361. Principles of information security
Author: Whitman, Michael E.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Security measures ، Computer networks,، Computer security
Classification :
TK
5105
.
59
.
W54
2012


362. Principles of information security /
Author: Michael E. Whitman, Herbert J. Mattord
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security
Classification :
TK5105
.
59
.
W54
2012


363. Principles of information security /
Author: Michael E. Whitman, Ph. D., CISM, CISSP, Herbert J. Mattord, Ph. D., CISM, CISSP, Kennesaw State University.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer security.
Classification :
TK5105
.
59
.
W54
2018


364. Privacy in a Digital, Networked World
Author: \ Sherali Zeadally , Mohamad Badra Editors
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security.,Information technology -- Security measures.,Digital media -- Security measures.,امنیت رایانه.,فن آوری اطلاعات -- اقدامات امنیتی.,رسانه های دیجیتال -- اقدامات امنیتی
Classification :
QA
76
.
9
.
P75
2015
E-Book
,


365. Proceedings of The IFIP TC 11 23rd International Information Security Conference
Author: / edited by Sushil Jajodia, Pierangela Samarati, Stelvio Cimato.
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer networks -- Security measures -- Congresses, Computers -- Access control -- Congresses, Computer security -- Congresses,Computer networks -- Access control -- Congresses,Data protection -- Congresses
Classification :
QA
76
.
9
.
A25I461
2008


366. Protecting information assets and IT infrastructure in the cloud /
Author: by Ravi Das and Preston de Guise.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures.,Computer networks-- Security measures.,Cloud Computing,Computer networks-- Security measures.,COMPUTERS / Computer Literacy,COMPUTERS / Computer Science,COMPUTERS / Data Processing,COMPUTERS / Hardware / General,COMPUTERS / Information Technology,COMPUTERS / Machine Theory,COMPUTERS / Reference,Computersicherheit,Datensicherung
Classification :
QA76
.
585


367. Readings and Cases in Information Security
Author: / Michael E. Whitman, Herbert J. Mattord,Whitman, Michael E.
Library: Special Library of Law (Tehran)
Subject: Computer networks -- Moral and ethical aspects,Computers -- Access control,Computer networks -- Security measures,Computer security -- Case studies,Confidential communications -- Protection -- Case studies,Privacy, Right of,Information technology -- Law and legislation
Classification :
QA76
.
9
.
A25
W395
2011
,
DB6085


368. Readings and cases in information security
Author: / Michael E. Whitman and Herbert J. Mattord,Whitman
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computer networks -- Moral and ethical aspects,Computer security,Information technology -- Law and legislation,Computer networks -- Security measures -- Law and legislation,Confidential communications -- Protection,Privacy, Right of,Computers -- Access control
Classification :
TK
5105
.
878
.
W5


369. Recent Advances in Information and Communication Technology
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks -- Congresses,Computer networks -- Security measures -- Congresses,Information technology -- Congresses,شبکههای کامپیوتری -- کنگرهها,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها,تکنولوژی اطلاعات -- کنگرهها
Classification :
E-Book
,

370. Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing.
Author: Jeng-Shyang Pan, Akinori Ito, Pei-Wei Tsai, Lakhmi C. Jain, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Big data-- Security measures, Congresses.,Computer networks-- Security measures, Congresses.,Image processing, Congresses.,Multimedia systems, Congresses.,Signal processing, Congresses.,Artificial intelligence.,Computer networks-- Security measures.,COMPUTERS-- Security-- General.,Graphical & digital media applications.,Image processing.,Imaging systems & technology.,Multimedia systems.,Signal processing.
Classification :
QA76
.
9
.
A25
I58
2018


371. Responsive security
Author: Meng-Chow Kang
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures,Data protection,Electronic data processing departments-- Security measures,Information technology-- Security measures,Risk management
Classification :
HF30
.
38
.
K38
2014


372. Rewired :
Author: edited by Ryan Ellis, Vivek Mohan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Government policy.,Internet governance.,Computer networks-- Security measures.,Computer security-- Government policy.,Internet governance.
Classification :
QA76
.
9
.
A25
R436
2019


373. Risk, complexity and ICT /
Author: edited by Ole Hanseth and the late Claudio Ciborra.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Management information systems.,Risk management.,BUSINESS & ECONOMICS-- Information Management.,BUSINESS & ECONOMICS-- Knowledge Capital.,Computer networks-- Security measures.,Management information systems.,Risk management.
Classification :
T58
.
64
.
R57
2007eb


374. Risks and Security of Internet and Systems :
Author: edited by Nora Cuppens, Frédéric Cuppens, Jean-Louis Lanet, Axel Legay, Joaquin Garcia-Alfaro.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Internet-- Security measures, Congresses.,Artificial intelligence.,Artificial intelligence.,Coding theory & cryptology.,Computer science.,Computers-- Expert Systems.,Computers-- Information Technology.,Computers-- Intelligence (AI) & Semantics.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Computers, Special purpose.,Computers.,Data encryption (Computer science),Expert systems-- knowledge-based systems.,Information retrieval.,Information technology: general issues.,Software engineering.,Software Engineering.
Classification :
QA76
.
758
I58
2017


376. Securing the information infrastructure /
Author: Joseph M. Kizza, Florence M. Kizza.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Cyberterrorism.,Information superhighway-- Security measures.,Internet-- Security measures.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Computersicherheit,Cyberterrorism.,Datensicherung,Information superhighway-- Security measures.,Internet-- Security measures.,Internet.
Classification :
HV6773
.
K59
2008eb


377. Security and privacy for next-generation wireless networks /
Author: Sheng Zhong [and six others]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Mobile communication systems-- Security measures.,Wireless communication systems-- Security measures.,Wireless LANs-- Security measures.,Communications engineering-- telecommunications.,Computer security.,TECHNOLOGY & ENGINEERING-- Telecommunication.,WAP (wireless) technology.,Wireless communication systems-- Security measures.,Wireless LANs-- Security measures.
Classification :
TK5103
.
2


378. Security and trust management :
Author: Sokratis K. Katsikas, Cristina Alcaraz (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data encryption (Computer science), Congresses.,Computer networks-- Security measures.,Computer programming-- software development.,Computer security.,Computer security.,Computers-- Hardware-- Network Hardware.,Computers-- Information Technology.,Computers-- Programming-- General.,Computers-- Security-- General.,Computers-- Social Aspects-- Human-Computer Interaction.,Computers-- Software Development & Engineering-- General.,Data encryption (Computer science),Information retrieval.,Information technology: general issues.,Network hardware.,Software Engineering.
Classification :
QA76
.
9
.
A25
S76
2018


379. Security aspects in information technology :
Author: Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Information technology-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
I58
2011


380. Security automation with Ansible 2 :
Author: Madhu Akula, Akash Mahajan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Information technology-- Automation.,Information technology-- Management.,Computer networks-- Security measures.,Information technology-- Management.
Classification :
T58
.
5

