1. Breaking through technical jargon
Author: / Mark S. Merkow,Merkow
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computers science -- Acronyms,Automation -- Acronyms
Classification :
QA
76
.
15
.
M47
1990
R


2. Breaking through technical jargon : a dictionary of computer and automation acronyms
Author: Mark S. Merkow,Title
Library: Central Library of Imam Khomeini International University of Qazvin (Qazvin)
Subject: Computer science - Acronyms,Automation - Acronyms
Classification :
QA
.
M47
76
.
15
1990


3. Information security
Author: / Mark S. Merkow, Jim Breithaupt
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Computer security.
Classification :
QA
76
.
9
.
A25M485
2006


4. Information security :principles and practices
Author: Merkow, Mark S.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security
Classification :
QA
76
.
9
.
A25
M485
2006


5. Principles of information security: principles and practices
Author: Merkow, Mark S.
Library: (Semnan)
Subject: ، Computer security
Classification :
QA
76
.
9
.
M4P7


6. Secure and Resilient Software: Requirements, Test Cases, and Testing Methods
Author: / Merkow, Mark S.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: COMPUTER SCIENCE, INFORMATION TECHNOLOGY|COMPUTER SCIENCE, SOFTWARE ENGINEERING
Classification :
E-BOOK

7. Secure and resilient software :
Author: Mark S. Merkow, Lakshmikanth Raghavan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Application software-- Development.,Computer security.,Computer software-- Reliability.,Computer software-- Testing.

8. The E-Privacy imperative
Author: / Mark S. Merkow, James Breithaupt
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Electronic commerce,Electronic commerce- Security measures,Business enterprises- Computer networks- Security measures,Privacy, Right of
Classification :
HF5548
.
32
.
M47
2002


9. The E-Privacy imperative
Author: / Mark S. Merkow, James Breithaupt
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Electronic commerce,Electronic commerce- Security measures,Business enterprises- Computer networks- Security measures,Privacy, Right of
Classification :
HF5548
.
32
.
M47
2002


10. The E-Privacy imperative protect your customers' Internet privacy and ensure your company's survival in the electronic age
پدیدآورنده : Merkow, Mark S.,Mark S. Merkow, James Breithaupt
موضوع : ، Electronic commerce,، Electronic commerce- Security measures,، Business enterprises- Computer networks- Security measures,، Privacy, Right of
۲ نسخه از این کتاب در ۲ کتابخانه موجود است.
11. The compelet guide to Internet security
Author: /Mark S. Merkow and James Breithaupt.
Library: National Library and Archives of Islamic Republic of Iran (Tehran)
Subject: اینترنت-- اقدامات تامینی.,کامپیوترها-- ایمنی اطلاعات.
Classification :
TK
۵۱۰۵
/
۸۷۵
/
الف
۹
م
۴ ۱۳۷۹

12. The complete guide to Internet security
Author: / Mark S. Merkow & James Breithaupt
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Internet,Computer security,-- Security measures
Classification :
005
.
8
M564C
2000


13. The complete guide to Internet security
Author: Merkow, Mark S.
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Internet-- Security measures,، Computer security
Classification :
TK
5105
.
875
.
I57
.
M465
2000


14. The complete guide to internet security
Author: / Mark S. Merkow and James Breithoupt
Library: Tehran University, technical faculty libraries 1 (Tehran)
Subject: Internet (Computer network)-Security measures,Computer Security
Classification :
TK
5105
.
875
.
I57M465
2000

