology-- Security measures.,Network security.
رده :
QA76
.
9
.
A25
.
T459
2018eb


100. Netcat power tool
المؤلف: / Jan Kanclirz Jr., technical editor
المکتبة: كتابخانه مركزي و مركز اسناد دانشگاه شهيد چمران (خوزستان)
موضوع: Data protection.,Computer networks--Security measures,TCP/IP (Computer network protocol)
رده :
TK
,
5105
.
59
,.
N335
,
2008eb

