82. Auditing cloud computing :
Author: [edited by] Ben Halpert
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures,Cloud computing-- Security measures,Data protection,Information technology-- Security measures
Classification :
HF5548
.
37
.
A93
2011


87. BL
Author: Seán Duffy, editor ; associate editors, Ailbhe MacShamhráin, James Moynes.
Library: Library of Islamic Parliament (Tehran)
Subject:

88. BL
پدیدآورنده : edited by François Debrix and Mark J. Lacy.
موضوع :
۲ نسخه از این کتاب در ۱ کتابخانه موجود است.
90. BL,Archives and archivists : key collaborators in the digital lbirary / William E. Landis, Robin L. Chandler -- Committing to memory : a project to publish and preserve California local history digital resources / Adrian L. Turner -- Technologically enhanced archival collections : using the buddy system / Dayna Holz -- California cultures : implementing a model for virtual collections / Genie Guerard, Robin L. Chandler -- The importance of user-centered design : exploring findings and methods / Rosalie Lack -- How and why of user studies : RLG's RedLightGreen as a case study / Merrilee Proffitt -- From horse-drawn wagon to hot rod : the University of California's digital image service experience / Maureen A. Burns -- Archiving web sites for preservation and access : MODS, METS and MINERVA / Rebecca Guenther, Leslie Myrick -- Video preservation and digital reformatting : pain and possibility / Jerome McDonough, Mona Jimenez -- Digital archiving and preservation : technologies and processes for a trusted repository / Ronald Jantz, Michael Giarlo -- The complexities of digital resources : collection boundaries and management responsibilities / Joan
Author: Philip Mattar, editor in chief. ,William E. Landis, Robin L. Chandler, editors.
Library: Library of Islamic Parliament (Tehran)
Subject:

91. BL,BL
Author: / Marshall G.S. Hodgson. ,20090530 0
Library: Library of Islamic Parliament (Tehran)
Subject:

92. CISO compass :
Author: Todd Fitzgerald.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,BUSINESS & ECONOMICS-- Management.,Business enterprises-- Computer networks-- Security measures.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Security-- General.
Classification :
TK5105
.
59


93. Cold war history
Author: edited by Frédéric Bozo ... [ et al.].
Library: Library of Islamic Parliament (Tehran)
Subject:

94. Enterprise information security and privacy /
Author: C. Warren Axelrod, Jennifer L. Bayuk, Daniel Schutzer, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.,BUSINESS & ECONOMICS-- Corporate Governance.,BUSINESS & ECONOMICS-- Leadership.,BUSINESS & ECONOMICS-- Organizational Development.,BUSINESS & ECONOMICS-- Workplace Culture.,Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.
Classification :
HF5548
.
37
.
E58
2009eb


95. Enterprise information security and privacy
Author: / C. Warren Axelrod, Jennifer L. Bayuk, Daniel Schutzer, editors.
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Business enterprises--Computer networks--Security measures,Information technology--Security measures.,Computer security,Data protection
Classification :
HF
5548
.
37
.
E58
2009


96. Enterprise information security and privacy
Author: / C. Warren Axelrod, Jennifer L. Bayuk, Daniel Schutzer, editors
Library: Library and knowledge management of the management schools of Tehran University (Tehran)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Computer security,Data protection
Classification :
658
.
478
E61
2009


97. How do rogue nations threaten human rights? -- North Korea represses freedom / Kay Seok -- Iran violates women's rights / Sam Brownback -- Sudanese government engages in genocide / Human Rights Watch -- United States violates human rights worldwide / Vernon Coleman -- Rogue nations undermine the United Nations' mission to promote human rights / Joseph Loconte -- U.S. invasions have not spread democracy in the Middle East / Phyllis Bennis -- How should the global community respond to rogue nations? -- Preemptive force is sometimes necessary to contain rogue nations / National Review -- Preemptive force threatens efforts to contain rogue states / Ivan Eland -- Missile defense system is necessary to protect against rogue nations / Dennis Ross -- Missile defense system is unnecessary / Gwynne Dyer -- Promoting globalization will reduce the threat posed by rogue states / Banning N. Garrett, Dennis M. Sherman -- Globalization
Author: Louise Gerdes, book editor.
Library: Library of Islamic Parliament (Tehran)
Subject:

98. 20090601 ,Includes bibliographical references and index. 0
Author: 20090602 ,20090602 0
Library: Library of Islamic Parliament (Tehran)
Subject:

99. Includes bibliographical references (p. 49-51). 0,B
Author: Zeren Tanındı. ,/ Katie Normington.
Library: Library of Islamic Parliament (Tehran)
Subject:

100. Includes bibliographical references (p. 375) and index. 0
Author: Brian M. Fagan.
Library: Library of Islamic Parliament (Tehran)
Subject:
