281. Information assurance architecture
Author: / Keith D. WIllett
Library: Library and knowledge management of the management schools of Tehran University (Tehran)
Subject: Computer security,Computer networks, Security measures,Information resources management,Information technology, Management,Business enterprises, Communication systems, Management,Data protection
Classification :
005
.
8
W713i
2008


282. Information assurance architecture
Author: / Keith D. Willett
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computer security,Computer networks,Information resources management,Information technology,Business enterprises,Data protection,-- Security measures,-- Management,-- Communication systems -- Management
Classification :
005
.
8
W713I
2008


283. Information security (IS) equipment and services in India :
Author: edited by Philip M. Parker.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Economic aspects-- India.,Computer networks-- Security measures-- India.,Information technology-- Equipment and supplies-- Economic aspects-- India.,Information technology-- India-- Equipment and supplies.,Computer networks-- Security measures.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Information technology-- Equipment and supplies.,India., 7
Classification :
TK5105
.
59
.
I54
2007eb


284. Information security a manager's guide to thwarting data thieves and hackers
Author: / Philip Alexander
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Business enterprises , Computer networks , Security measures,Information technology , Security measures,Computer security,Data protection
Classification :
HF5548
.
37
.
A44
2008


285. Information security and digital forensics :
Author: Dasun Weerasinghe (Ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation, Congresses.,Computer networks-- Access control, Congresses.,Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Internet-- Security measures, Congresses.,Computer crimes-- Investigation.,Computer networks-- Access control.,Computer networks-- Security measures.,Computer security.,Informatique.,Internet-- Security measures.
Classification :
QA76
.
9
.
A25
I584
2010


286. Information security and employee behaviour
Author: / Angus McIlwraith
Library: Farabi Faculty Library, University of Tehran (Qom)
Subject: Business enterprises- Computer networks- Security measures,Information technology- Security measures,Employees- Training of
Classification :
HD
30
.
38
.
M35
2006


287. Information security and employee behaviour
Author: / Angus McIlwraith
Library: Library of Entrepreneurship (Tehran)
Subject: Business enterprises -- Computer networks -- Security measures,Information technology -- Security measures,Employees -- Training of.
Classification :
HD
30
.
38
.
M35
2006


288. Information security and employee behaviour :
Author: Angus McIlwraith.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer science.,Computer security.,Employees-- Training of.,Information technology-- Security measures.,Entreprises-- Réseaux d'ordinateurs-- Sécurité-- Mesures.,Personnel-- Formation.,Technologie de l'information-- Sécurité-- Mesures.,BUSINESS & ECONOMICS-- Mentoring & Coaching.,BUSINESS & ECONOMICS-- Training.,Business enterprises-- Computer networks-- Security measures.,Computer science.,Computer security.,Employees-- Training of.,Information technology-- Security measures.
Classification :
HD30
.
38
.
M35
2006eb


289. Information security and employee behaviour: how to reduce risk through employee education, training and awareness
Author: McIlwraith, Angus.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Computer networks - Security measures ، Business enterprises,Security measures ، Information technology,Training of ، Employees
Classification :
HD
30
.
38
.
M35
2006


290. Information security and employee behaviour: how to reduce risk through employee education, training and awareness
Author: McIlwraith, Angus
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Computer networks Security measures ، Business enterprises,Security measures ، Information technology,Training of ، Employees
Classification :
HD
30
.
38
.
M35


291. Information security in research and business :
Author: edited by Louise Yngström, Jan Carlsen.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business -- Data processing -- Security measures -- Congresses.,Business -- Data processing -- Security measures.,Computer security -- Congresses.
Classification :
QA76
.
9
.
A25
E358
1997


292. Information security management metrics :a definitive guide to effective security monitoring and measurement
Author: Brotby, W. Krag.
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: Security measures ، Information technology,، Computer security,Computer networks Security measures ، Business enterprises,، Data protection
Classification :
HD
30
.
2
.
B78
2009


293. Information security technology for applications
Author: Peeter Laud (ed.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses
Classification :
QA76
.
9
.
A25
N67
2011eb


294. Information security technology for applications
Author: Tuomas Aura, Kimmo Järvinen, Kaisa Nyberg (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
N67
2009eb


295. Information technology for counterterrorism
Author: / Committee on the Role of Information Technology in Responding to Terrorism, Computer Science and Telecommunications Board, National Research Council of the National Academies
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Terrorism- Prevention,Information technology United States,Computer security United States,Computer networks- Security measures United States,Telecommunication systems United States
Classification :
HV6432
.
N384
2003


296. Information technology risk management and compliance in modern organizations.
Author: / Manish Gupta...[et al.]
Library: Central library of medical university of Isfahan (Esfahan)
Subject: Business enterprises-- Computer networks-- Security measures. , Information technology-- Security measures. , Data protection, Computer security, Risk management.
Classification :
HF5548
.
37
.
I5
2018


297. Information technology risk management in enterprise environments
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Business enterprises ; Computer networks ; Security measures. ; Information technology ; Security measures. ; Data protection. ; Computer security. ; Risk management. ;

298. Information technology risk management in enterprise environments :
Author: Jake Kouns, Daniel Minoli.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.,Risk management.

299. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Ilam University Central Library (Ilam)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K68
2010


300. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K68
2010

