61. BL
Author: Seán Duffy, editor ; associate editors, Ailbhe MacShamhráin, James Moynes.
Library: Library of Islamic Parliament (Tehran)
Subject:

62. BL
پدیدآورنده : edited by Thomas J. Biersteker and Sue E. Eckert.
موضوع :
۲ نسخه از این کتاب در ۱ کتابخانه موجود است.
64. BL,Archives and archivists : key collaborators in the digital lbirary / William E. Landis, Robin L. Chandler -- Committing to memory : a project to publish and preserve California local history digital resources / Adrian L. Turner -- Technologically enhanced archival collections : using the buddy system / Dayna Holz -- California cultures : implementing a model for virtual collections / Genie Guerard, Robin L. Chandler -- The importance of user-centered design : exploring findings and methods / Rosalie Lack -- How and why of user studies : RLG's RedLightGreen as a case study / Merrilee Proffitt -- From horse-drawn wagon to hot rod : the University of California's digital image service experience / Maureen A. Burns -- Archiving web sites for preservation and access : MODS, METS and MINERVA / Rebecca Guenther, Leslie Myrick -- Video preservation and digital reformatting : pain and possibility / Jerome McDonough, Mona Jimenez -- Digital archiving and preservation : technologies and processes for a trusted repository / Ronald Jantz, Michael Giarlo -- The complexities of digital resources : collection boundaries and management responsibilities / Joan
Author: Philip Mattar, editor in chief. ,William E. Landis, Robin L. Chandler, editors.
Library: Library of Islamic Parliament (Tehran)
Subject:

65. BL,BL
Author: / Marshall G.S. Hodgson. ,20090530 0
Library: Library of Islamic Parliament (Tehran)
Subject:

66. Cold war history
Author: edited by Frédéric Bozo ... [ et al.].
Library: Library of Islamic Parliament (Tehran)
Subject:

67. Disaster recovery : principles and practices
Author: April J. Wells...]et al.[
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Handbooks, manuals, etc ، Emergency management,Handbooks, manuals, etc ، Crisis management,Handbooks, manuals, etc ، Computer security,Handbooks, manuals, etc ، Data protection,Planning -- Handbooks, manuals, etc ، Data recovery )Computer science(,Handbooks, manuals, etc ، Business planning
Classification :
HD
49
.
D57


68. Disaster recovery: principles and practices
Author: Wells, April J.
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Handbooks, manuals, etc ، Emergency management,Handbooks, manuals, etc ، Crisis management,Handbooks, manuals, etc ، Computer security,Handbooks, manuals, etc ، Data protection,Handbooks, manuals, etc ، Data recovery )Computer science(-- Planning,Handbooks, manuals, etc ، Business planning
Classification :
HD
49
.
W46
2006


69. Handbook of computer networks and cyber security
Author: Brij B. Gupta, Gregorio Martinez Perez, Dharma P. Agrawal, Deepak Gupta, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Computer networks.,Computer security.
Classification :
TK5105
.
5


70. Handbook of information security management
Author: Micki Krause, Harold F. Tipton, editors
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Handbooks, manuals, etc ، Computer security,Handbooks, manuals, etc ، Data protection
Classification :
QA
76
.
9
.
A25
H36
1999


71. Handbook of information security management
Author: / Micki Krause, Harold F. Tipton, editors
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security- Management- Handbooks, manuals, etc,Data protection- Handbooks, manuals, etc
Classification :
QA76
.
9
.
A25
,
H36
1998


72. Handbook of information security management
Author: / Micki Krause, Harold F. Tipton, editors
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security- Management- Handbooks, manuals, etc,Data protection- Handbooks, manuals, etc
Classification :
QA76
.
9
.
A25
,
H36
1998


73. How do rogue nations threaten human rights? -- North Korea represses freedom / Kay Seok -- Iran violates women's rights / Sam Brownback -- Sudanese government engages in genocide / Human Rights Watch -- United States violates human rights worldwide / Vernon Coleman -- Rogue nations undermine the United Nations' mission to promote human rights / Joseph Loconte -- U.S. invasions have not spread democracy in the Middle East / Phyllis Bennis -- How should the global community respond to rogue nations? -- Preemptive force is sometimes necessary to contain rogue nations / National Review -- Preemptive force threatens efforts to contain rogue states / Ivan Eland -- Missile defense system is necessary to protect against rogue nations / Dennis Ross -- Missile defense system is unnecessary / Gwynne Dyer -- Promoting globalization will reduce the threat posed by rogue states / Banning N. Garrett, Dennis M. Sherman -- Globalization
Author: Louise Gerdes, book editor.
Library: Library of Islamic Parliament (Tehran)
Subject:

74. Includes bibliographical references and index. 0
Author: Seán Duffy, editor ; associate editors, Ailbhe MacShamhráin, James Moynes.
Library: Library of Islamic Parliament (Tehran)
Subject:

75. Includes bibliographical references (p. 49-51). 0,B
Author: Zeren Tanındı. ,/ Katie Normington.
Library: Library of Islamic Parliament (Tehran)
Subject:

76. Includes bibliographical references (p. 375) and index. 0
Author: Brian M. Fagan.
Library: Library of Islamic Parliament (Tehran)
Subject:

77. Includes bibliographical references (p. 225-231) and index. 0
Author: Andrew Green.
Library: Library of Islamic Parliament (Tehran)
Subject:

78. Information Security Management Handbook
Author: / Harold F Tipton, Micki Krause
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Management -- Handbooks, manuals, etc,Data protection -- Handbooks, manuals, etc,کامپیوترها - ایمنی اطلاعات - مدیریت - دستنامهها,حفاظت اطلاعات - دستنامهها
Classification :
QA76
,.
9
.
T5
2003


79. Information security management handbook
Author: Micki Krause, Harold F. Tipton, editors
Library: Central Library and Documentation Center (Kerman)
Subject: Management - Handbooks, manuals, etc. ، Computer security,Handbooks, manuals, etc. ، Data protection
Classification :
QA
76
.
9
.
A25
H36
2000

