41. Information technology risk management in enterprise environments :
Author: Jake Kouns, Daniel Minoli.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.,Risk management.

42. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Ilam University Central Library (Ilam)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K68
2010


43. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K68
2010


44. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Library and knowledge management of the management schools of Tehran University (Tehran)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
658
.
478
K88i
2010


45. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Business enterprises--Computer networks--Security measures,Information technology--Security measures,Data protection.,Computer security.,Risk management.
Classification :
HF
,
5548
.
37
,.
K68
,
2010


46. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Farabi Faculty Library, University of Tehran (Qom)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF
5548
.
37
.
K68
2010


47. Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams
Author: / Jake Kouns, Daniel Minoli
Library: Insurance Research Institute Library (Tehran)
Subject: Business enterprises --Computer networks --Security measures,Information technology --Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K6I5
2010


48. Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
Author: / Jake Kouns, Daniel Minoli
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K68
2010


49. Innovative security solutions for information technology and communications :
Author: Jean-Louis Lanet, Cristian Toma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Information technology-- Security measures, Congresses.,Computer networks-- Security measures.,Computer security.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25


50. Intelligent systems for security informatics /
Author: Christopher C. Yang ... [et al.]
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence,Computer networks-- Security measures,Computer security,Information technology-- Security measures
Classification :
QA76
.
9
.
A25
I584
2013


51. Learning Puppet Security :
Author: Jason Slagle
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Software,Computer security, Software,Information technology-- Security measures
Classification :
QA76
.
9
.
A25


52. Management of information security /
Author: Michael E. Whitman, Herbert J. Mattord.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Management.,Computer security-- Management.,Computer security.,Information technology-- Security measures.,Computer security-- Management.,Computer security.,Computersicherheit,Information technology-- Security measures.,Kryptologie,Risikomanagement
Classification :
TK5105
.
59
.
W45
2019


53. Network Scanning Cookbook /
Author: Jetty, Sairam.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.

54. Penetration testing fundamentals /
Author: Chuck Easttom.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security)
Classification :
TK5105
.
59


55. Principles of information security
Author: / Michael E.Whitman and Herbert J. Mattord
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer networks -- Security measures,Computer security,Information technology -- Security measures
Classification :
TK
5105
.
59
.
W55


56. Recent Advances in Information and Communication Technology
Author:
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks -- Congresses,Computer networks -- Security measures -- Congresses,Information technology -- Congresses,شبکههای کامپیوتری -- کنگرهها,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها,تکنولوژی اطلاعات -- کنگرهها
Classification :
E-Book
,

57. Security aspects in information technology :
Author: Marc Joye, Debdeep Mukhopadhyay, Michael Tunstall (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Information technology-- Security measures, Congresses
Classification :
QA76
.
9
.
A25
I58
2011


58. Security automation with Ansible 2 :
Author: Madhu Akula, Akash Mahajan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Information technology-- Automation.,Information technology-- Management.,Computer networks-- Security measures.,Information technology-- Management.
Classification :
T58
.
5


59. The Executive guide to information security: threats, challenges, and solutions
Author: Mark Egan with Tim Mather
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection
Classification :
HF
،
5548
.
32
،.
E325
،
2005


60. The art of enterprise information architecture :
Author: Mario Godinez [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Information technology-- Management.,Information technology-- Security measures.,Management information systems.,Business & Economics.,Business enterprises-- Computer networks-- Security measures.,Business enterprises-- Computer networks-- Security measures.,Computer Science.,Engineering & Applied Sciences.,Information technology-- Management.,Information technology-- Management.,Information technology-- Security measures.,Information technology-- Security measures.,Management information systems.,Management information systems.,Management Theory.,Management.
Classification :
HD30
.
2
.
A77
2010

