481. Techniques and applications for advanced information privacy and security : emerging organizational, ethical, and human issues
Author: ]edited by[ Hamid R. Nemati
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Security measures ، Electronic commerce,Security measures ، Information technology,، Computer security,، Data protection
Classification :
HF
5548
.
37
.
T43
2009


482. Techniques and applications of digital watermarking and content protection
Author: / Michael Arnold, Martin Schmucker, Stephen D. Wolthusen
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Digital watermarking,Data protection
Classification :
QA76
.
9
.
A25
,
A76
2003


483. Techniques and applications of digital watermarking and content protection
Author: Arnold, Michael
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer security ► Digital watermarking ► Data protection
Classification :
76
.
9
.
A25
A76

484. Techniques and applications of digital watermarking and content protection
Author: Michael Arnold, Martin Schmucker, Stephen D. Wolthusen.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Digital watermarking.

485. Techniques and applications of digital watermarking and content protection
Author: / Michael Arnold, Martin Schmucker, Stephen D. Wolthusen
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Digital watermarking,Data protection
Classification :
QA76
.
9
.
A25
,
A76
2003


486. Techniques and applications of digital watermarking and content protection
Author: Michael Arnold, Martin Schmucker, Stephen D. Wolthusen.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Digital watermarking.

487. <The> Architecture of Privacy
Author: \ Courtney Bowman...[et.al] ; edited by Elissa Lerner.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Information technology-- Security measures.,Software engineering-- Security measures.,Computer security.,Data protection.,Privacy.,تکنولوژی اطلاعات -- تدابیر ایمنی ,مهندسی نرم افزار -- تدابیر ایمنی,امنیت کامپیوتر ,حفاظت دادهها
Classification :
QA
76
.
9
.
A7
2015
E-Book
,


488. The CIO's guide to information security incident management /
Author: Eur Ing Matthew W.A. Pemble, Wendy F. Goucher.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,BUSINESS & ECONOMICS-- Production & Operations Management.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Security-- General.,Data protection.
Classification :
QA76
.
9
.
A25
P46
2019


489. The CISO handbook :
Author: Michael Gentile, Ronald D. Collette, Thomas D. August.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Electronic data processing departments-- Security measures.,BUSINESS & ECONOMICS-- Corporate Governance.,BUSINESS & ECONOMICS-- Leadership.,BUSINESS & ECONOMICS-- Organizational Development.,BUSINESS & ECONOMICS-- Workplace Culture.,Computer security.,Data protection.,Electronic data processing departments-- Security measures.
Classification :
HF5548
.
37
.
G46
2006eb


490. The Executive guide to information security: threats, challenges, and solutions
Author: Mark Egan with Tim Mather
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection
Classification :
HF
،
5548
.
32
،.
E325
،
2005


491. The NCSA guide to enterprise security : protecting information assets
Author: Kabay, Michel E.
Library: Central Library of Amirkabir University of Technology (Tehran)
Subject: Computer security , Data protection
Classification :
QA
76
.
9
.
A25
K32
1996


492. The NCSA guide to enterprise security : protecting information assets
Author: Michel E. Kabay
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Data protection
Classification :
QA
76
.
9
.
A25K3


493. The art of invisibility :
Author: Kevin Mitnick with Robert Vamosi ; foreword by Mikko Hypponen.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Internet-- Security measures.,Privacy, Right of.,Privacy, Right of, Popular works.,Computer security.,COMPUTERS-- Hardware-- Mobile Devices.,COMPUTERS-- Hardware-- Personal Computers.,COMPUTERS-- Internet.,COMPUTERS-- Security-- Online Safety & Privacy.,COMPUTERS-- Social Aspects.,COMPUTERS-- Web-- Social Media.,Data protection.,Internet-- Security measures.,Privacy, Right of.,TECHNOLOGY & ENGINEERING-- Mobile & Wireless Communications.,TECHNOLOGY & ENGINEERING-- Social Aspects.,TECHNOLOGY & ENGINEERING-- Telecommunications.
Classification :
TK5105
.
875
.
I57
M58
2017


494. The art of invisibility :the world's most famous hacker teaches you how to be safe in the age of Big Brother and big data
Author: Mitnick, Kevin D. )Kevin David(
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Security measures ، Internet,، Computer security,، Data protection,، Privacy, Right of
Classification :
TK
5105
.
I57M58
2017


495. The baby harvest :
Author: Chris Rock.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Data protection.,Security, International.

496. The baby harvest :
Author: Chris Rock.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Data protection.,Security, International.

497. The business case for network security
Author: / Catherine Paquet, Warren Saxe
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management
Classification :
TK5105
.
59
.
P37
2005


498. The business case for network security
Author: / Catherine Paquet, Warren Saxe
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management
Classification :
TK5105
.
59
.
P37
2005


499. The chief information security officer
Author: Barry L. Kouns, Jake Kouns.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.

500. The complete book of data anonymization :
Author: Balaji Raghunathan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Database management.,Database security.
Classification :
QA76
.
9
.
A25
.
R338
2013

