61. Information security and ethics
Author: / Marian Quigley [editor]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Technology--Social aspects,Computer security.,Information technology--Social aspects,Information technology--Moral and ethical aspects
Classification :
T
,
14
.
5
,.
I55
,
2005
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
62. Information security and ethics :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Technology ; Social aspects ; Computer security ; Information technology ; Social aspects ; Information technology ; Moral and ethical aspects ;
![](/design/images/bookmore.png)
63. Information security and ethics :
Author: Hamid Nemati, [editor].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Information technology-- Moral and ethical aspects.,Information technology-- Security measures.,Computer security.,Information technology-- Moral and ethical aspects.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25
I54152
2008e
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
64. Information security and ethics
Author:
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer security,Information technology--Security measures.,Information technology -- Moral and ethical aspects
Classification :
QA
76
.
9
.
A25
I541
2008
R
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
65. Information security governance :
Author: Krag Brotby
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management,Data protection,Information technology-- Security measures
![](/design/images/bookmore.png)
66. Information security governance. a practical development and implementation approach
Author: Brotby, W. Krag
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Data protection,، Computer security- Management,، Information technology- Security measures
Classification :
HF
5548
.
37
.
B76
2009
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
67. Information security governance: a practical development and implementation approach
Author: Brotby, W. Krag
Library: Central Library and Documentation Center (Golestan)
Subject: ، Data protection,Management ، Computer security,Security measures ، Information technology
Classification :
HF
5548
.
37
.
B76
I54
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
68. Information security management, education and privacy :
Author: edited by Yves Deswarte ... [et al.]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management, Congresses,Information technology-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
I468
2004
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
69. Information security management metrics :a definitive guide to effective security monitoring and measurement
Author: Brotby, W. Krag.
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: Security measures ، Information technology,، Computer security,Computer networks Security measures ، Business enterprises,، Data protection
Classification :
HD
30
.
2
.
B78
2009
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
70. Information security: protecting the global enterprise
Author: Pipkin, Donald L.
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer security,، Data protection,، Information technology-- Security measures
Classification :
QA
76
.
9
.
A25
.
P57
2000
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
71. Information security science
Author: Carl S. Young ; acquisition editor Brian Romer ; designer Mark Rogers.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Information technology-- Security measures.
![](/design/images/bookmore.png)
72. Information technology for counterterrorism
Author: / Committee on the Role of Information Technology in Responding to Terrorism, Computer Science and Telecommunications Board, National Research Council of the National Academies
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Terrorism- Prevention,Information technology United States,Computer security United States,Computer networks- Security measures United States,Telecommunication systems United States
Classification :
HV6432
.
N384
2003
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
73. Information technology risk management and compliance in modern organizations.
Author: / Manish Gupta...[et al.]
Library: Central library of medical university of Isfahan (Esfahan)
Subject: Business enterprises-- Computer networks-- Security measures. , Information technology-- Security measures. , Data protection, Computer security, Risk management.
Classification :
HF5548
.
37
.
I5
2018
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
74. Information technology risk management in enterprise environments
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Business enterprises ; Computer networks ; Security measures. ; Information technology ; Security measures. ; Data protection. ; Computer security. ; Risk management. ;
![](/design/images/bookmore.png)
75. Information technology risk management in enterprise environments :
Author: Jake Kouns, Daniel Minoli.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.,Risk management.
![](/design/images/bookmore.png)
76. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Ilam University Central Library (Ilam)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K68
2010
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
77. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K68
2010
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
78. Information technology risk management in enterprise environments
Author: Jake Kouns, Daniel Minoli
Library: Library of Faculty of Management of Tehran University (Tehran)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer Security,Risk Management
![](/design/images/bookmore.png)
79. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Business enterprises--Computer networks--Security measures,Information technology--Security measures,Data protection.,Computer security.,Risk management.
Classification :
HF
,
5548
.
37
,.
K68
,
2010
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
80. Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams
Author: / Jake Kouns, Daniel Minoli
Library: Insurance Research Institute Library (Tehran)
Subject: Business enterprises --Computer networks --Security measures,Information technology --Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K6I5
2010
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)