1. Cyber security standards, practices and industrial applications :
Author: Junaid Ahmed Zubairi, Athar Mahboob.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data protection.,Electronic data processing departments-- Security measures.

2. Data protection and security for personal computers
Author: / by Robert Schifreen
Library: Library of College of Science University of Tehran (Tehran)
Subject: Microcomputers -- Access control,Data protection,Electronic data processing departments -- Security measures,Computer networks -- Security measures,Microcomputers
Classification :
QA
76
.
9
.
A25
S3
1992


3. Preserving Privacy in Data Outsourcing
Author:
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Data protection.,Computer networks--Security measures,Electronic data processing departments--Contracting out
Classification :
HF
,
5548
.
37
,.
F67
,
2011


4. Preserving privacy in data outsourcing
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data protection. ; Electronic data processing departments ; Contracting out. ; Computer networks ; Security measures. ;

5. Preserving privacy in data outsourcing
Author: Foresti, Sara.,Sara Foresti ; foreword by Pierangela Samarati
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Data protection,، Electronic data processing departments, Contracting out,، Computer networks, Security measures
Classification :
HF
5548
.
37
.
F66
2011


6. Preserving privacy in data outsourcing
Author: / Sara Foresti
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Data protection,Electronic data processing departments--Contracting out.,Computer networks--Security measures
Classification :
HF
5548
.
37
.
F6
2011


7. Principles of data security
Author: Leiss, Ernst L.
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer security , Data protection , Electronic data processing departments - Security measures
Classification :
QA
76
.
9
.
A25
L48
1982


8. #Principles of data security
Author: #Ernst L. Leiss
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer security ،Data protection ،Electronic data processing departments- Security measures
Classification :
#
QA
،#.
A25
,
L48


9. Responsive security
Author: Meng-Chow Kang
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures,Data protection,Electronic data processing departments-- Security measures,Information technology-- Security measures,Risk management
Classification :
HF30
.
38
.
K38
2014


10. The CISO handbook :
Author: Michael Gentile, Ronald D. Collette, Thomas D. August.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Electronic data processing departments-- Security measures.,BUSINESS & ECONOMICS-- Corporate Governance.,BUSINESS & ECONOMICS-- Leadership.,BUSINESS & ECONOMICS-- Organizational Development.,BUSINESS & ECONOMICS-- Workplace Culture.,Computer security.,Data protection.,Electronic data processing departments-- Security measures.
Classification :
HF5548
.
37
.
G46
2006eb

