1. Advances in enterprise information technology security /
Author: Djamel Khadraoui, Francine Herrmann [editors]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures,Computer security,Data protection,Information technology-- Security measures
Classification :
HF5548
.
37
.
A38
2007


2. Advances in enterprise information technology security
Author: Djamel Khadraoui, Francine Herrmann ]editors[
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Business enterprises , Computer networks , Security measures,، Information technology , Security measures,، Computer security,، Data protection

3. Anti-Hacher tool kit
Author: / Mike shema, Bradley C. Johnson
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Data protection,Computer networks,-- Security measures
Classification :
005
.
8
S545A
2004


4. Anti-hacker tool kit
Author: / Keith J. Jones, Mike Shema, Bradley C. Johnson
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Data protection,Computer networks- Security measures
Classification :
TK5105
.
59
.
J65
2002


5. Anti-hacker tool kit
Author: Shema, Mike
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Security measures ، Computer networks,، Data protection
Classification :
TK
5105
.
59
.
S54
2004


6. Anti-hacker tool kit
Author: / Keith J. Jones, Mike Shema, Bradley C. Johnson
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Data protection,Computer networks--Security measures
Classification :
TK5105
.
59
.
J65


7. Anti-hacker tool kit
Author: / Keith J. Jones, Mike Shema, Bradley C. Johnson
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Data protection,Computer networks- Security measures
Classification :
TK5105
.
59
.
J65
2002


8. Anti-hacker tool kit
Author: / Mike Shema ... [et al.]
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Data protection,Computer networks,-- Security measures
Classification :
005
.
8
S545A
2006


9. Anti-hacker tool kit
Author: Shema, Mike
Library: Library of College of Science University of Tehran (Tehran)
Subject: ، Data protection,، Computer networks -- Security measures
Classification :
TK
5105
.
59
.
S54
2004


10. Anti-hacker tool kit
Author: Mike Shema...]et al.[
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: ، Data protection,Security measures ، Computer networks
Classification :
TK
5105
.
59
.
S54
2006


11. Anti-hacker tool kit
Author: / Keith J. Jones, Mike Shema, Bradley C. Johnson
Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)
Subject: Data protection,Computer networks- Security measures
Classification :
TK5105
.
59
.
J66
2002


12. Anti-hacker tool kit
Author: Mike Shema
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Data protection

13. Anti-hacker tool kit
Author: Shema, Mike ... ]et al.[
Library: (Semnan)
Subject: ، Data protection,Security measures ، Computer networks
Classification :
TK
5105
.
59
.
A57
2006


14. Application security in the ISO27001 environment
Author: Vinod Vasudevan ... [et al.].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Standards.,Computer security-- Standards.,Computer security.,Data protection-- Standards.,Information technology-- Standards.

15. Applied information security :
Author: David Basin, Patrick Schaller, Michael Schläpfer.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25
B37
2011


16. Applied information security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Data encryption (Computer science) ; Computer networks ; Security measures. ; Data protection. ;

17. Applied information security
Author: / David Basin, Patrick Schaller, Michael Schleapfer
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Data encryption (Computer science),Computer networks--Security measures,Data protection.
Classification :
QA
,
76
.
9
,.
A25
,
B3798
,
2011


18. Auditing cloud computing :
Author: [edited by] Ben Halpert
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures,Cloud computing-- Security measures,Data protection,Information technology-- Security measures
Classification :
HF5548
.
37
.
A93
2011


19. Business Continuity Management :
Author: Stefan Spörrer.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Crisis management.,Data protection.,Emergency management-- Planning.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer networks-- Security measures.,Crisis management.,Data protection.,Emergency management-- Planning.
Classification :
HD49


20. Cloud computing security :
Author: editor, John R. Vacca
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures.,Computer networks-- Security measures.,Computer security.,Data protection.
Classification :
QA76
.
585
.
C5825
2017eb

