1. Access to online resources :
Author: by Kristina Botyriute.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Collection management (Libraries),Computer networks-- Security measures.,Database security.,Electronic information resources-- Access control.,Electronic information resources-- Management.,Computer Security.,Information Services.,Internet.,Collection management (Libraries),Computer networks-- Security measures.,Database security.,Electronic information resources-- Access control.,Library & information sciences.
Classification :
Z695
.
24


2. Business continuity and disaster recovery for infosec managers
Author: Rittinghouse, John W.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Business -- Data processing -- Security measures,، Crisis management,، Computer networks -- Security measures.,، Information resources management
Classification :
HF
5548
.
37
.
R58
2005


3. Business continuity and disaster recovery for infosec managers /
Author: John W. Rittinghouse, James F. Ransome
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures,Computer networks-- Security measures,Crisis management,Information resources management
Classification :
HF5548
.
37
.
R58
2005


4. Information assurance architecture
Author: / Keith D. WIllett
Library: Insurance Research Institute Library (Tehran)
Subject: Computer security,Computer networks, Security measures,Information resources management,Information technology, Management,Business enterprises, Communication systems, Management,Data protection
Classification :
QA76
.
9
.
W3I5
2008


5. Information assurance architecture
Author: / Keith D. WIllett
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security.,Computer networks--Security measures,Information resources management.,Information technology--Management,Business enterprises--Communication systems--Management,Data protection.
Classification :
QA76
.
9
.
A25
,
W5487
2008


6. Information assurance architecture
Author: / Keith D. WIllett
Library: Library and knowledge management of the management schools of Tehran University (Tehran)
Subject: Computer security,Computer networks, Security measures,Information resources management,Information technology, Management,Business enterprises, Communication systems, Management,Data protection
Classification :
005
.
8
W713i
2008


7. Managing information risk and the economics of security /M. Eric Johnson.
Author:
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Business enterprises -- Computer networks -- Security measures -- Economic aspects.,Information resources management -- Security measures -- Economic aspects.,Computer security -- Economic aspects.,Risk management
Classification :
HD
30
.
38
.
M36
2009


8. Network security evaluation using the NSA IEM
Author: Russ Rogers, technical editor and contributor; Bryan Cunningham ... ]et al.[
Library: Central Library and Documentation Center (Kerman)
Subject: Evaluation ، Computer networks - Security measures,Evaluation ، Computer security,Evaluation ، Information resources management
Classification :
TK
5105
.
59
.
N33
2005


9. The basics of information security
Author: Jason Andress.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Information resources management.

10. The basics of information security : understanding the fundamentals of InfoSec in theory and practice
Author: Andress, Jason.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,Security measures ، Computer networks,، Information resources management
Classification :
QA
76
.
9
.
A25
A5453
2011

