21. IT Convergence and Services
Author: James J. Park...[et al.], editors
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Information technology, Congresses,Wireless communication systems, Congresses
Classification :
T58
.
5
.
I58
2012


22. IT audit, control, and security
Author: Robert Moeller
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Information technology, Auditing,Electronic data processing departments, Auditing,Computer security,Computer networks, Security measures
Classification :
T
،
58
.
5
،.
M645
،
2010


23. IT auditing :
Author: Mike Kegerreis, Mike Schiller, Chris Davis ; with Brian Wrozek.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Electronic data processing-- Auditing.,Information technology-- Management.,Computer networks-- Security measures.,Computer security.,Electronic data processing-- Auditing.,Information technology-- Management.
Classification :
QA76
.
9
.
A93


24. IT compliance and control
Author: / James J. DeLuccia IV
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Computer networks--Standards,Information technology--Management
Classification :
HD
,
30
.
2
,.
D456
,
2008eb


25. IT compliance and control
Author: / James J. DeLuccia
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks- Security measures,Computer networks- Standards,Information technology- Management
Classification :
TK5105
.
875
.
D45
2008


26. IT compliance and controls
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Information technology ; Management. ; Computer networks ; Security measures. ; Computer networks ; Standards. ;

27. IT compliance and controls: best practices for implementation
Author: Deluccia, James J.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Management ، Information technology,Security measures ، Computer networks,Standards ، Computer networks
Classification :
HD
30
.
2
.
D456
2008


28. Implementing the ISO/IEC 27001 information security management system standard
Author: Edward Humphreys
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computer security -- Management -- Standards,Computer networks -- Security measures -- Standards,Data protection -- Standards,Information technology -- Standards
Classification :
QA
،
76
.
9
،.
A25
,
H855
،
2007


29. Information assurance architecture
Author: / Keith D. WIllett
Library: Insurance Research Institute Library (Tehran)
Subject: Computer security,Computer networks, Security measures,Information resources management,Information technology, Management,Business enterprises, Communication systems, Management,Data protection
Classification :
QA76
.
9
.
W3I5
2008


30. Information assurance architecture
Author: / Keith D. WIllett
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security.,Computer networks--Security measures,Information resources management.,Information technology--Management,Business enterprises--Communication systems--Management,Data protection.
Classification :
QA76
.
9
.
A25
,
W5487
2008


31. Information assurance architecture
Author: Keith D. WIllett
Library: Library of Faculty of Management of Tehran University (Tehran)
Subject: Computer Security,Computer networks, Security measures,Information resources management,Information technology, Management,Business enterprises, Communication systems, Management,Data protection

32. Information security a manager's guide to thwarting data thieves and hackers
Author: Alexander, Philip, 3691-,Philip Alexander
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Business enterprises , Computer networks , Security measures,، Information technology , Security measures,، Computer security,، Data protection
Classification :
HF
5548
.
37
.
A44
2008


33. Information security and employee behaviour: how to reduce risk through employee education, training and awareness
Author: Angus McIlwraith
Library: Library of Faculty of Entrepreneurship University of Tehran (Tehran)
Subject: Business enterprises -- Computer networks -- Security measures,Information technology -- Security measures,Employees -- Training of.
Classification :
HD
30
.
38
.
M35
2006


34. Information security and employee behaviour: how to reduce risk through employee education, training and awareness
Author: McIlwraith, Angus.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Computer networks - Security measures ، Business enterprises,Security measures ، Information technology,Training of ، Employees
Classification :
HD
30
.
38
.
M35
2006


35. Information security and employee behaviour: how to reduce risk through employee education, training and awareness
Author: McIlwraith, Angus
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Computer networks Security measures ، Business enterprises,Security measures ، Information technology,Training of ، Employees
Classification :
HD
30
.
38
.
M35


36. Information security management metrics :a definitive guide to effective security monitoring and measurement
Author: Brotby, W. Krag.
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: Security measures ، Information technology,، Computer security,Computer networks Security measures ، Business enterprises,، Data protection
Classification :
HD
30
.
2
.
B78
2009


37. Information technology risk management and compliance in modern organizations.
Author: / Manish Gupta...[et al.]
Library: Central library of medical university of Isfahan (Esfahan)
Subject: Business enterprises-- Computer networks-- Security measures. , Information technology-- Security measures. , Data protection, Computer security, Risk management.
Classification :
HF5548
.
37
.
I5
2018


38. Information technology risk management in enterprise environments
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Business enterprises ; Computer networks ; Security measures. ; Information technology ; Security measures. ; Data protection. ; Computer security. ; Risk management. ;

39. Information technology risk management in enterprise environments :
Author: Jake Kouns, Daniel Minoli.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.,Risk management.

40. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Ilam University Central Library (Ilam)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K68
2010

