• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۲۰ پاسخ غیر تکراری از ۲۰ پاسخ تکراری در مدت زمان ۱,۲۰ ثانیه یافت شد.

1. Advances in enterprise information technology security /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Djamel Khadraoui, Francine Herrmann [editors]

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business enterprises-- Computer networks-- Security measures,Computer security,Data protection,Information technology-- Security measures

Classification :
HF5548
.
37
.
A38
2007

2. Engineering information security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Stuart Jacobs

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: Computer security,Computer networks, Security measures,Information technology, Security measures,Data protection

Classification :
QA
،
76
.
9
،.
J3
،
2011

3. Engineering information security. the application of systems engineering concepts to achieve information assurance

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jacobs, Stuart.

Library: Library of Razi Metallurgical Research Center (Tehran)

Subject: ، Computer security,، Computer networks- Security measures,، Information technology- Security measures,، Data protection

Classification :
QA
76
.
9
.
A25
J325
2011

4. Enterprise information security and privacy /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: C. Warren Axelrod, Jennifer L. Bayuk, Daniel Schutzer, editors.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.,BUSINESS & ECONOMICS-- Corporate Governance.,BUSINESS & ECONOMICS-- Leadership.,BUSINESS & ECONOMICS-- Organizational Development.,BUSINESS & ECONOMICS-- Workplace Culture.,Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.

Classification :
HF5548
.
37
.
E58
2009eb

5. Handbook of research on digital crime, cyberspace security, and information assurance /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Maria Manuela Cruz-Cunha, Polytechnic Institute of Cavado and Ave, Portugal, Irene Maria Portela, Polytechnic Institute of C�avado and Ave, Portugal.

Library: Central Library and Documents Center of Tehran University (Tehran)

Subject: Computer crimes.,Computer security.,Computer networks-- Security measures.,Data protection.,Information technology.

Classification :
HV6773
.
H375
2015

6. Implementing the ISO/IEC 27001 information security management system standard

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Edward Humphreys

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: Computer security -- Management -- Standards,Computer networks -- Security measures -- Standards,Data protection -- Standards,Information technology -- Standards

Classification :
QA
،
76
.
9
،.
A25
,
H855
،
2007

7. Information security management metrics :a definitive guide to effective security monitoring and measurement

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Brotby, W. Krag.

Library: Central Library and Documents Center of Al-Zahra University (Tehran)

Subject: Security measures ، Information technology,، Computer security,Computer networks Security measures ، Business enterprises,، Data protection

Classification :
HD
30
.
2
.
B78
2009

8. Information technology risk management and compliance in modern organizations.

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Manish Gupta...[et al.]

Library: Central library of medical university of Isfahan (Esfahan)

Subject: Business enterprises-- Computer networks-- Security measures. , Information technology-- Security measures. , Data protection, Computer security, Risk management.

Classification :
HF5548
.
37
.
I5
2018

9. Information technology risk management in enterprise environments

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Business enterprises ; Computer networks ; Security measures. ; Information technology ; Security measures. ; Data protection. ; Computer security. ; Risk management. ;

Classification :

10. Information technology risk management in enterprise environments :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jake Kouns, Daniel Minoli.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.,Risk management.

Classification :

11. Information technology risk management in enterprise environments

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jake Kouns, Daniel Minoli

Library: Ilam University Central Library (Ilam)

Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management

Classification :
HF5548
.
37
.
K68
2010

12. Information technology risk management in enterprise environments

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jake Kouns, Daniel Minoli

Library: Central Library and Documents Center of Tehran University (Tehran)

Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management

Classification :
HF5548
.
37
.
K68
2010

13. Information technology risk management in enterprise environments

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jake Kouns, Daniel Minoli

Library: Library and knowledge management of the management schools of Tehran University (Tehran)

Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management

Classification :
658
.
478
K88i
2010

14. Information technology risk management in enterprise environments

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jake Kouns, Daniel Minoli

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Business enterprises--Computer networks--Security measures,Information technology--Security measures,Data protection.,Computer security.,Risk management.

Classification :
HF
,
5548
.
37
,.
K68
,
2010

15. Information technology risk management in enterprise environments

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jake Kouns, Daniel Minoli

Library: Farabi Faculty Library, University of Tehran (Qom)

Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management

Classification :
HF
5548
.
37
.
K68
2010

16. Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jake Kouns, Daniel Minoli

Library: Insurance Research Institute Library (Tehran)

Subject: Business enterprises --Computer networks --Security measures,Information technology --Security measures,Data protection,Computer security,Risk management

Classification :
HF5548
.
37
.
K6I5
2010

17. Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jake Kouns, Daniel Minoli

Library: Central library and document university of Kurdistan (Kurdistan)

Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management

Classification :
HF5548
.
37
.
K68
2010

18. Network Scanning Cookbook /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jetty, Sairam.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.

Classification :

19. Penetration testing fundamentals /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Chuck Easttom.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security)

Classification :
TK5105
.
59

20. The Executive guide to information security: threats, challenges, and solutions

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Mark Egan with Tim Mather

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection

Classification :
HF
،
5548
.
32
،.
E325
،
2005
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival