61. Security, privacy and trust in cloud systems
Author: Nepal , Surya,Surya Nepal; Mukaddim Pathan
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: Security measures ، Cloud computing,Security measures ، Computer networks,، Computer security
Classification :
QA

62. The art of enterprise information architecture
Author:
Library: Library of Farabi Campus of Tehran University (Qom)
Subject:
Classification :
HD
30
.
2
.
A77
2010


63. The art of enterprise information architecture :
Author: Mario Godinez [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Information technology-- Management.,Information technology-- Security measures.,Management information systems.,Business & Economics.,Business enterprises-- Computer networks-- Security measures.,Business enterprises-- Computer networks-- Security measures.,Computer Science.,Engineering & Applied Sciences.,Information technology-- Management.,Information technology-- Management.,Information technology-- Security measures.,Information technology-- Security measures.,Management information systems.,Management information systems.,Management Theory.,Management.
Classification :
HD30
.
2
.
A77
2010


64. The second economy :
Author: Steve Grobman, Allison Cerra ; foreword by Christopher Young
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Internet-- Security measures.
Classification :
QA76
.
9
.
A25


65. Trusted computing and information security :
Author: Huanguo Zhang, Bo Zhao, Fei Yan (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25


66. What every engineer should know about cyber security and digital forensics /
Author: Joanna F. DeFranco
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation,Computer networks-- Security measures,Computer security
Classification :
TK5105
.
59
.
D44
2014

