81. Information technology risk management in enterprise environments :
Author: Jake Kouns, Daniel Minoli.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.,Risk management.

82. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Ilam University Central Library (Ilam)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K68
2010


83. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K68
2010


84. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Library and knowledge management of the management schools of Tehran University (Tehran)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
658
.
478
K88i
2010


85. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Business enterprises--Computer networks--Security measures,Information technology--Security measures,Data protection.,Computer security.,Risk management.
Classification :
HF
,
5548
.
37
,.
K68
,
2010


86. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Farabi Faculty Library, University of Tehran (Qom)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF
5548
.
37
.
K68
2010


87. Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams
Author: / Jake Kouns, Daniel Minoli
Library: Insurance Research Institute Library (Tehran)
Subject: Business enterprises --Computer networks --Security measures,Information technology --Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K6I5
2010


88. Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
Author: / Jake Kouns, Daniel Minoli
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K68
2010


89. Information technology security and risk management
Author: edited by Stephen C. Wingreen, Amelia Samandari.
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer security.,Information technology,Security measures.,Information technology.

90. Information technology security & risk management
Author: Slay, Jill
Library: Central Library and Documentation Center (Kerman)
Subject: ، Computer security,، Data protection,Security measures ، Information technology
Classification :
QA
76
.
9
.
S3
I55
2006


91. Information technology, security techniques, code of practice for information security management = Technologies de l'information, techniques de sécurité, code de pratique pour la gestion de sécurité d'information.
Author: International Organization for Standardization.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security -- Standards.,Information technology -- Security measures -- Standards.
Classification :
QA76
.
9
.
A25
I584
9999


92. Information warfare
Author: / Daniel Ventre
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Business intelligence,Trade secrets,Information technology, Security measures,Computer security, Management,Data protection
Classification :
HD38
.
7
.
V4713
2009


93. Information warfare
Author: / Daniel Ventre
Library: Library of Entrepreneurship (Tehran)
Subject: Business intelligence,Trade secrets,Information technology -- Security measures,Computer security -- Management,Data protection
Classification :
HD
38
.
7
.
V4713
2009


94. Information warfare in business
Author: / Iain Munro
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Information technology--Social aspects,Information warfare.,Business intelligence.,Computer security.,Electronic books.--local
Classification :
HM
,
851
,.
M86
,
2004eb


95. Information warfare in business :
Author: Iain Munro.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business intelligence.,Computer security.,Information technology-- Social aspects.,Information warfare.,Business intelligence.,Computer security.,Computersicherheit.,Corporate Network.,Informatiemaatschappij.,Informatietechnologie.,Information technology-- Social aspects.,Information warfare.,Information warfare.,Politieke aspecten.,Sociaal-economische aspecten.
Classification :
HM851
.
M86
2005


96. Information warfare in business strategies of control and resistance in the network society
Author: / Iain Munro
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Information technology , Social aspects,Information warfare,Business intelligence,Computer security,Electronic books. , local
Classification :
HM851
.
M862004eb


97. Innovative security solutions for information technology and communications :
Author: Jean-Louis Lanet, Cristian Toma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Information technology-- Security measures, Congresses.,Computer networks-- Security measures.,Computer security.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25


98. Intelligent systems for security informatics /
Author: Christopher C. Yang ... [et al.]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence,Computer networks-- Security measures,Computer security,Information technology-- Security measures
Classification :
QA76
.
9
.
A25
I584
2013


99. Learning Puppet Security :
Author: Jason Slagle
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Software,Computer security, Software,Information technology-- Security measures
Classification :
QA76
.
9
.
A25


100. Management of information security /
Author: Michael E. Whitman, Herbert J. Mattord.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Management.,Computer security-- Management.,Computer security.,Information technology-- Security measures.,Computer security-- Management.,Computer security.,Computersicherheit,Information technology-- Security measures.,Kryptologie,Risikomanagement
Classification :
TK5105
.
59
.
W45
2019

