• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۴۶۶ پاسخ غیر تکراری از ۴۷۹ پاسخ تکراری در مدت زمان ۲,۴۲ ثانیه یافت شد.

281. Information assurance architecture

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Keith D. WIllett

Library: Library and knowledge management of the management schools of Tehran University (Tehran)

Subject: Computer security,Computer networks, Security measures,Information resources management,Information technology, Management,Business enterprises, Communication systems, Management,Data protection

Classification :
005
.
8
W713i
2008

282. Information assurance architecture

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Keith D. Willett

Library: Central Library and Archive Center of shahid Beheshti University (Tehran)

Subject: Computer security,Computer networks,Information resources management,Information technology,Business enterprises,Data protection,-- Security measures,-- Management,-- Communication systems -- Management

Classification :
005
.
8
W713I
2008

283. Information security (IS) equipment and services in India :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Philip M. Parker.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Economic aspects-- India.,Computer networks-- Security measures-- India.,Information technology-- Equipment and supplies-- Economic aspects-- India.,Information technology-- India-- Equipment and supplies.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Information technology-- Equipment and supplies.,India., 7

Classification :
TK5105
.
59
.
I54
2007eb

284. Information security a manager's guide to thwarting data thieves and hackers

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Philip Alexander

Library: Central library and document university of Kurdistan (Kurdistan)

Subject: Business enterprises , Computer networks , Security measures,Information technology , Security measures,Computer security,Data protection

Classification :
HF5548
.
37
.
A44
2008

285. Information security and digital forensics :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Dasun Weerasinghe (Ed.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes-- Investigation, Congresses.,Computer networks-- Access control, Congresses.,Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Internet-- Security measures, Congresses.,Computer crimes-- Investigation.,Computer networks-- Access control.,Computer networks-- Security measures.,Computer security.,Informatique.,Internet-- Security measures.

Classification :
QA76
.
9
.
A25
I584
2010

286. Information security and employee behaviour

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Angus McIlwraith

Library: Farabi Faculty Library, University of Tehran (Qom)

Subject: Business enterprises- Computer networks- Security measures,Information technology- Security measures,Employees- Training of

Classification :
HD
30
.
38
.
M35
2006

287. Information security and employee behaviour

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Angus McIlwraith

Library: Library of Entrepreneurship (Tehran)

Subject: Business enterprises -- Computer networks -- Security measures,Information technology -- Security measures,Employees -- Training of.

Classification :
HD
30
.
38
.
M35
2006

288. Information security and employee behaviour :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Angus McIlwraith.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business enterprises-- Computer networks-- Security measures.,Computer science.,Computer security.,Employees-- Training of.,Information technology-- Security measures.,Entreprises-- Réseaux d'ordinateurs-- Sécurité-- Mesures.,Personnel-- Formation.,Technologie de l'information-- Sécurité-- Mesures.,BUSINESS & ECONOMICS-- Mentoring & Coaching.,BUSINESS & ECONOMICS-- Training.,Business enterprises-- Computer networks-- Security measures.,Computer science.,Computer security.,Employees-- Training of.,Information technology-- Security measures.

Classification :
HD30
.
38
.
M35
2006eb

289. Information security and employee behaviour: how to reduce risk through employee education, training and awareness

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: McIlwraith, Angus.

Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)

Subject: Computer networks - Security measures ، Business enterprises,Security measures ، Information technology,Training of ، Employees

Classification :
HD
30
.
38
.
M35
2006

290. Information security and employee behaviour: how to reduce risk through employee education, training and awareness

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: McIlwraith, Angus

Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)

Subject: Computer networks Security measures ، Business enterprises,Security measures ، Information technology,Training of ، Employees

Classification :
HD
30
.
38
.
M35

291. Information security in research and business :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Louise Yngström, Jan Carlsen.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business -- Data processing -- Security measures -- Congresses.,Business -- Data processing -- Security measures.,Computer security -- Congresses.

Classification :
QA76
.
9
.
A25
E358
1997

292. Information security management metrics :a definitive guide to effective security monitoring and measurement

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Brotby, W. Krag.

Library: Central Library and Documents Center of Al-Zahra University (Tehran)

Subject: Security measures ، Information technology,، Computer security,Computer networks Security measures ، Business enterprises,، Data protection

Classification :
HD
30
.
2
.
B78
2009

293. Information security technology for applications

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Peeter Laud (ed.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses

Classification :
QA76
.
9
.
A25
N67
2011eb

294. Information security technology for applications

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Tuomas Aura, Kimmo Järvinen, Kaisa Nyberg (eds.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data protection, Congresses

Classification :
QA76
.
9
.
A25
N67
2009eb

295. Information technology for counterterrorism

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Committee on the Role of Information Technology in Responding to Terrorism, Computer Science and Telecommunications Board, National Research Council of the National Academies

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Terrorism- Prevention,Information technology United States,Computer security United States,Computer networks- Security measures United States,Telecommunication systems United States

Classification :
HV6432
.
N384
2003

296. Information technology risk management and compliance in modern organizations.

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Manish Gupta...[et al.]

Library: Central library of medical university of Isfahan (Esfahan)

Subject: Business enterprises-- Computer networks-- Security measures. , Information technology-- Security measures. , Data protection, Computer security, Risk management.

Classification :
HF5548
.
37
.
I5
2018

297. Information technology risk management in enterprise environments

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Business enterprises ; Computer networks ; Security measures. ; Information technology ; Security measures. ; Data protection. ; Computer security. ; Risk management. ;

Classification :

298. Information technology risk management in enterprise environments :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jake Kouns, Daniel Minoli.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.,Risk management.

Classification :

299. Information technology risk management in enterprise environments

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jake Kouns, Daniel Minoli

Library: Ilam University Central Library (Ilam)

Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management

Classification :
HF5548
.
37
.
K68
2010

300. Information technology risk management in enterprise environments

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jake Kouns, Daniel Minoli

Library: Central Library and Documents Center of Tehran University (Tehran)

Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management

Classification :
HF5548
.
37
.
K68
2010
  • »
  • 24
  • 23
  • 22
  • 21
  • 20
  • 19
  • 18
  • 17
  • 16
  • 15
  • 14
  • 13
  • 12
  • 11
  • ...
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival