1. Cyber-security and global information assuranc
Author: / Kenneth J. Knapp, editor
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Information technology--Security measures,Computer security--Management,Cyberspace--Security measures,Data protection.,Computer networks--Security measures
Classification :
QA
,
76
.
9
,.
A25
,
C918
,
2009
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
2. Cyber-security and global information assurance
Author: / Kenneth J. Knapp, editor
Library: Insurance Research Institute Library (Tehran)
Subject: Information technology, Security measures,Computer security, Management,Cyberspace, Security measures,Data protection,Computer networks, Security measures
Classification :
QA76
.
9
.
C9
2009
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
3. Cyber-security and global information assurance: threat analysis and response solutions
Author: Kenneth J. Knapp, editor
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Security measures ، Information technology,Management ، Computer security,Security measures ، Cyberspace,، Data protection,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
C918
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
4. Implementing the ISO/IEC 27001 information security management system standard
Author: Edward Humphreys
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computer security -- Management -- Standards,Computer networks -- Security measures -- Standards,Data protection -- Standards,Information technology -- Standards
Classification :
QA
،
76
.
9
،.
A25
,
H855
،
2007
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
5. Information assurance architecture
Author: Keith D. WIllett
Library: Library of Faculty of Management of Tehran University (Tehran)
Subject: Computer Security,Computer networks, Security measures,Information resources management,Information technology, Management,Business enterprises, Communication systems, Management,Data protection
![](/design/images/bookmore.png)
6. Information security governance :
Author: Krag Brotby
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management,Data protection,Information technology-- Security measures
![](/design/images/bookmore.png)
7. Information security governance. a practical development and implementation approach
Author: Brotby, W. Krag
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Data protection,، Computer security- Management,، Information technology- Security measures
Classification :
HF
5548
.
37
.
B76
2009
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
8. Information security governance: a practical development and implementation approach
Author: Brotby, W. Krag
Library: Central Library and Documentation Center (Golestan)
Subject: ، Data protection,Management ، Computer security,Security measures ، Information technology
Classification :
HF
5548
.
37
.
B76
I54
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
9. Information technology risk management in enterprise environments
Author: Jake Kouns, Daniel Minoli
Library: Library of Faculty of Management of Tehran University (Tehran)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer Security,Risk Management
![](/design/images/bookmore.png)
10. Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
Author: Kouns, Jake.,Jake Kouns, Daniel Minoli
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Business enterprises, Computer networks, Security measures,، Information technology, Security measures,، Data protection,، Computer security,، Risk management
Classification :
HF
5548
.
37
.
K68
2010
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
11. Information warfare
Author: Daniel Ventre
Library: Library of Faculty of Entrepreneurship University of Tehran (Tehran)
Subject: Business intelligence,Trade secrets,Information technology -- Security measures,Computer security -- Management,Data protection
Classification :
HD
38
.
7
.
V4713
2009
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
12. Network Scanning Cookbook /
Author: Jetty, Sairam.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.
![](/design/images/bookmore.png)
13. Penetration testing fundamentals /
Author: Chuck Easttom.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security)
Classification :
TK5105
.
59
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
14. The Executive guide to information security: threats, challenges, and solutions
Author: Mark Egan with Tim Mather
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection
Classification :
HF
،
5548
.
32
،.
E325
،
2005
![](/design/images/bookmore.png)
![](/design/images/visualshelfbtn.png)
15. The chief information security officer
Author: Barry L. Kouns, Jake Kouns.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.
![](/design/images/bookmore.png)
16. security and global information assurance :-Cyber
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Information technology ; Security measures ; Computer security ; Management ; Cyberspace ; Security measures ; Data protection ; Computer networks ; Security measures ;
![](/design/images/bookmore.png)
17. مدیریت اطلاعات و امنیت
Author: / ان.سی. آستانا و آنجالی نیرمال,آستهانا,Asthana
Library: National Library and Archives of Islamic Republic of Iran (Tehran)
Subject: تکنولوژی اطلاعات,Information technology,نظامهای اطلاعاتی مدیریت,Management information systems,شبکههای کامپیوتری,Computer networks,حفاظت دادهها,Data protection, -- مدیریت, -- Management, -- تدابیر ایمنی, -- Security measures
Classification :
HD
۳۰
/
۲
/
آ
۴۶
م
۴ ۱۳۹۴
![](/design/images/bookmore.png)