61. Hacking exposed :network security secrets & solutions
پدیدآورنده : McClure, Stuart
موضوع : ، Computer security,Security measures ، Computer networks,، Data protection
۲ نسخه از این کتاب در ۲ کتابخانه موجود است.
62. Handbook of research on digital crime, cyberspace security, and information assurance /
Author: Maria Manuela Cruz-Cunha, Polytechnic Institute of Cavado and Ave, Portugal, Irene Maria Portela, Polytechnic Institute of C�avado and Ave, Portugal.
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computer crimes.,Computer security.,Computer networks-- Security measures.,Data protection.,Information technology.
Classification :
HV6773
.
H375
2015


63. IT governance :
Author: Alan Calder & Steve Watkins.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Business enterprises-- Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.
Classification :
QA76
.
9
.
A25
C342
2008eb


64. IT governance : a manager's guide to data security and ISO 27001/ISO 27002
Author: Calder, Alan
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Data protection,Computer networks Security measures ، Business enterprises
Classification :
QA
76
.
9
.
A25
C342
2008


65. Implementing the ISO/IEC 27001 information security management system standard
Author: Edward Humphreys,Title
Library: Central Library of Imam Khomeini International University of Qazvin (Qazvin)
Subject: Computer security- Management- Standards,Computer networks- Security measures- Standards,Data protection- Standards,Information technology- Standards
Classification :
QA
.
A25
,
H855
76
.
9
2007


66. Implementing the ISO/IEC 27001 information security management system standard
Author: Edward Humphreys
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computer security -- Management -- Standards,Computer networks -- Security measures -- Standards,Data protection -- Standards,Information technology -- Standards
Classification :
QA
،
76
.
9
،.
A25
,
H855
،
2007


67. Implementing the ISO/IEC 27001 information security management system standard
Author: Humphreys, Edward.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Management - Standards ، Computer security,Security measures - Standards ، Computer networks,Standards ، Data protection,Standards ، Information technology
Classification :
QA
76
.
9
.
A25
H855
2007


68. Information Security and Assurance
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data protection -- Congresses,Computer security -- Congresses,Computer networks -- Security measures -- Congresses,حفاظت دادهها -- کنگرهها,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
E-Book
,

69. Information Systems Security and privacy.
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.,Data protection -- Congresses.,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,رمزگذاری دادهها -- کنگرهها ,حفاظت اطلاعات -- کنگرهها
Classification :
TK
5105
.
59
.
I532
2015
E-Book
,


70. Information and Communications Security
Author: \ Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks -- Security measures -- Congresses,Data protection -- Congresses,Data encryption (Computer science) -- Congresses,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها,حفاظت اطلاعات -- کنگرهها,رمزگذاری دادهها -- کنگرهها
Classification :
TK
5105
.
59
.
I25
I58
2016
E-Book
,


71. Information and Communications Security
Author: \ [Edited by] Lucas C. K. Hui...[et.al]
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Data protection -- Congresses.,Data encryption (Computer science) -- Congresses.,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,حفاظت اطلاعات -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
Classification :
TK
5105
.
59
.
I5
2015
E-Book
,


72. Information assurance architecture
Author: Keith D. WIllett
Library: Library of Faculty of Management of Tehran University (Tehran)
Subject: Computer Security,Computer networks, Security measures,Information resources management,Information technology, Management,Business enterprises, Communication systems, Management,Data protection

73. Information hiding in communication networks :
Author: Wojciech Mazurczyk...[et al.].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Data protection.
Classification :
QA76
.
9
.
A25


74. Information security a manager's guide to thwarting data thieves and hackers
Author: Alexander, Philip, 3691-,Philip Alexander
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Business enterprises , Computer networks , Security measures,، Information technology , Security measures,، Computer security,، Data protection
Classification :
HF
5548
.
37
.
A44
2008


75. Information security design, implementation, measurement, and compliance
Author: Layton, Timothy P.,Timothy P. Layton
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Business , Data processing , Security measures,، Business enterprises , Computer networks , Security measures,، Data protection,، Computer security,، Risk assessment,، Confidential business information
Classification :
HF
5548
.
37
.
L393
2007


76. Information security management metrics :a definitive guide to effective security monitoring and measurement
Author: Brotby, W. Krag.
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: Security measures ، Information technology,، Computer security,Computer networks Security measures ، Business enterprises,، Data protection
Classification :
HD
30
.
2
.
B78
2009


77. Information security practice and experience : first International Conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings
Author: Robert H. Deng... ]et al.[ )eds.(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Computer networks -- Security measures,Congresses ، Data protection
Classification :
QA
76
.
L28
Vol
.
3439


78. Information security technology for applications
Author: Tuomas Aura, Kimmo Järvinen, Kaisa Nyberg (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
N67
2009eb


79. Information security theory and practice
Author: / dhiren R.patel
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security- Congresses,Computer networks- Security measures- Congresses,Data protection- Congresses
Classification :
QA76
.
9
.
D5
2008


80. Information security theory and practice
Author: Ioannis Askoxylakis, Henrich C. Pöhls, Joachim Posegga (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
W59
2012eb

