121. Responsive security
Author: Meng-Chow Kang
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures,Data protection,Electronic data processing departments-- Security measures,Information technology-- Security measures,Risk management
Classification :
HF30
.
38
.
K38
2014


122. Risk centric threat modeling :
Author: Tony Uceda Vélez and Marco M. Morana
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Data protection,Management information systems-- Security measures,Risk assessment
Classification :
HF5548
.
37


123. SAS 9.1.3 intelligence platform :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: SAS (Computer file),SAS (Computer file),Computer networks-- Security measures.,Data protection.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.
Classification :
QA76
.
9
.
A25
S27
2006eb


124. Securite Internet: Strategies et technologies
Author: Solange Ghernaouti-Helie
Library: Library of Faculty of Law and Political Science of Tehran University (Tehran)
Subject: Local area networks (Computer networks) -- Security measures,Internet -- Security measures,Data protection,Protection de l`information (informatique),Coupe-feu (securite informatique),Systemes informatiques -- Mesures de surete,Virus informatiques,Reseaux locaux (informatique) -- Mesures de surete,Internet -- Mesures de surete
Classification :
TK5105
.
87
.
G5S4


125. Security and privacy in social network
Author: / Yaniv Altshuler ... [et al., editors]
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Online social networks, Security measures,Data encryption (Computer science),Data protection,Computer crimes, Prevention,Electronic books
Classification :
E-BOOK

126. Security engineering for cloud computing
Author: / David G. Rosado...[et al.]
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Cloud computing -- Security measures,Computer security,Data protection,Computer networks -- Security measures
Classification :
QA
76
.
58
.
S4
2013


127. Security, privacy, and anonymity in computation, communication, and storage :
Author: Guojun Wang, Jinjun Chen, Laurence T. Yang (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Computer security.,Data protection.
Classification :
QA76
.
9
.
A25


128. The Executive guide to information security: threats, challenges, and solutions
Author: Mark Egan with Tim Mather
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection
Classification :
HF
،
5548
.
32
،.
E325
،
2005


129. The business case for network security
Author: / Catherine Paquet, Warren Saxe
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management
Classification :
TK5105
.
59
.
P37
2005


130. The business case for network security
Author: / Catherine Paquet, Warren Saxe
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management
Classification :
TK5105
.
59
.
P37
2005


131. The international handbook of computer security
Author: / Jae K. Shim, Anique A. Qureshi, Joel G. Siegel
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security Handbooks, manuals, etc,Data protection Handbooks, manuals, etc,Computer networks- Security measures Handbooks, manuals, etc
Classification :
QA76
.
9
.
A25
,
S468
2000


132. Topics in Cryptology – CT-RSA 2016
Author: \ Kazue Sako (Ed.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Data encryption (Computer science) -- Congresses.,Data protection -- Congresses.,Computer networks -- Security measures -- Congresses.,رمزگذاری دادهها -- کنگرهها ,حفاظت اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
Classification :
QA
76
.
9
.
T6
2016
E-Book
,


133. Transparent user authentication
Author: / Nathan Clarke
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks, Security measures,Computers, Access control,Data protection
Classification :
E-BOOK

134. Transparent user authentication biometrics, RFID and behavioural profiling
Author: Clarke, Nathan.,Nathan Clarke
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Computer networks, Security measures,، Computers, Access control,، Data protection
Classification :
TK
5105
.
59
.
C575
2011


135. Tribe of Hackers :
Author: Marcus J. Carey & Jennifer Jin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,Computers.,Data protection.,Risk management.,Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Security-- Cryptography.,Computers.,Data protection.,Risk management.
Classification :
HF5548
.
37
C37
2019eb


136. Tribe of hackers :
Author: Marcus J, Carey and Jennifer Jin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,Data protection.,Risk management.,Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,Data protection.,Risk management.

137. counter hack
Author:
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Computer networks - Security measures,Data protection
Classification :
TK
5105
.
59
.
S57
2002


138. مدیریت اطلاعات و امنیت
Author: / ان.سی. آستانا و آنجالی نیرمال,آستهانا,Asthana
Library: National Library and Archives of Islamic Republic of Iran (Tehran)
Subject: تکنولوژی اطلاعات,Information technology,نظامهای اطلاعاتی مدیریت,Management information systems,شبکههای کامپیوتری,Computer networks,حفاظت دادهها,Data protection, -- مدیریت, -- Management, -- تدابیر ایمنی, -- Security measures
Classification :
HD
۳۰
/
۲
/
آ
۴۶
م
۴ ۱۳۹۴
