• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۶۹ پاسخ غیر تکراری از ۶۹ پاسخ تکراری در مدت زمان ۱,۷۰ ثانیه یافت شد.

41. Information technology risk management in enterprise environments :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jake Kouns, Daniel Minoli.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.,Risk management.

Classification :

42. Information technology risk management in enterprise environments

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jake Kouns, Daniel Minoli

Library: Ilam University Central Library (Ilam)

Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management

Classification :
HF5548
.
37
.
K68
2010

43. Information technology risk management in enterprise environments

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jake Kouns, Daniel Minoli

Library: Central Library and Documents Center of Tehran University (Tehran)

Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management

Classification :
HF5548
.
37
.
K68
2010

44. Information technology risk management in enterprise environments

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jake Kouns, Daniel Minoli

Library: Library and knowledge management of the management schools of Tehran University (Tehran)

Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management

Classification :
658
.
478
K88i
2010

45. Information technology risk management in enterprise environments

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jake Kouns, Daniel Minoli

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Business enterprises--Computer networks--Security measures,Information technology--Security measures,Data protection.,Computer security.,Risk management.

Classification :
HF
,
5548
.
37
,.
K68
,
2010

46. Information technology risk management in enterprise environments

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jake Kouns, Daniel Minoli

Library: Farabi Faculty Library, University of Tehran (Qom)

Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management

Classification :
HF
5548
.
37
.
K68
2010

47. Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jake Kouns, Daniel Minoli

Library: Insurance Research Institute Library (Tehran)

Subject: Business enterprises --Computer networks --Security measures,Information technology --Security measures,Data protection,Computer security,Risk management

Classification :
HF5548
.
37
.
K6I5
2010

48. Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Jake Kouns, Daniel Minoli

Library: Central library and document university of Kurdistan (Kurdistan)

Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management

Classification :
HF5548
.
37
.
K68
2010

49. Innovative security solutions for information technology and communications :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jean-Louis Lanet, Cristian Toma (eds.).

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Information technology-- Security measures, Congresses.,Computer networks-- Security measures.,Computer security.,Information technology-- Security measures.

Classification :
QA76
.
9
.
A25

50. Intelligent systems for security informatics /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Christopher C. Yang ... [et al.]

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Artificial intelligence,Computer networks-- Security measures,Computer security,Information technology-- Security measures

Classification :
QA76
.
9
.
A25
I584
2013

51. Learning Puppet Security :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jason Slagle

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Software,Computer security, Software,Information technology-- Security measures

Classification :
QA76
.
9
.
A25

52. Management of information security /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Michael E. Whitman, Herbert J. Mattord.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Management.,Computer security-- Management.,Computer security.,Information technology-- Security measures.,Computer security-- Management.,Computer security.,Computersicherheit,Information technology-- Security measures.,Kryptologie,Risikomanagement

Classification :
TK5105
.
59
.
W45
2019

53. Network Scanning Cookbook /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jetty, Sairam.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.

Classification :

54. Penetration testing fundamentals /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Chuck Easttom.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security)

Classification :
TK5105
.
59

55. Principles of information security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Michael E.Whitman and Herbert J. Mattord

Library: Campus International Library of Kish University of Tehran (Hormozgan)

Subject: Computer networks -- Security measures,Computer security,Information technology -- Security measures

Classification :
TK
5105
.
59
.
W55

56. Recent Advances in Information and Communication Technology

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Computer networks -- Congresses,Computer networks -- Security measures -- Congresses,Information technology -- Congresses,شبکه‌های کامپیوتری -- کنگره‌ها,شبکه‌های کامپیوتری -- تدابیر ایمنی -- کنگره‌ها,تکنولوژی اطلاعات -- کنگره‌ها

Classification :
E-Book
,

57. Security aspects in information technology :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall (editions.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Information technology-- Security measures, Congresses

Classification :
QA76
.
9
.
A25
I58
2011

58. Security automation with Ansible 2 :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Madhu Akula, Akash Mahajan.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Information technology-- Automation.,Information technology-- Management.,Computer networks-- Security measures.,Information technology-- Management.

Classification :
T58
.
5

59. The Executive guide to information security: threats, challenges, and solutions

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Mark Egan with Tim Mather

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection

Classification :
HF
،
5548
.
32
،.
E325
،
2005

60. The art of enterprise information architecture :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Mario Godinez [and others].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business enterprises-- Computer networks-- Security measures.,Information technology-- Management.,Information technology-- Security measures.,Management information systems.,Business & Economics.,Business enterprises-- Computer networks-- Security measures.,Business enterprises-- Computer networks-- Security measures.,Computer Science.,Engineering & Applied Sciences.,Information technology-- Management.,Information technology-- Management.,Information technology-- Security measures.,Information technology-- Security measures.,Management information systems.,Management information systems.,Management Theory.,Management.

Classification :
HD30
.
2
.
A77
2010
  • »
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival