101. Pervasive information security and privacy developments :
Author: [edited by] Hamid Nemati.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Information technology -- Security measures.
Classification :
QA76
.
9
.
A25
E358
2011
102. Physical and logical security convergence
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Information technology. ;
103. Physical and logical security convergence
Author: / Brian T. Contos ... [et al.]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Information technology.
Classification :
QA
,
76
.
9
,.
A25
,
P49
,
2007
104. Physical and logical security convergence powered by enterprise security management /
Author: Brian T. Contos [and others] ; foreword by Regis McKenna.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Information technology.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Information technology.
Classification :
QA76
.
9
.
A25
P49
2007eb
105. Power and security in the information age :
Author: edited by Myriam Dunn Cavelty, Victor Mauer, Sai Felicia Krishna-Hensel
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Cyberterrorism,Information society,Information technology
Classification :
QA76
.
9
.
A25
P68
2007
106. Principles of information security
Author: / Michael E.Whitman and Herbert J. Mattord
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer networks -- Security measures,Computer security,Information technology -- Security measures
Classification :
TK
5105
.
59
.
W55
107. Privacy in a Digital, Networked World
Author: \ Sherali Zeadally , Mohamad Badra Editors
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security.,Information technology -- Security measures.,Digital media -- Security measures.,امنیت رایانه.,فن آوری اطلاعات -- اقدامات امنیتی.,رسانه های دیجیتال -- اقدامات امنیتی
Classification :
QA
76
.
9
.
P75
2015
E-Book
,
108. Readings and cases in information security
Author: / Michael E. Whitman and Herbert J. Mattord,Whitman
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computer networks -- Moral and ethical aspects,Computer security,Information technology -- Law and legislation,Computer networks -- Security measures -- Law and legislation,Confidential communications -- Protection,Privacy, Right of,Computers -- Access control
Classification :
TK
5105
.
878
.
W5
109. Recent Advances in Information and Communication Technology
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks -- Congresses,Computer networks -- Security measures -- Congresses,Information technology -- Congresses,شبکههای کامپیوتری -- کنگرهها,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها,تکنولوژی اطلاعات -- کنگرهها
Classification :
E-Book
,
110. Roadmap to information security :for it and infosec managers
Author: Whitman, Michael.
Library: Library of Niroo Research Institue (Tehran)
Subject: ، Computer security,، Information technology- Security measures
111. SYSTEM ADMINISTRATION ETHICS :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks.,Computer security.,Information technology-- Moral and ethical aspects.,Computer networks.,Computer security.,Information technology-- Moral and ethical aspects.
Classification :
TK5105
.
878
.
L58
2020
112. Security and control in information systems
Author: / Andrew Hawker
Library: Central library of medical university of Isfahan (Esfahan)
Subject: Electronic data processing departments- Auditing,Computer security,Information technology- Security measures
Classification :
HF5548
.
35
.
H3
2000
113. Security and control in information systems :
Author: Andrew Hawker.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Electronic data processing departments-- Auditing.,Information technology-- Security measures.,Systèmes informatiques-- Évaluation.,Systèmes informatiques-- Sécurité-- Mesures.,Technologie de l'information-- Sécurité-- Mesures.,Computer security.,Computers and IT.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Electronic data processing departments-- Auditing.,Information technology-- Security measures.
Classification :
HF5548
.
35
.
H39
2000eb
114. Security and privacy--silver linings in the cloud
Author: Kai Rannenberg, Vijay Varadharajan, Christian Weber, eds.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses.,Computers-- Access control, Congresses.,Database security, Congresses.,Information technology-- Security measures, Congresses.
115. Security and protection in information processing systems :
Author: Edited by Yves Deswarte ... [et al]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Computers-- Access control, Congresses,Database security, Congresses,Information technology-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
I45
2004
116. Security aspects in information technology :
Author: Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Information technology-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
I58
2011
117. Security automation with Ansible 2 :
Author: Madhu Akula, Akash Mahajan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Information technology-- Automation.,Information technology-- Management.,Computer networks-- Security measures.,Information technology-- Management.
Classification :
T58
.
5
118. Security in e-learning /
Author: by Edgar R. Weippl
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management,Computer-assisted instruction-- Security measures,Information technology-- Management
Classification :
HD30
.
2
.
W524
2005