461. Security strategy
Author: / Bill Stackpole and Eric Oksendahl
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security.,Information technology--Security measures,Data protection.,Business--Data processing--Security measures

462. Security strategy
Author: Bill Stackpole and Eric Oksendahl
Library: Library and Information Center of Ayatollah Imani of Salman Farsi University (Fars)
Subject: Computer security,Information technology, Security measures,Data protection,Business, Data processing, Security measures
Classification :
QA
76
,.
9
.
S78S4
2011


463. Security strategy : from requirements to reality
Author: Stackpole, Bill
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer security ► Information technology- Security measures ► Data protection ► Business- Data processing Security measures
Classification :
005
S775s


464. Security strategy: <from requirements to reality>
Author: / Bill Stackpole and Eric Oksendahl
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computer security,Information technology,Data protection,Business,-- Security measures,-- Data processing -- Security measures
Classification :
005
.
8
S775S
2011


465. Security without obscurity :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Data protection-- Standards.,Public key infrastructure (Computer security)
Classification :
QA76
.
9
.
A25


466. Simple computer security : disinfect your PC
Author: CA, with Eric Geier and Jim Geier
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Data protection
Classification :
QA
76
.
9
.
A25G44


467. Simple computer security :disinfect your PC
Author: Eric Geier, Jim Geier
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Data protection
Classification :
QA
76
.
9
.
A25
G45
2007


468. SmartData
Author: Inman Harvey ... [et al.], editors
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Data protection
Classification :
QA76
.
9
.
A25
S63
2013


469. Solving Cyber Risk :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,BUSINESS & ECONOMICS-- Insurance-- Risk Assessment & Management.,Computer security.,Data protection.
Classification :
QA76
.
9
.
A25
C577
2018


470. StorageSS '05 : proceedings of the 2005 ACM Workshop on Storage Security and Survivability, November 11, 2005, Fairfax, Virginia, USA )co-located with CCS 2005(
Author: William Yurcik, Larry Brumbaugh, & Yuanyuan Zhou, editors; sponsored by ACM Special Interest Group on Security, Audit & Control ) SIGSAC(
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Congresses ، Computer security,Congresses ، Data protection
Classification :
QA
76
.
9
.
A25A367
2005


471. System Administration Ethics
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Data protection. ; Business ethics. ; Computer security. ; Security. ;

472. Techniques and applications for advanced information privacy and securit
Author: / Hamid R. Nemati, [editor]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Information technology--Security measures,Electronic commerce--Security measures,Computer security.,Data protection.
Classification :
HF
,
5548
.
37
,.
T43
,
2009


473. Techniques and applications for advanced information privacy and security :
Author: Hamid R. Nemati, editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Electronic commerce-- Security measures.,Information technology-- Security measures.,Computer security.,Data protection.,Electronic commerce-- Security measures.,Information technology-- Security measures.
Classification :
HF5548
.
37
.
T43
2009


474. Techniques and applications for advanced information privacy and security : emerging organizational, ethical, and human issues
Author: ]edited by[ Hamid R. Nemati
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Security measures ، Electronic commerce,Security measures ، Information technology,، Computer security,، Data protection
Classification :
HF
5548
.
37
.
T43
2009


475. Techniques and applications of digital watermarking and content protection
Author: / Michael Arnold, Martin Schmucker, Stephen D. Wolthusen
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Digital watermarking,Data protection
Classification :
QA76
.
9
.
A25
,
A76
2003


476. Techniques and applications of digital watermarking and content protection
Author: Arnold, Michael
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer security ► Digital watermarking ► Data protection
Classification :
76
.
9
.
A25
A76

477. Techniques and applications of digital watermarking and content protection
Author: Michael Arnold, Martin Schmucker, Stephen D. Wolthusen.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Digital watermarking.

478. Techniques and applications of digital watermarking and content protection
Author: / Michael Arnold, Martin Schmucker, Stephen D. Wolthusen
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Digital watermarking,Data protection
Classification :
QA76
.
9
.
A25
,
A76
2003


479. Techniques and applications of digital watermarking and content protection
Author: Michael Arnold, Martin Schmucker, Stephen D. Wolthusen.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Digital watermarking.

480. <The> Architecture of Privacy
Author: \ Courtney Bowman...[et.al] ; edited by Elissa Lerner.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Information technology-- Security measures.,Software engineering-- Security measures.,Computer security.,Data protection.,Privacy.,تکنولوژی اطلاعات -- تدابیر ایمنی ,مهندسی نرم افزار -- تدابیر ایمنی,امنیت کامپیوتر ,حفاظت دادهها
Classification :
QA
76
.
9
.
A7
2015
E-Book
,

