1. A business guide to information security :
Author: Alan Calder
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures,Computer security,Data protection,Information resources management-- Security measures,Information technology-- Security measures
Classification :
QA76
.
9
.
A25
C34188
2005
2. Access to online resources :
Author: by Kristina Botyriute.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Collection management (Libraries),Computer networks-- Security measures.,Database security.,Electronic information resources-- Access control.,Electronic information resources-- Management.,Computer Security.,Information Services.,Internet.,Collection management (Libraries),Computer networks-- Security measures.,Database security.,Electronic information resources-- Access control.,Library & information sciences.
Classification :
Z695
.
24
3. Business continuity and disaster recovery for infosec managers
Author: Rittinghouse, John W.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Business -- Data processing -- Security measures,، Crisis management,، Computer networks -- Security measures.,، Information resources management
Classification :
HF
5548
.
37
.
R58
2005
4. Business continuity and disaster recovery for infosec managers /
Author: John W. Rittinghouse, James F. Ransome
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures,Computer networks-- Security measures,Crisis management,Information resources management
Classification :
HF5548
.
37
.
R58
2005
5. Digital privacy in the marketplace :
Author: George R. Milne
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Consumer protection,Data protection,Information resources management-- Security measures,Internet-- Access control,Teleshopping-- Security measures
Classification :
QA76
.
9
.
A25
M5824
2015
6. IT disaster recovery planning for dummies
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Information technology ; Security measures. ; Information resources management. ; Emergency management. ;
7. IT disaster recovery planning for dummies
Author: / Peter Gregory
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Information technology--Security measures,Information resources management.,Emergency management.
Classification :
HF
,
5548
.
37
,.
G74
,
2008
8. Information assurance architecture
Author: / Keith D. WIllett
Library: Insurance Research Institute Library (Tehran)
Subject: Computer security,Computer networks, Security measures,Information resources management,Information technology, Management,Business enterprises, Communication systems, Management,Data protection
Classification :
QA76
.
9
.
W3I5
2008
9. Information assurance architecture
Author: / Keith D. WIllett
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security.,Computer networks--Security measures,Information resources management.,Information technology--Management,Business enterprises--Communication systems--Management,Data protection.
Classification :
QA76
.
9
.
A25
,
W5487
2008
10. Information assurance architecture
Author: Keith D. WIllett
Library: Library of Faculty of Management of Tehran University (Tehran)
Subject: Computer Security,Computer networks, Security measures,Information resources management,Information technology, Management,Business enterprises, Communication systems, Management,Data protection
11. Information security analytics :
Author: Mark Ryan M. Talabis, Robert McPherson, I. Miyamoto, Jason L. Martin ; D. Kaye, technical editor
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Big data-- Security measures,Computer security,Information resources management-- Security measures
Classification :
QA76
.
9
.
A25
12. Managing information risk and the economics of security /M. Eric Johnson.
Author:
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Business enterprises -- Computer networks -- Security measures -- Economic aspects.,Information resources management -- Security measures -- Economic aspects.,Computer security -- Economic aspects.,Risk management
Classification :
HD
30
.
38
.
M36
2009
13. Network security evaluation using the NSA IEM
Author: Russ Rogers, technical editor and contributor; Bryan Cunningham ... ]et al.[
Library: Central Library and Documentation Center (Kerman)
Subject: Evaluation ، Computer networks - Security measures,Evaluation ، Computer security,Evaluation ، Information resources management
Classification :
TK
5105
.
59
.
N33
2005
14. Official (ISC)2 guide to the CAP CBK /
Author: Patrick D. Howard
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Administrative agencies-- Information resources management-- Security measures-- United States-- Examinations, Study guides,Computer networks-- Security measures-- Examinations, Study guides,Computers-- Access control-- Examinations, Study guides,Telecommunications engineers-- Certification-- United States
Classification :
TK5105
.
59
15. Secure Information Management Using Linguistic Threshold Approach
Author: \ Marek R.Ogiela, Urszula Ogiela
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Information resources management -- Security measures.,منابع اطلاعاتی -- مدیریت -- تدابیر ایمنی
Classification :
T
58
.
64
.
O34S4
2014
E-Book
,
16. Secure information management using linguistic threshold approach
Author: Ogiela, Marek R.,Marek R. Ogiela, Urszula Ogiela
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: Security measures ، Information resources management
Classification :
T58
.
64
.
O45
2013
17. Secure information management using linguistic threshold approach /
Author: Marek R. Ogiela, Urszula Ogiela
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Information resources management-- Security measures
Classification :
T58
.
64
.
O45
2013
18. The basics of information security
Author: Jason Andress.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Information resources management.
19. The basics of information security : understanding the fundamentals of InfoSec in theory and practice
Author: Andress, Jason.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,Security measures ، Computer networks,، Information resources management
Classification :
QA
76
.
9
.
A25
A5453
2011
20. The official (ISC)² CISSP CBK reference /
Author: John Warsinkse ; with Mark Graff, Kevin Henry, Christopher Hoover, Ben Malisow, Sean Murphy, C. Paul Oakes, George Pajari, Jeff T. Parker, David Seidl, Mike Vasquez.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Administrative agencies-- Information resources management-- Security measures-- United States-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations, Study guides.,Computers-- Access control-- Examinations, Study guides.,Telecommunications engineers-- Certification-- United States.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer networks-- Security measures-- Examinations.,Telecommunications engineers-- Certification.,United States., 7
Classification :
TK5105
.
59