1. Access to online resources :
Author: by Kristina Botyriute.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Collection management (Libraries),Computer networks-- Security measures.,Database security.,Electronic information resources-- Access control.,Electronic information resources-- Management.,Computer Security.,Information Services.,Internet.,Collection management (Libraries),Computer networks-- Security measures.,Database security.,Electronic information resources-- Access control.,Library & information sciences.
Classification :
Z695
.
24
2. Advances in enterprise information technology securit
Author: / Djamel Khadraoui and Francine Herrmann, editors
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Business enterprises--Computer networks--Security measures,Information technology--Security measures,Computer security.,Data protection.
Classification :
HF
,
5548
.
37
,.
A38
,
2007e
3. Advances in enterprise information technology security /
Author: Djamel Khadraoui, Francine Herrmann [editors]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures,Computer security,Data protection,Information technology-- Security measures
Classification :
HF5548
.
37
.
A38
2007
4. Advances in enterprise information technology security
پدیدآورنده : Djamel Khadraoui, Francine Herrmann ]editors[
موضوع : ، Business enterprises , Computer networks , Security measures,، Information technology , Security measures,، Computer security,، Data protection
۲ نسخه از این کتاب در ۲ کتابخانه موجود است.
5. Advances in enterprise information technology security
Author: Djamel Khadraoui and Francine Herrmann, editors
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Computer networks Security measures ، Business enterprises,Security measures ، Information technology,، Computer security,، Data protection
Classification :
HF
5548
.
37
.
A38
6. Advances in enterprise information technology security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Business enterprises ; Computer networks ; Security measures ; Information technology ; Security measures ; Computer security ; Data protection ;
7. Advances in enterprise information technology security /Djamel Khadraoui and Francine Herrmann, editors.
Author:
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Business enterprises--Computer networks--Security measures,Information technology--Security measures.,Computer security,Data protection
Classification :
HF
5548
.
37
.
A38
2007
8. Advances in enterprise information technology security [electronic book]
Author: / Djamel Khadraoui and Francine Herrmann, editors
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Business enterprises--Computer networks--Security measures,Information technology--Security measures,Computer security,Data protection
Classification :
EB
,
HF5548
.
37
.
A38
2007
9. Applied security visualization /
Author: Raffael Marty
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Information visualization
Classification :
TK5105
.
59
.
M369
2009
10. Aspects of network and information security
Author: edited by Evangelos Kranakis, Evgueni Haroutunian, and Elisa Shahbazian.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Information networks-- Security measures.
11. Aspects of network and information security
Author: / edited by Evangelos Kranakis, Evgueni Haroutunian, and Elisa Shahbazia
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures,Information networks, Security measures
Classification :
E-BOOK
12. Aspects of network and information security
Author: edited by Evangelos Kranakis, Evgueni Haroutunian, and Elisa Shahbazian.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Information networks-- Security measures.
13. Auditing cloud computing :
Author: [edited by] Ben Halpert
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures,Cloud computing-- Security measures,Data protection,Information technology-- Security measures
Classification :
HF5548
.
37
.
A93
2011
14. Big data analytics in cybersecurity /
Author: edited by Onur Savas, Julia Deng.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Big data.,Computer networks-- Security measures.,Computer security.,Database security.,Information technology-- Management.,Big Data,Big data.,Computer networks-- Security measures.,Computer security.,Database security.,Datenanalyse,Datensicherung,Information technology-- Management.
Classification :
QA76
.
9
.
A25
B54
2017
15. Business continuity and disaster recovery for infosec managers
Author: Rittinghouse, John W.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Business -- Data processing -- Security measures,، Crisis management,، Computer networks -- Security measures.,، Information resources management
Classification :
HF
5548
.
37
.
R58
2005
16. Business continuity and disaster recovery for infosec managers /
Author: John W. Rittinghouse, James F. Ransome
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures,Computer networks-- Security measures,Crisis management,Information resources management
Classification :
HF5548
.
37
.
R58
2005
17. CIS
Author: / David L. Cannon
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Examinations--Study guides,Management information systems--Auditing--Examinations--Study guides
Classification :
QA
,
76
.
3
,.
C3445
,
2008eb
18. CISA Certified Information Systems Auditor. study guide
Author: Cannon, David L.,2691-
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer networks, Security measures, Examinations, Study guides,، Management information systems, Auditing, Examinations, Study guides
Classification :
QA
76
.
3
.
C3445
2006