1. AVIEN malware defense guide for the Enterpris
Author: / David Harley ... [et al.]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Computer security--Management,Computer viruses.,Malware (Computer software)
Classification :
QA
,
76
.
9
,.
A873
,
2007


2. AVIEN malware defense guide for the Enterprise /
Author: David Harley [and others] ; foreword by Robert S. Vibert.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Computer viruses.,Computer networks-- Security measures.,Computer security-- Management.,Computer viruses.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
A873
2007eb


3. AVIEN malware defense guide for the Enterprise
Author: / David Harley ... [et al.]
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security- Management,Computer networks- Security measures,Computer viruses
Classification :
QA76
.
9
.
A25
,
A873
2007


4. AVIEN malware defense guide for the Enterprise
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Management. ; Computer networks ; Security measures. ; Computer viruses. ;

5. Access to online resources :
Author: by Kristina Botyriute.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Collection management (Libraries),Computer networks-- Security measures.,Database security.,Electronic information resources-- Access control.,Electronic information resources-- Management.,Computer Security.,Information Services.,Internet.,Collection management (Libraries),Computer networks-- Security measures.,Database security.,Electronic information resources-- Access control.,Library & information sciences.
Classification :
Z695
.
24


6. Big data analytics in cybersecurity /
Author: edited by Onur Savas, Julia Deng.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Big data.,Computer networks-- Security measures.,Computer security.,Database security.,Information technology-- Management.,Big Data,Big data.,Computer networks-- Security measures.,Computer security.,Database security.,Datenanalyse,Datensicherung,Information technology-- Management.
Classification :
QA76
.
9
.
A25
B54
2017


7. Business Continuity Management :
Author: Stefan Spörrer.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Crisis management.,Data protection.,Emergency management-- Planning.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer networks-- Security measures.,Crisis management.,Data protection.,Emergency management-- Planning.
Classification :
HD49


8. Business continuity and disaster recovery for infosec managers
Author: Rittinghouse, John W.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Business -- Data processing -- Security measures,، Crisis management,، Computer networks -- Security measures.,، Information resources management
Classification :
HF
5548
.
37
.
R58
2005


9. Business continuity and disaster recovery for infosec managers /
Author: John W. Rittinghouse, James F. Ransome
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures,Computer networks-- Security measures,Crisis management,Information resources management
Classification :
HF5548
.
37
.
R58
2005


10. Business continuity and disaster recovery planning for IT professionals /
Author: Susan Snedaker, Chris Rima.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures.,Computer networks-- Security measures.,Crisis management.,Electronic data processing departments-- Security measures.,Management information systems-- Security measures.
Classification :
HF5548
.
37
.
S67
2013


11. Business continuity & disaster recovery for IT professionals /
Author: Susan Snedaker.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures.,Computer networks-- Security measures.,Crisis management.,Electronic data processing departments-- Security measures.,Management information systems-- Security measures.,BUSINESS & ECONOMICS-- Corporate Governance.,BUSINESS & ECONOMICS-- Leadership.,BUSINESS & ECONOMICS-- Organizational Development.,BUSINESS & ECONOMICS-- Workplace Culture.,Business-- Data processing-- Security measures.,Business-- Data processing-- Security measures.,Computer networks-- Security measures.,Computer networks-- Security measures.,Crisis management.,Crisis management.,Databescherming.,Electronic data processing departments-- Security measures.,Electronic data processing departments-- Security measures.,Management information systems-- Security measures.,Risk management.
Classification :
HD
.
S67
2007eb


12. Business data networks and security /
Author: Raymond R. Panko, University of Hawai'i at Mānoa, Julia L. Panko, Weber State University.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer networks-- Management.,Computer networks-- Security measures.,Computer security.,Business enterprises-- Computer networks-- Security measures.,Computer networks-- Management.,Computer networks-- Security measures.,Computer security.,Computersicherheit,Datensicherung,Rechnernetz
Classification :
HD30
.
37
.
P36
2019


13. CCNA security study guide :
Author: Troy McMillan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cisco IOS.,Cisco IOS.,Computer networks-- Security measures-- Examinations, Study guides.,Routing (Computer network management)-- Examinations, Study guides.,Telecommunication-- Switching systems-- Examinations, Study guides.,Telecommunications engineers-- Certification.,Computer networks-- Security measures-- Examinations.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Networking.,COMPUTERS-- Security-- Online Safety & Privacy.,Telecommunication-- Switching systems-- Examinations.,Telecommunications engineers-- Certification.
Classification :
TK5105
.
59


14. CIS
Author: / David L. Cannon
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Examinations--Study guides,Management information systems--Auditing--Examinations--Study guides
Classification :
QA
,
76
.
3
,.
C3445
,
2008eb


15. CISA Certified Information Systems Auditor. study guide
Author: Cannon, David L.,2691-
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer networks, Security measures, Examinations, Study guides,، Management information systems, Auditing, Examinations, Study guides
Classification :
QA
76
.
3
.
C3445
2006


16. CISO compass :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Management. ; Information networks ; Security measures. ; Information technology ; Security measures. ;

17. CISO compass :
Author: Todd Fitzgerald.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,BUSINESS & ECONOMICS-- Management.,Business enterprises-- Computer networks-- Security measures.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Security-- General.
Classification :
TK5105
.
59


18. Cisco ASA configuration
Author: Richard A. Deal
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Computer networks, Security measures,Firewalls (Computer security),Software configuration management,Computer input-output equipment
Classification :
TK
,
5105
.
59
,.
D429
,
2009


19. Cisco Security bible
Author: Rajesh Kumar Sharma
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computer networks -- Security measures,Computer networks -- Management
Classification :
TK
،
5105
.
59
،.
S52
،
2002


20. Cisco security bible
Author: Sharma, Rajesh Kumar
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,Management ، Computer networks
Classification :
TK
5105
.
59
.
S47C5

