• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۱۳۹ پاسخ غیر تکراری از ۱۴۰ پاسخ تکراری در مدت زمان ۰,۵۲ ثانیه یافت شد.

61. Handbook of research on digital crime, cyberspace security, and information assurance /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Maria Manuela Cruz-Cunha, Polytechnic Institute of Cavado and Ave, Portugal, Irene Maria Portela, Polytechnic Institute of C�avado and Ave, Portugal.

Library: Central Library and Documents Center of Tehran University (Tehran)

Subject: Computer crimes.,Computer security.,Computer networks-- Security measures.,Data protection.,Information technology.

Classification :
HV6773
.
H375
2015

62. IT Governance data security&BS 7799/ISO 17799

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Alan Calder&Steve Watkins

Library: Library and knowledge management of the management schools of Tehran University (Tehran)

Subject: Computer security.,Data protection.,Business enterprises-Computer networks-Security measures

Classification :
005
.
8
C145i

63. IT governance :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Alan Calder & Steve Watkins.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Business enterprises-- Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.

Classification :
QA76
.
9
.
A25
C342
2008eb

64. IT governance : a manager's guide to data security and ISO 27001/ISO 27002

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Calder, Alan

Library: Library of Razi Metallurgical Research Center (Tehran)

Subject: ، Computer security,، Data protection,Computer networks Security measures ، Business enterprises

Classification :
QA
76
.
9
.
A25
C342
2008

65. Implementing the ISO/IEC 27001 information security management system standard

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Edward Humphreys,Title

Library: Central Library of Imam Khomeini International University of Qazvin (Qazvin)

Subject: Computer security- Management- Standards,Computer networks- Security measures- Standards,Data protection- Standards,Information technology- Standards

Classification :
QA
.
A25
,
H855
76
.
9
2007

66. Implementing the ISO/IEC 27001 information security management system standard

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Edward Humphreys

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: Computer security -- Management -- Standards,Computer networks -- Security measures -- Standards,Data protection -- Standards,Information technology -- Standards

Classification :
QA
،
76
.
9
،.
A25
,
H855
،
2007

67. Implementing the ISO/IEC 27001 information security management system standard

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Humphreys, Edward.

Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)

Subject: Management - Standards ، Computer security,Security measures - Standards ، Computer networks,Standards ، Data protection,Standards ، Information technology

Classification :
QA
76
.
9
.
A25
H855
2007

68. Information Security and Assurance

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Data protection -- Congresses,Computer security -- Congresses,Computer networks -- Security measures -- Congresses,حفاظت داده‌ها -- کنگره‌ها,کامپیوترها -- ایمنی اطلاعات -- کنگره‌ها ,شبکه‌های کامپیوتری -- تدابیر ایمنی -- کنگره‌ها

Classification :
E-Book
,

69. Information Systems Security and privacy.

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Computer networks -- Security measures -- Congresses.,Data encryption (Computer science) -- Congresses.,Data protection -- Congresses.,شبکه‌های کامپیوتری -- تدابیر ایمنی -- کنگره‌ها ,رمزگذاری داده‌ها -- کنگره‌ها ,حفاظت اطلاعات -- کنگره‌ها

Classification :
TK
5105
.
59
.
I532
2015
E-Book
,

70. Information and Communications Security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: \ Sihan Qing, Eiji Okamoto, Kwangjo Kim, Dongmei Liu (eds.)

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Computer networks -- Security measures -- Congresses,Data protection -- Congresses,Data encryption (Computer science) -- Congresses,شبکه‌های کامپیوتری -- تدابیر ایمنی -- کنگره‌ها,حفاظت اطلاعات -- کنگره‌ها,رمزگذاری داده‌ها -- کنگره‌ها

Classification :
TK
5105
.
59
.
I25
I58
2016
E-Book
,

71. Information and Communications Security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: \ [Edited by] Lucas C. K. Hui...[et.al]

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Computer networks -- Security measures -- Congresses.,Data protection -- Congresses.,Data encryption (Computer science) -- Congresses.,شبکه‌های کامپیوتری -- تدابیر ایمنی -- کنگره‌ها ,حفاظت اطلاعات -- کنگره‌ها ,رمزگذاری داده‌ها -- کنگره‌ها

Classification :
TK
5105
.
59
.
I5
2015
E-Book
,

72. Information hiding in communication networks :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Wojciech Mazurczyk...[et al.].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Data protection.

Classification :
QA76
.
9
.
A25

73. Information security a manager's guide to thwarting data thieves and hackers

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Alexander, Philip, 3691-,Philip Alexander

Library: Library and Documentation Center of Kurdistan University (Kurdistan)

Subject: ، Business enterprises , Computer networks , Security measures,، Information technology , Security measures,، Computer security,، Data protection

Classification :
HF
5548
.
37
.
A44
2008

74. Information security design, implementation, measurement, and compliance

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Layton, Timothy P.,Timothy P. Layton

Library: Library and Documentation Center of Kurdistan University (Kurdistan)

Subject: ، Business , Data processing , Security measures,، Business enterprises , Computer networks , Security measures,، Data protection,، Computer security,، Risk assessment,، Confidential business information

Classification :
HF
5548
.
37
.
L393
2007

75. Information security management metrics :a definitive guide to effective security monitoring and measurement

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Brotby, W. Krag.

Library: Central Library and Documents Center of Al-Zahra University (Tehran)

Subject: Security measures ، Information technology,، Computer security,Computer networks Security measures ، Business enterprises,، Data protection

Classification :
HD
30
.
2
.
B78
2009

76. Information security practice and experience

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Robert H. Deng ... [et al.] (eds.)

Library: Library of College of Science University of Tehran (Tehran)

Subject: Computer security,Computer networks,Data Protection, -- Congresses, -- Congresses, -- Congresses, -- Security measures,a04,a06,a08

Classification :
QA76
.
9
.
A25
I855
2005

77. Information security practice and experience : first International Conference, ISPEC 2005, Singapore, April 11-14, 2005 : proceedings

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Robert H. Deng... ]et al.[ )eds.(

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Congresses ، Computer security,Congresses ، Computer networks -- Security measures,Congresses ، Data protection

Classification :
QA
76
.
L28
Vol
.
3439

78. Information security technology for applications

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Tuomas Aura, Kimmo Järvinen, Kaisa Nyberg (eds.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data protection, Congresses

Classification :
QA76
.
9
.
A25
N67
2009eb

79. Information security theory and practice

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / dhiren R.patel

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer security- Congresses,Computer networks- Security measures- Congresses,Data protection- Congresses

Classification :
‭
QA76
.
9
‬ ‭.
D5
2008
‬

80. Information security theory and practice

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Ioannis Askoxylakis, Henrich C. Pöhls, Joachim Posegga (eds.)

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data protection, Congresses

Classification :
QA76
.
9
.
A25
W59
2012eb
  • »
  • 7
  • 6
  • 5
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival