61. Hacking exposed :network security secrets & solutions
پدیدآورنده : McClure, Stuart
موضوع : ، Computer security,Security measures ، Computer networks,، Data protection
۲ نسخه از این کتاب در ۲ کتابخانه موجود است.
62. Handbook of research on digital crime, cyberspace security, and information assurance /
پدیدآورنده : Maria Manuela Cruz-Cunha, Polytechnic Institute of Cavado and Ave, Portugal, Irene Maria Portela, Polytechnic Institute of C�avado and Ave, Portugal.
کتابخانه: Central Library and Documents Center of Tehran University (Tehran)
موضوع : Computer crimes.,Computer security.,Computer networks-- Security measures.,Data protection.,Information technology.
رده :
HV6773
.
H375
2015


63. IT governance :
پدیدآورنده : Alan Calder & Steve Watkins.
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Business enterprises-- Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.
رده :
QA76
.
9
.
A25
C342
2008eb


64. IT governance : a manager's guide to data security and ISO 27001/ISO 27002
پدیدآورنده : Calder, Alan
کتابخانه: Library of Razi Metallurgical Research Center (Tehran)
موضوع : ، Computer security,، Data protection,Computer networks Security measures ، Business enterprises
رده :
QA
76
.
9
.
A25
C342
2008


65. Implementing the ISO/IEC 27001 information security management system standard
پدیدآورنده : Edward Humphreys,Title
کتابخانه: Central Library of Imam Khomeini International University of Qazvin (Qazvin)
موضوع : Computer security- Management- Standards,Computer networks- Security measures- Standards,Data protection- Standards,Information technology- Standards
رده :
QA
.
A25
,
H855
76
.
9
2007


66. Implementing the ISO/IEC 27001 information security management system standard
پدیدآورنده : Edward Humphreys
کتابخانه: Central Library and Information Center of Shahed University (Tehran)
موضوع : Computer security -- Management -- Standards,Computer networks -- Security measures -- Standards,Data protection -- Standards,Information technology -- Standards
رده :
QA
،
76
.
9
،.
A25
,
H855
،
2007


67. Implementing the ISO/IEC 27001 information security management system standard
پدیدآورنده : Humphreys, Edward.
کتابخانه: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
موضوع : Management - Standards ، Computer security,Security measures - Standards ، Computer networks,Standards ، Data protection,Standards ، Information technology
رده :
QA
76
.
9
.
A25
H855
2007


68. Information Security and Assurance
پدیدآورنده :
کتابخانه: Library of Foreign Languages and Islamic Sources (Qom)
موضوع : Data protection -- Congresses,Computer security -- Congresses,Computer networks -- Security measures -- Congresses,حفاظت دادهها -- کنگرهها,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها
رده :
E-Book
,

69. Information Systems Security and privacy.
پدیدآورنده :
کتابخانه: Library of Foreign Languages and Islamic Sources (Qom)
موضوع : Computer networks -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.,Data protection -- Congresses.,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,رمزگذاری دادهها -- کنگرهها ,حفاظت اطلاعات -- کنگرهها
رده :
TK
5105
.
59
.
I532
2015
E-Book
,


70. Information and Communications Security
پدیدآورنده : \ Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu (eds.)
کتابخانه: Library of Foreign Languages and Islamic Sources (Qom)
موضوع : Computer networks -- Security measures -- Congresses,Data protection -- Congresses,Data encryption (Computer science) -- Congresses,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها,حفاظت اطلاعات -- کنگرهها,رمزگذاری دادهها -- کنگرهها
رده :
TK
5105
.
59
.
I25
I58
2016
E-Book
,


71. Information and Communications Security
پدیدآورنده : \ [Edited by] Lucas C. K. Hui...[et.al]
کتابخانه: Library of Foreign Languages and Islamic Sources (Qom)
موضوع : Computer networks -- Security measures -- Congresses.,Data protection -- Congresses.,Data encryption (Computer science) -- Congresses.,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,حفاظت اطلاعات -- کنگرهها ,رمزگذاری دادهها -- کنگرهها
رده :
TK
5105
.
59
.
I5
2015
E-Book
,


72. Information assurance architecture
پدیدآورنده : Keith D. WIllett
کتابخانه: Library of Faculty of Management of Tehran University (Tehran)
موضوع : Computer Security,Computer networks, Security measures,Information resources management,Information technology, Management,Business enterprises, Communication systems, Management,Data protection

73. Information hiding in communication networks :
پدیدآورنده : Wojciech Mazurczyk...[et al.].
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures.,Data protection.
رده :
QA76
.
9
.
A25


74. Information security a manager's guide to thwarting data thieves and hackers
پدیدآورنده : Alexander, Philip, 3691-,Philip Alexander
کتابخانه: Library and Documentation Center of Kurdistan University (Kurdistan)
موضوع : ، Business enterprises , Computer networks , Security measures,، Information technology , Security measures,، Computer security,، Data protection
رده :
HF
5548
.
37
.
A44
2008


75. Information security design, implementation, measurement, and compliance
پدیدآورنده : Layton, Timothy P.,Timothy P. Layton
کتابخانه: Library and Documentation Center of Kurdistan University (Kurdistan)
موضوع : ، Business , Data processing , Security measures,، Business enterprises , Computer networks , Security measures,، Data protection,، Computer security,، Risk assessment,، Confidential business information
رده :
HF
5548
.
37
.
L393
2007


76. Information security management metrics :a definitive guide to effective security monitoring and measurement
پدیدآورنده : Brotby, W. Krag.
کتابخانه: Central Library and Documents Center of Al-Zahra University (Tehran)
موضوع : Security measures ، Information technology,، Computer security,Computer networks Security measures ، Business enterprises,، Data protection
رده :
HD
30
.
2
.
B78
2009


77. Information security practice and experience : first International Conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings
پدیدآورنده : Robert H. Deng... ]et al.[ )eds.(
کتابخانه: Library of Institute for Research in Fundamental Sciences (Tehran)
موضوع : Congresses ، Computer security,Congresses ، Computer networks -- Security measures,Congresses ، Data protection
رده :
QA
76
.
L28
Vol
.
3439


78. Information security technology for applications
پدیدآورنده : Tuomas Aura, Kimmo Järvinen, Kaisa Nyberg (eds.)
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures, Congresses,Computer security, Congresses,Data protection, Congresses
رده :
QA76
.
9
.
A25
N67
2009eb


79. Information security theory and practice
پدیدآورنده : / dhiren R.patel
کتابخانه: Central Library and Documents Center of Mazandaran University (Mazandaran)
موضوع : Computer security- Congresses,Computer networks- Security measures- Congresses,Data protection- Congresses
رده :
QA76
.
9
.
D5
2008


80. Information security theory and practice
پدیدآورنده : Ioannis Askoxylakis, Henrich C. Pöhls, Joachim Posegga (eds.)
کتابخانه: Center and Library of Islamic Studies in European Languages (Qom)
موضوع : Computer networks-- Security measures, Congresses,Computer security, Congresses,Data protection, Congresses
رده :
QA76
.
9
.
A25
W59
2012eb

