221. Scientific support for the decision making in the security sector /
Author: [edited by] Ognyan Kounchev ... [et al.]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Decision support systems, Congresses,Emergency management-- Data processing, Congresses,Military planning-- Decision making, Congresses,Multisensor data fusion, Congresses,National security-- Decision making, Congresses,National security-- Environmental aspects, Congresses
Classification :
UA10
.
5
.
N38
2007
222. Security and privacy of electronic healthcare records
Author: edited by Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Distributed databases.,Medical records-- Data processing.,Forms and Records Control-- methods.,Medical Records Systems, Computerized.,Computer security,data protection,Data protection,distributed databases,Distributed databases,electronic health records,Internet of Things,security of data
Classification :
R864
223. Security aspects in information technology :
Author: Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Information technology-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
I58
2011
224. Security, privacy, and anonymity in computation, communication, and storage :
Author: Guojun Wang, Jinjun Chen, Laurence T. Yang (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Computer security.,Data protection.
Classification :
QA76
.
9
.
A25
225. Security strategy
Author: / Bill Stackpole and Eric Oksendahl
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security.,Information technology--Security measures,Data protection.,Business--Data processing--Security measures
226. Security strategy
Author: Bill Stackpole and Eric Oksendahl
Library: Library and Information Center of Ayatollah Imani of Salman Farsi University (Fars)
Subject: Computer security,Information technology, Security measures,Data protection,Business, Data processing, Security measures
Classification :
QA
76
,.
9
.
S78S4
2011
227. Security strategy: <from requirements to reality>
Author: / Bill Stackpole and Eric Oksendahl
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computer security,Information technology,Data protection,Business,-- Security measures,-- Data processing -- Security measures
Classification :
005
.
8
S775S
2011
228. Security technology, disaster recovery and business continuit
Author: / Tai-hoon Kim ... [et al.], (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Congresses,Computer networks--Security measures--Congresses,Computer networks--Access control--Congresses,Data protection--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
S374
,
2010
229. Techniques and applications for advanced information privacy and securit
Author: / Hamid R. Nemati, [editor]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Information technology--Security measures,Electronic commerce--Security measures,Computer security.,Data protection.
Classification :
HF
,
5548
.
37
,.
T43
,
2009
230. Techniques and applications for advanced information privacy and security :
Author: Hamid R. Nemati, editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Electronic commerce-- Security measures.,Information technology-- Security measures.,Computer security.,Data protection.,Electronic commerce-- Security measures.,Information technology-- Security measures.
Classification :
HF5548
.
37
.
T43
2009
231. Techniques and applications for advanced information privacy and security : emerging organizational, ethical, and human issues
Author: ]edited by[ Hamid R. Nemati
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Security measures ، Electronic commerce,Security measures ، Information technology,، Computer security,، Data protection
Classification :
HF
5548
.
37
.
T43
2009
232. <The> Architecture of Privacy
Author: \ Courtney Bowman...[et.al] ; edited by Elissa Lerner.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Information technology-- Security measures.,Software engineering-- Security measures.,Computer security.,Data protection.,Privacy.,تکنولوژی اطلاعات -- تدابیر ایمنی ,مهندسی نرم افزار -- تدابیر ایمنی,امنیت کامپیوتر ,حفاظت دادهها
Classification :
QA
76
.
9
.
A7
2015
E-Book
,
233. The Executive guide to information security: threats, challenges, and solutions
Author: Mark Egan with Tim Mather
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection
Classification :
HF
،
5548
.
32
،.
E325
،
2005
234. The Role of Norms and Electronic Institutions in Multi-Agent Systems :
Author: by Javier Vázquez-Salceda.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject:
Classification :
QA76
.
76
.
I58
B953
2004
235. The chief information security officer
Author: Barry L. Kouns, Jake Kouns.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.
236. <The> economic impacts of terrorist attacks /
Author: edited by Harry W. Richardson, Peter
Library: Library of Islamic Parliament (Tehran)
Subject:
237. The executive MBA in information security
Author: / John J. Trinckes, Jr
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Data protection.,Computer security.,Information technology--Security measures
Classification :
HF5548
.
37
.
T75
2010
238. <The> executive guide to information Security:Threats,challenges,and solutions
Author: Mark Egan
Library: Library of Faculty of Management of Tehran University (Tehran)
Subject: Data protection.,Computer security.,Information technology-Security measures
239. Toward a safer and more secure cyberspace /
Author: Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Cyberterrorism-- Prevention.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Cyberterrorism-- Prevention.
Classification :
QA76
.
9
.
A25
T695
2007eb
240. Trust management VII :
Author: Carmen Fernández-Gago [and others] (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
C376
2013