1. Effective Risk Management Strategies for Information Technology Project Managers
Author: Sarr, Amath
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business administration
2. Effective Risk Management Strategies for Information Technology Project Managers
Author: Sarr, Amath
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business administration
3. Information technology risk management and compliance in modern organizations.
Author: / Manish Gupta...[et al.]
Library: Central library of medical university of Isfahan (Esfahan)
Subject: Business enterprises-- Computer networks-- Security measures. , Information technology-- Security measures. , Data protection, Computer security, Risk management.
Classification :
HF5548
.
37
.
I5
2018
4. Information technology risk management in enterprise environments
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Business enterprises ; Computer networks ; Security measures. ; Information technology ; Security measures. ; Data protection. ; Computer security. ; Risk management. ;
5. Information technology risk management in enterprise environments :
Author: Jake Kouns, Daniel Minoli.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.,Risk management.
6. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Ilam University Central Library (Ilam)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K68
2010
7. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K68
2010
8. Information technology risk management in enterprise environments
پدیدآورنده : Jake Kouns, Daniel Minoli
موضوع : Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer Security,Risk Management
۲ نسخه از این کتاب در ۲ کتابخانه موجود است.
9. Information technology risk management in enterprise environments
Author: Kouns, Jake.
Library: Library of Farabi Campus of Tehran University (Qom)
Subject:
Classification :
HF
5548
.
37
.
K68
2010
10. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Business enterprises--Computer networks--Security measures,Information technology--Security measures,Data protection.,Computer security.,Risk management.
Classification :
HF
,
5548
.
37
,.
K68
,
2010
11. Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams
Author: / Jake Kouns, Daniel Minoli
Library: Insurance Research Institute Library (Tehran)
Subject: Business enterprises --Computer networks --Security measures,Information technology --Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K6I5
2010
12. Information technology risk management in enterprise environments :risk management teams>
Author: Kouns, Jake.,Jake Kouns, Daniel Minoli
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Business enterprises, Computer networks, Security measures,، Information technology, Security measures,، Data protection,، Computer security,، Risk management
Classification :
HF
5548
.
37
.
K68
2010
13. Information technology security and risk management
Author: Slay, Jill
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Data protection,، Risk management
Classification :
QA
76
.
9
.
A25S58
2006
14. Information technology security & risk management
Author: Slay, Jill
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,، Data protection,، Risk assessment
Classification :
QA
76
.
9
.
A25
S63
2006
15. Information technology security & risk management
Author: Slay, Jill
Library: Central Library and Documentation Center (Kerman)
Subject: ، Computer security,، Data protection,Security measures ، Information technology
Classification :
QA
76
.
9
.
S3
I55
2006
16. Information technology security & risk management
Author: / Jill Slay , Andy Koronios,اسلای,Slay
Library: National Library and Archives of Islamic Republic of Iran (Tehran)
Subject: کامپیوترها, -- ایمنی اطلاعات
Classification :
QA
۷۶
/
۹
/
الف
۹
الف
۵ ۱۳۸۵
17. Information technology security & risk management
Author: Slay, Jill
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer security,، Data protection,، Risk assessment
Classification :
QA
76
.
9
.
A25
.
S585
2006
18. Information technology security & risk management
Author: Slay, Jill
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Management ، Information technology,، Management information systems,، Risk management,Security measures ، Information technology
Classification :
HD
30
.
2
.
S52
2006
19. Information technology - security techniques - information security risk management =
Author: ISO ; IEC.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Datensicherung.
20. Risk management guide for information technology systems
Author: / gary stoneburner, alice goguen, alexis feringa
Library: Insurance Research Institute Library (Tehran)
Subject: risk management,technology
Classification :
HD61
.
S7R5