21. Cyber-security and global information assurance: threat analysis and response solutions
Author: Kenneth J. Knapp, editor
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Security measures ، Information technology,Management ، Computer security,Security measures ، Cyberspace,، Data protection,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
C918


22. Data protection
Author: / David G. Hill
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer security,Data protection,Information technology -- Security measures
Classification :
QA
76
.
9
.
A25
H5
2009


23. Data protection
Author: / David G. Hill
Library: Library and knowledge management of the management schools of Tehran University (Tehran)
Subject: Computer security,Data protection,Information technology, Security measures
Classification :
005
.
86
H645d
2009


24. Data protection
Author: David G. Hill.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Information technology-- Security measures.

25. Data protection : governance, risk management, and compliance
Author: Hill, David Gary, 1943-
Library: Central Library and Document Center of Isfahan University (Esfahan)
Subject: Computer security. ► Data protection. ► Information technology
Classification :
005
.
H645d


26. Emerging Trends in ICT Security.
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Cyberterrorism-- Prevention.,Electronic surveillance.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25


27. Engineering information security
Author: Stuart Jacobs
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computer security,Computer networks, Security measures,Information technology, Security measures,Data protection
Classification :
QA
،
76
.
9
،.
J3
،
2011


28. Engineering information security
Author: / Stuart Jacobs
Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)
Subject: Computer security,Computer networks, Security measures,Information technology, Security measures
Classification :
QA76
.
9
.
A25J325
2011


29. Engineering information security. the application of systems engineering concepts to achieve information assurance
Author: Jacobs, Stuart.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Computer networks- Security measures,، Information technology- Security measures,، Data protection
Classification :
QA
76
.
9
.
A25
J325
2011


30. Enterprise information security and privacy /
Author: C. Warren Axelrod, Jennifer L. Bayuk, Daniel Schutzer, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.,BUSINESS & ECONOMICS-- Corporate Governance.,BUSINESS & ECONOMICS-- Leadership.,BUSINESS & ECONOMICS-- Organizational Development.,BUSINESS & ECONOMICS-- Workplace Culture.,Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.
Classification :
HF5548
.
37
.
E58
2009eb


31. Enterprise information security and privacy
Author: / C. Warren Axelrod, Jennifer L. Bayuk, Daniel Schutzer, editors.
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Business enterprises--Computer networks--Security measures,Information technology--Security measures.,Computer security,Data protection
Classification :
HF
5548
.
37
.
E58
2009


32. Enterprise information security and privacy
Author: / C. Warren Axelrod, Jennifer L. Bayuk, Daniel Schutzer, editors
Library: Library and knowledge management of the management schools of Tehran University (Tehran)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Computer security,Data protection
Classification :
658
.
478
E61
2009


33. Handbook of research on digital crime, cyberspace security, and information assurance /
Author: Maria Manuela Cruz-Cunha, Polytechnic Institute of Cavado and Ave, Portugal, Irene Maria Portela, Polytechnic Institute of C�avado and Ave, Portugal.
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computer crimes.,Computer security.,Computer networks-- Security measures.,Data protection.,Information technology.
Classification :
HV6773
.
H375
2015


34. Hands-on security in DevOps :
Author: Tony Hsu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control.,Computer networks-- Security measures.,Information technology-- Management.,Computer networks-- Access control.,Computer networks-- Security measures.,COMPUTERS-- Security-- General.,Information technology-- Management.
Classification :
HD30
.
2


35. How to cheat at managing information security /
Author: Mark Osborne ; Paul M. Summitt, technical editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management.,Information technology-- Security measures.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25
O83
2006eb


36. ICT and critical infrastructure :proceedings of the 48th Annual Convention of Computer Society of India
Author: / Suresh Chandra Satapathy, P. S. Avadhani, Siba K. Udgata, Sadasivuni Lakshminarayana, editors
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer science -- Congresses,Information technology -- Congresses,Computer networks -- Congresses,Computer security -- Congresses,Computer networks - Security measures -- Congresses,Engineering,Computational Intelligence,Artificial Intelligence (incl. Robotics)
Classification :
QA75
.
5


37. ICT critical infrastructures and society
Author: Magda David Hercheui ... [et al.] (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Information technology-- Security measures, Congresses
Classification :
TK5105
.
59
.
I35
2012eb


38. ICT critical infrastructures and society
Author: / Magda David Hercheui ... [et al.] (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks--Security measures--Congresses,Information technology--Security measures--Congresses,Computer security--Congresses
Classification :
TK5105
.
59
.
I35
2012


39. IT Convergence and Services
Author: James J. Park...[et al.], editors
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Information technology, Congresses,Wireless communication systems, Congresses
Classification :
T58
.
5
.
I58
2012

