121. Security strategy
Author: Bill Stackpole and Eric Oksendahl
Library: Library and Information Center of Ayatollah Imani of Salman Farsi University (Fars)
Subject: Computer security,Information technology, Security measures,Data protection,Business, Data processing, Security measures
Classification :
QA
76
,.
9
.
S78S4
2011
122. Security strategy: <from requirements to reality>
Author: / Bill Stackpole and Eric Oksendahl
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computer security,Information technology,Data protection,Business,-- Security measures,-- Data processing -- Security measures
Classification :
005
.
8
S775S
2011
123. Security vs. access :
Author: LeAnne K. Robinson, Abbie H. Brown, Tim D. Green.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Study and teaching-- United States.,Information technology-- Study and teaching-- United States.,Internet in education-- Security measures-- United States.
Classification :
LB1028
.
5
.
R545
2010
124. Techniques and applications for advanced information privacy and securit
Author: / Hamid R. Nemati, [editor]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Information technology--Security measures,Electronic commerce--Security measures,Computer security.,Data protection.
Classification :
HF
,
5548
.
37
,.
T43
,
2009
125. Techniques and applications for advanced information privacy and security :
Author: Hamid R. Nemati, editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Electronic commerce-- Security measures.,Information technology-- Security measures.,Computer security.,Data protection.,Electronic commerce-- Security measures.,Information technology-- Security measures.
Classification :
HF5548
.
37
.
T43
2009
126. Techniques and applications for advanced information privacy and security : emerging organizational, ethical, and human issues
Author: ]edited by[ Hamid R. Nemati
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Security measures ، Electronic commerce,Security measures ، Information technology,، Computer security,، Data protection
Classification :
HF
5548
.
37
.
T43
2009
127. <The> Architecture of Privacy
Author: \ Courtney Bowman...[et.al] ; edited by Elissa Lerner.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Information technology-- Security measures.,Software engineering-- Security measures.,Computer security.,Data protection.,Privacy.,تکنولوژی اطلاعات -- تدابیر ایمنی ,مهندسی نرم افزار -- تدابیر ایمنی,امنیت کامپیوتر ,حفاظت دادهها
Classification :
QA
76
.
9
.
A7
2015
E-Book
,
128. The Executive guide to information security: threats, challenges, and solutions
Author: Mark Egan with Tim Mather
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection
Classification :
HF
،
5548
.
32
،.
E325
،
2005
129. The art of deception
Author: / Kevin D. Mitnick and William L. Simon
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Information technology- Social aspects,Computer hackers
Classification :
QA76
.
9
.
A25
,
M585
2002
130. The art of deception
Author: / Kevin D. Mitnick and William L. Simon
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Computer security,Information technology--Social aspects,Computer hackers
Classification :
EB
,
QA76
.
9
.
A25M58
2002
131. The art of deception: controlling the human element of security
Author: Mitnick, Kevin D.)Kevin David(
Library: Central Library and Documentation Center (Kerman)
Subject: ، Computer security,Social aspects ، Information technology,، Computer hackers
Classification :
QA
76
.
9
.
A25
M585
2002
132. The art of enterprise information architecture :
Author: Mario Godinez [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Information technology-- Management.,Information technology-- Security measures.,Management information systems.,Business & Economics.,Business enterprises-- Computer networks-- Security measures.,Business enterprises-- Computer networks-- Security measures.,Computer Science.,Engineering & Applied Sciences.,Information technology-- Management.,Information technology-- Management.,Information technology-- Security measures.,Information technology-- Security measures.,Management information systems.,Management information systems.,Management Theory.,Management.
Classification :
HD30
.
2
.
A77
2010
133. The art of enterprise information architecture. a systems-based approach for unlocking business insight
Author: Mario Godinez ... ]et al.[
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Information technology- Management,، Management information systems,، Business enterprises- Computer networks- Security measures,، Information technology- Security measures
Classification :
HD
30
.
2
.
A77
2010
134. The chief information security officer
Author: Barry L. Kouns, Jake Kouns.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.
135. The complete guide to cybersecurity risks and controls
Author: Kohnke, Anne
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Computer security,Security measures ، Computer networks,Security measures ، Information technology
Classification :
QA
76
.
9
.
A25
K6346
136. The executive MBA in information security
Author: / John J. Trinckes, Jr
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Data protection.,Computer security.,Information technology--Security measures
Classification :
HF5548
.
37
.
T75
2010
137. <The> executive guide to information Security:Threats,challenges,and solutions
Author: Mark Egan
Library: Library of Faculty of Management of Tehran University (Tehran)
Subject: Data protection.,Computer security.,Information technology-Security measures
138. The information security dictionary
Author: / by Urs E. Gattiker
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks, Security measures, Dictionaries,Computer security, Dictionaries,Information technology, Security measures, Dictionaries
Classification :
TK5105
.
59
.
G387
2004
139. The information security dictionary
Author: / by Urs E. Gattiker
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures Dictionaries,Computer security Dictionaries,Information technology- Security measures Dictionaries
Classification :
TK5105
.
59
.
G387
2004
140. The information security dictionary
Author: / by Urs E. Gattiker
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures Dictionaries,Computer security Dictionaries,Information technology- Security measures Dictionaries
Classification :
TK5105
.
59
.
G387
2004