361. Principles of information security /
Author: Michael E. Whitman, Herbert J. Mattord
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security
Classification :
TK5105
.
59
.
W54
2012


362. Principles of information security /
Author: Michael E. Whitman, Ph. D., CISM, CISSP, Herbert J. Mattord, Ph. D., CISM, CISSP, Kennesaw State University.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer security.
Classification :
TK5105
.
59
.
W54
2018


363. Privacy in a Digital, Networked World
Author: \ Sherali Zeadally , Mohamad Badra Editors
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security.,Information technology -- Security measures.,Digital media -- Security measures.,امنیت رایانه.,فن آوری اطلاعات -- اقدامات امنیتی.,رسانه های دیجیتال -- اقدامات امنیتی
Classification :
QA
76
.
9
.
P75
2015
E-Book
,


364. Proceedings of The IFIP TC 11 23rd International Information Security Conference
Author: / edited by Sushil Jajodia, Pierangela Samarati, Stelvio Cimato.
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer networks -- Security measures -- Congresses, Computers -- Access control -- Congresses, Computer security -- Congresses,Computer networks -- Access control -- Congresses,Data protection -- Congresses
Classification :
QA
76
.
9
.
A25I461
2008


365. Protecting information assets and IT infrastructure in the cloud /
Author: by Ravi Das and Preston de Guise.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures.,Computer networks-- Security measures.,Cloud Computing,Computer networks-- Security measures.,COMPUTERS / Computer Literacy,COMPUTERS / Computer Science,COMPUTERS / Data Processing,COMPUTERS / Hardware / General,COMPUTERS / Information Technology,COMPUTERS / Machine Theory,COMPUTERS / Reference,Computersicherheit,Datensicherung
Classification :
QA76
.
585


366. Readings and cases in information security
Author: / Michael E. Whitman and Herbert J. Mattord,Whitman
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computer networks -- Moral and ethical aspects,Computer security,Information technology -- Law and legislation,Computer networks -- Security measures -- Law and legislation,Confidential communications -- Protection,Privacy, Right of,Computers -- Access control
Classification :
TK
5105
.
878
.
W5


367. Recent Advances in Information and Communication Technology
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks -- Congresses,Computer networks -- Security measures -- Congresses,Information technology -- Congresses,شبکههای کامپیوتری -- کنگرهها,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها,تکنولوژی اطلاعات -- کنگرهها
Classification :
E-Book
,

368. Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing.
Author: Jeng-Shyang Pan, Akinori Ito, Pei-Wei Tsai, Lakhmi C. Jain, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Big data-- Security measures, Congresses.,Computer networks-- Security measures, Congresses.,Image processing, Congresses.,Multimedia systems, Congresses.,Signal processing, Congresses.,Artificial intelligence.,Computer networks-- Security measures.,COMPUTERS-- Security-- General.,Graphical & digital media applications.,Image processing.,Imaging systems & technology.,Multimedia systems.,Signal processing.
Classification :
QA76
.
9
.
A25
I58
2018


369. Responsive security
Author: Meng-Chow Kang
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures,Data protection,Electronic data processing departments-- Security measures,Information technology-- Security measures,Risk management
Classification :
HF30
.
38
.
K38
2014


370. Rewired :
Author: edited by Ryan Ellis, Vivek Mohan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Government policy.,Internet governance.,Computer networks-- Security measures.,Computer security-- Government policy.,Internet governance.
Classification :
QA76
.
9
.
A25
R436
2019


371. Risk, complexity and ICT /
Author: edited by Ole Hanseth and the late Claudio Ciborra.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Management information systems.,Risk management.,BUSINESS & ECONOMICS-- Information Management.,BUSINESS & ECONOMICS-- Knowledge Capital.,Computer networks-- Security measures.,Management information systems.,Risk management.
Classification :
T58
.
64
.
R57
2007eb


372. Risks and Security of Internet and Systems :
Author: edited by Nora Cuppens, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquin Garcia-Alfaro.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Internet-- Security measures, Congresses.,Artificial intelligence.,Artificial intelligence.,Coding theory & cryptology.,Computer science.,Computers-- Expert Systems.,Computers-- Information Technology.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Computers, Special purpose.,Computers.,Data encryption (Computer science),Expert systems-- knowledge-based systems.,Information retrieval.,Information technology: general issues.,Software engineering.,Software Engineering.
Classification :
QA76
.
758
I58
2017


374. Securing the information infrastructure /
Author: Joseph M. Kizza, Florence M. Kizza.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Cyberterrorism.,Information superhighway-- Security measures.,Internet-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Computersicherheit,Cyberterrorism.,Datensicherung,Information superhighway-- Security measures.,Internet-- Security measures.,Internet.
Classification :
HV6773
.
K59
2008eb


375. Security and privacy for next-generation wireless networks /
Author: Sheng Zhong [and six others]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Mobile communication systems-- Security measures.,Wireless communication systems-- Security measures.,Wireless LANs-- Security measures.,Communications engineering-- telecommunications.,Computer security.,TECHNOLOGY & ENGINEERING-- Telecommunication.,WAP (wireless) technology.,Wireless communication systems-- Security measures.,Wireless LANs-- Security measures.
Classification :
TK5103
.
2


376. Security and trust management :
Author: Sokratis K. Katsikas, Cristina Alcaraz (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer programming-- software development.,Computer security.,Computer security.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Computers-- Programming-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Information retrieval.,Information technology: general issues.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25
S76
2018


377. Security aspects in information technology :
Author: Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Information technology-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
I58
2011


378. Security automation with Ansible 2 :
Author: Madhu Akula, Akash Mahajan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Information technology-- Automation.,Information technology-- Management.,Computer networks-- Security measures.,Information technology-- Management.
Classification :
T58
.
5


379. Security informatics and terrorism :
Author: edited by Cecilia S. Gal, Paul B. Kantor and Bracha Shapira.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Cyberterrorism-- Prevention, Congresses.,Terrorism and mass media, Congresses.,Terrorism-- Prevention, Congresses.,Computer networks-- Security measures.,Computer security.,Cyberterrorism-- Prevention.,TECHNOLOGY & ENGINEERING-- Electrical.,Terrorism and mass media.,Terrorism-- Prevention.
Classification :
HV6773
.
N415
2008eb


380. Security intelligence :
Author: Qing Li, Gregory Clark
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Electronic information resources-- Access control.,Computer networks-- Security measures. World Wide Web-- Security measures.,Computer science.,Network security.
Classification :
TK5105
.
59

