• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۵۴۰ پاسخ غیر تکراری از ۵۴۹ پاسخ تکراری در مدت زمان ۱,۸۱ ثانیه یافت شد.

481. The CIO's guide to information security incident management /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Eur Ing Matthew W.A. Pemble, Wendy F. Goucher.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Data protection.,BUSINESS & ECONOMICS-- Production & Operations Management.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Security-- General.,Data protection.

Classification :
QA76
.
9
.
A25
P46
2019

482. The CISO handbook :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Michael Gentile, Ronald D. Collette, Thomas D. August.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Data protection.,Electronic data processing departments-- Security measures.,BUSINESS & ECONOMICS-- Corporate Governance.,BUSINESS & ECONOMICS-- Leadership.,BUSINESS & ECONOMICS-- Organizational Development.,BUSINESS & ECONOMICS-- Workplace Culture.,Computer security.,Data protection.,Electronic data processing departments-- Security measures.

Classification :
HF5548
.
37
.
G46
2006eb

483. The Executive guide to information security: threats, challenges, and solutions

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Mark Egan with Tim Mather

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection

Classification :
HF
،
5548
.
32
،.
E325
،
2005

484. The NCSA guide to enterprise security : protecting information assets

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Kabay, Michel E.

Library: Central Library of Amirkabir University of Technology (Tehran)

Subject: Computer security , Data protection

Classification :
QA
76
.
9
.
A25
K32
1996

485. The NCSA guide to enterprise security : protecting information assets

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Michel E. Kabay

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Computer security,، Data protection

Classification :
QA
76
.
9
.
A25K3

486. The art of invisibility :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Kevin Mitnick with Robert Vamosi ; foreword by Mikko Hypponen.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Data protection.,Internet-- Security measures.,Privacy, Right of.,Privacy, Right of, Popular works.,Computer security.,COMPUTERS-- Hardware-- Mobile Devices.,COMPUTERS-- Hardware-- Personal Computers.,COMPUTERS-- Internet.,COMPUTERS-- Security-- Online Safety & Privacy.,COMPUTERS-- Social Aspects.,COMPUTERS-- Web-- Social Media.,Data protection.,Internet-- Security measures.,Privacy, Right of.,TECHNOLOGY & ENGINEERING-- Mobile & Wireless Communications.,TECHNOLOGY & ENGINEERING-- Social Aspects.,TECHNOLOGY & ENGINEERING-- Telecommunications.

Classification :
TK5105
.
875
.
I57
M58
2017

487. The art of invisibility :the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Mitnick, Kevin D. )Kevin David(

Library: Library of Razi Metallurgical Research Center (Tehran)

Subject: Security measures ، Internet,، Computer security,، Data protection,، Privacy, Right of

Classification :
TK
5105
.
I57M58
2017

488. The baby harvest :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Chris Rock.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes.,Data protection.,Security, International.

Classification :

489. The baby harvest :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Chris Rock.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes.,Data protection.,Security, International.

Classification :

490. The business case for network security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Catherine Paquet, Warren Saxe

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management

Classification :
TK5105
.
59
.
P37
2005

491. The business case for network security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Catherine Paquet, Warren Saxe

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management

Classification :
TK5105
.
59
.
P37
2005

492. The chief information security officer

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Barry L. Kouns, Jake Kouns.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business-- Data processing-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.

Classification :

493. The complete book of data anonymization :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Balaji Raghunathan.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Data protection.,Database management.,Database security.

Classification :
QA76
.
9
.
A25
.
R338
2013

494. The death of the internet

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: edited by Markus Jakobsson

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes,Data protection,Electronic commerce-- Security measures,Internet-- Security measures

Classification :
TK5105
.
875
.
I57
.
J34
2012

495. The executive MBA in information security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / John J. Trinckes, Jr

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Data protection.,Computer security.,Information technology--Security measures

Classification :
HF5548
.
37
.
T75
2010

496. <The> executive guide to information Security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Mark Egan

Library: Library and knowledge management of the management schools of Tehran University (Tehran)

Subject: Data protection.,Computer security.,Information technology-Security measures

Classification :
005
.
8
E28e

497. The information systems security officer's guide

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Gerald L. Kovacich

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer security,Data protection

Classification :
QA76
.
9
.
A25
,
K68
2003

498. The information systems security officer's guide

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Gerald L. Kovacich

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer security,Data protection

Classification :
QA76
.
9
.
A25
,
K68
2003

499. The information systems security officer's guide

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Gerald L. Kovacich

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer security,Data protection

Classification :
QA76
.
9
.
A25
,
K68
2003

500. The information systems security officer's guide :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Gerald L. Kovacich.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Data protection.,Protection de l'information (Informatique),Sécurité informatique.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.

Classification :
QA76
.
9
.
A25
K68
2003eb
  • »
  • 27
  • 26
  • 25
  • 24
  • 23
  • 22
  • 21
  • ...
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival