1. A business guide to information security. how to protect your company's IT assets, reduce risks and understand the law
Author: Calder, Alan
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Information technology- Security measures,، Data protection,، Business- Data processing- Security measures
Classification :
QA
76
.
9
.
A25
C34188
2005
2. Advances in enterprise information technology securit
Author: / Djamel Khadraoui and Francine Herrmann, editors
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Business enterprises--Computer networks--Security measures,Information technology--Security measures,Computer security.,Data protection.
Classification :
HF
,
5548
.
37
,.
A38
,
2007e
3. Advances in enterprise information technology security /
Author: Djamel Khadraoui, Francine Herrmann [editors]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures,Computer security,Data protection,Information technology-- Security measures
Classification :
HF5548
.
37
.
A38
2007
4. Advances in enterprise information technology security
پدیدآورنده : Djamel Khadraoui, Francine Herrmann ]editors[
موضوع : ، Business enterprises , Computer networks , Security measures,، Information technology , Security measures,، Computer security,، Data protection
۲ نسخه از این کتاب در ۲ کتابخانه موجود است.
5. Advances in enterprise information technology security
Author: Djamel Khadraoui and Francine Herrmann, editors
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Computer networks Security measures ، Business enterprises,Security measures ، Information technology,، Computer security,، Data protection
Classification :
HF
5548
.
37
.
A38
6. Advances in enterprise information technology security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Business enterprises ; Computer networks ; Security measures ; Information technology ; Security measures ; Computer security ; Data protection ;
7. Advances in enterprise information technology security /Djamel Khadraoui and Francine Herrmann, editors.
Author:
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Business enterprises--Computer networks--Security measures,Information technology--Security measures.,Computer security,Data protection
Classification :
HF
5548
.
37
.
A38
2007
8. Advances in enterprise information technology security [electronic book]
Author: / Djamel Khadraoui and Francine Herrmann, editors
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Business enterprises--Computer networks--Security measures,Information technology--Security measures,Computer security,Data protection
Classification :
EB
,
HF5548
.
37
.
A38
2007
9. Advances in information security and its application :third international conference, ISA 2009, Seoul, Korea, June 25-27, 2009. proceedings
Author:
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: Congresses. ، Information technology--securithy measures,Congresses. ، Computer security,Congresses. ، Data protection
Classification :
QA
76
.
9
.
A25
I51
2009
10. Big data analytics in cybersecurity /
Author: edited by Onur Savas, Julia Deng.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Big data.,Computer networks-- Security measures.,Computer security.,Database security.,Information technology-- Management.,Big Data,Big data.,Computer networks-- Security measures.,Computer security.,Database security.,Datenanalyse,Datensicherung,Information technology-- Management.
Classification :
QA76
.
9
.
A25
B54
2017
11. Building a comprehensive IT security program :
Author: Jeremy Wittkop
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management.,Information technology-- Security measures-- Management.
Classification :
HD30
.
2
12. Building a comprehensive IT security program :
Author: Jeremy Wittkop
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management,Information technology-- Security measures-- Management
Classification :
HD30
.
2
13. CISO compass :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Management. ; Information networks ; Security measures. ; Information technology ; Security measures. ;
14. Collaboration with cloud computing
Author: Ric Messier ; technical editor, Allan Konar
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing,Computer crimes-- Prevention,Computer security,Information technology-- Management,Information technology-- Security measures
Classification :
QA76
.
9
.
A25
M4864
2014
15. Collaboration with cloud computing : security, social media, and unified communications
Author: Messier, Ric
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Security measures ، Information technology,Management ، Information technology,، Cloud computing,، Computer security,Prevention ، Computer crimes
Classification :
QA
76
.
9
.
A25M47
16. Cyber-security and global information assuranc
Author: / Kenneth J. Knapp, editor
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Information technology--Security measures,Computer security--Management,Cyberspace--Security measures,Data protection.,Computer networks--Security measures
Classification :
QA
,
76
.
9
,.
A25
,
C918
,
2009
17. Cyber-security and global information assurance
Author: / Kenneth J. Knapp, editor
Library: Insurance Research Institute Library (Tehran)
Subject: Information technology, Security measures,Computer security, Management,Cyberspace, Security measures,Data protection,Computer networks, Security measures
Classification :
QA76
.
9
.
C9
2009
18. Cyber-security and global information assurance: threat analysis and response solutions
Author: Kenneth J. Knapp, editor
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Security measures ، Information technology,Management ، Computer security,Security measures ، Cyberspace,، Data protection,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
C918