1. Advances in enterprise information technology security /
Author: Djamel Khadraoui, Francine Herrmann [editors]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures,Computer security,Data protection,Information technology-- Security measures
Classification :
HF5548
.
37
.
A38
2007
2. Advances in enterprise information technology security
Author: Djamel Khadraoui, Francine Herrmann ]editors[
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Business enterprises , Computer networks , Security measures,، Information technology , Security measures,، Computer security,، Data protection
3. Enterprise information security and privacy /
Author: C. Warren Axelrod, Jennifer L. Bayuk, Daniel Schutzer, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.,BUSINESS & ECONOMICS-- Corporate Governance.,BUSINESS & ECONOMICS-- Leadership.,BUSINESS & ECONOMICS-- Organizational Development.,BUSINESS & ECONOMICS-- Workplace Culture.,Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.
Classification :
HF5548
.
37
.
E58
2009eb
4. Enterprise information security and privacy
Author: C. Warren Axelrod, Jennifer L. Bayuk, Daniel Schutzer, editors
Library: Library of Faculty of Management of Tehran University (Tehran)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Computer Security,Data protection
5. Information assurance architecture
Author: Keith D. WIllett
Library: Library of Faculty of Management of Tehran University (Tehran)
Subject: Computer Security,Computer networks, Security measures,Information resources management,Information technology, Management,Business enterprises, Communication systems, Management,Data protection
6. Information security a manager's guide to thwarting data thieves and hackers
Author: Alexander, Philip, 3691-,Philip Alexander
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Business enterprises , Computer networks , Security measures,، Information technology , Security measures,، Computer security,، Data protection
Classification :
HF
5548
.
37
.
A44
2008
7. Information security management metrics :a definitive guide to effective security monitoring and measurement
Author: Brotby, W. Krag.
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: Security measures ، Information technology,، Computer security,Computer networks Security measures ، Business enterprises,، Data protection
Classification :
HD
30
.
2
.
B78
2009
8. Information technology risk management and compliance in modern organizations.
Author: / Manish Gupta...[et al.]
Library: Central library of medical university of Isfahan (Esfahan)
Subject: Business enterprises-- Computer networks-- Security measures. , Information technology-- Security measures. , Data protection, Computer security, Risk management.
Classification :
HF5548
.
37
.
I5
2018
9. Information technology risk management in enterprise environments
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Business enterprises ; Computer networks ; Security measures. ; Information technology ; Security measures. ; Data protection. ; Computer security. ; Risk management. ;
10. Information technology risk management in enterprise environments :
Author: Jake Kouns, Daniel Minoli.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.,Risk management.
11. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Ilam University Central Library (Ilam)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K68
2010
12. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K68
2010
13. Information technology risk management in enterprise environments
Author: Jake Kouns, Daniel Minoli
Library: Library of Faculty of Management of Tehran University (Tehran)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer Security,Risk Management
14. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Business enterprises--Computer networks--Security measures,Information technology--Security measures,Data protection.,Computer security.,Risk management.
Classification :
HF
,
5548
.
37
,.
K68
,
2010
15. Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams
Author: / Jake Kouns, Daniel Minoli
Library: Insurance Research Institute Library (Tehran)
Subject: Business enterprises --Computer networks --Security measures,Information technology --Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K6I5
2010
16. Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
Author: Kouns, Jake.,Jake Kouns, Daniel Minoli
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Business enterprises, Computer networks, Security measures,، Information technology, Security measures,، Data protection,، Computer security,، Risk management
Classification :
HF
5548
.
37
.
K68
2010
17. The Executive guide to information security: threats, challenges, and solutions
Author: Mark Egan with Tim Mather
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection
Classification :
HF
،
5548
.
32
،.
E325
،
2005