1. Advances in enterprise information technology securit
Author: / Djamel Khadraoui and Francine Herrmann, editors
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Business enterprises--Computer networks--Security measures,Information technology--Security measures,Computer security.,Data protection.
Classification :
HF
,
5548
.
37
,.
A38
,
2007e


2. Advances in enterprise information technology security /
Author: Djamel Khadraoui, Francine Herrmann [editors]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures,Computer security,Data protection,Information technology-- Security measures
Classification :
HF5548
.
37
.
A38
2007


3. Advances in enterprise information technology security
پدیدآورنده : Djamel Khadraoui, Francine Herrmann ]editors[
موضوع : ، Business enterprises , Computer networks , Security measures,، Information technology , Security measures,، Computer security,، Data protection
۲ نسخه از این کتاب در ۲ کتابخانه موجود است.
4. Advances in enterprise information technology security
Author: Djamel Khadraoui and Francine Herrmann, editors
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Computer networks Security measures ، Business enterprises,Security measures ، Information technology,، Computer security,، Data protection
Classification :
HF
5548
.
37
.
A38


5. Advances in enterprise information technology security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Business enterprises ; Computer networks ; Security measures ; Information technology ; Security measures ; Computer security ; Data protection ;

6. Advances in enterprise information technology security /Djamel Khadraoui and Francine Herrmann, editors.
Author:
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Business enterprises--Computer networks--Security measures,Information technology--Security measures.,Computer security,Data protection
Classification :
HF
5548
.
37
.
A38
2007


7. Advances in enterprise information technology security [electronic book]
Author: / Djamel Khadraoui and Francine Herrmann, editors
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Business enterprises--Computer networks--Security measures,Information technology--Security measures,Computer security,Data protection
Classification :
EB
,
HF5548
.
37
.
A38
2007

8. Big data analytics in cybersecurity /
Author: edited by Onur Savas, Julia Deng.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Big data.,Computer networks-- Security measures.,Computer security.,Database security.,Information technology-- Management.,Big Data,Big data.,Computer networks-- Security measures.,Computer security.,Database security.,Datenanalyse,Datensicherung,Information technology-- Management.
Classification :
QA76
.
9
.
A25
B54
2017


9. CISO compass :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Management. ; Information networks ; Security measures. ; Information technology ; Security measures. ;

10. Engineering information security
Author: Stuart Jacobs
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computer security,Computer networks, Security measures,Information technology, Security measures,Data protection
Classification :
QA
،
76
.
9
،.
J3
،
2011


11. Engineering information security
Author: / Stuart Jacobs
Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)
Subject: Computer security,Computer networks, Security measures,Information technology, Security measures
Classification :
QA76
.
9
.
A25J325
2011


12. Engineering information security. the application of systems engineering concepts to achieve information assurance
Author: Jacobs, Stuart.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Computer networks- Security measures,، Information technology- Security measures,، Data protection
Classification :
QA
76
.
9
.
A25
J325
2011


13. Enterprise information security and privacy /
Author: C. Warren Axelrod, Jennifer L. Bayuk, Daniel Schutzer, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.,BUSINESS & ECONOMICS-- Corporate Governance.,BUSINESS & ECONOMICS-- Leadership.,BUSINESS & ECONOMICS-- Organizational Development.,BUSINESS & ECONOMICS-- Workplace Culture.,Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.
Classification :
HF5548
.
37
.
E58
2009eb


14. Enterprise information security and privacy
Author: / C. Warren Axelrod, Jennifer L. Bayuk, Daniel Schutzer, editors.
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Business enterprises--Computer networks--Security measures,Information technology--Security measures.,Computer security,Data protection
Classification :
HF
5548
.
37
.
E58
2009


15. Enterprise information security and privacy
Author: C. Warren Axelrod, Jennifer L. Bayuk, Daniel Schutzer, editors
Library: Library of Faculty of Management of Tehran University (Tehran)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Computer Security,Data protection

16. Handbook of research on digital crime, cyberspace security, and information assurance /
Author: Maria Manuela Cruz-Cunha, Polytechnic Institute of Cavado and Ave, Portugal, Irene Maria Portela, Polytechnic Institute of C�avado and Ave, Portugal.
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computer crimes.,Computer security.,Computer networks-- Security measures.,Data protection.,Information technology.
Classification :
HV6773
.
H375
2015


17. Hands-on security in DevOps :
Author: Tony Hsu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control.,Computer networks-- Security measures.,Information technology-- Management.,Computer networks-- Access control.,Computer networks-- Security measures.,COMPUTERS-- Security-- General.,Information technology-- Management.
Classification :
HD30
.
2


18. ICT and critical infrastructure :proceedings of the 48th Annual Convention of Computer Society of India
Author: Suresh Chandra Satapathy, P. S. Avadhani, Siba K. Udgata, Sadasivuni Lakshminarayana, editors ; Hosted by CSI Vishakapatnam Chapter
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: Congresses ، Computer science,Congresses ، Information technology,Congresses ، Computer networks,Congresses ، Computer security,Congresses ، Computer networks - Security measures,، Engineering,، Computational Intelligence,، Artificial Intelligence )incl. Robotics(
Classification :
QA75
.
5


19. ICT critical infrastructures and society
Author: Magda David Hercheui ... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Information technology-- Security measures, Congresses
Classification :
TK5105
.
59
.
I35
2012eb


20. ICT critical infrastructures and society
Author: / Magda David Hercheui ... [et al.] (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks--Security measures--Congresses,Information technology--Security measures--Congresses,Computer security--Congresses
Classification :
TK5105
.
59
.
I35
2012

