• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۱۳۹ پاسخ غیر تکراری از ۱۴۰ پاسخ تکراری در مدت زمان ۰,۳۹ ثانیه یافت شد.

81. Information systems security and privacy :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by Paolo Mori, Steven Furnell, Olivier Camp.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures, Congresses.,Data encryption (Computer science), Congresses.,Data protection, Congresses.,Computer networks-- Security measures.,Data encryption (Computer science),Data protection.

Classification :
QA76
.
9
.
A25

82. Information technology risk management and compliance in modern organizations.

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Manish Gupta...[et al.]

Library: Central library of medical university of Isfahan (Esfahan)

Subject: Business enterprises-- Computer networks-- Security measures. , Information technology-- Security measures. , Data protection, Computer security, Risk management.

Classification :
HF5548
.
37
.
I5
2018

83. Information technology risk management in enterprise environments

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Business enterprises ; Computer networks ; Security measures. ; Information technology ; Security measures. ; Data protection. ; Computer security. ; Risk management. ;

Classification :

84. Information technology risk management in enterprise environments :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Jake Kouns, Daniel Minoli.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.,Risk management.

Classification :

85. Information technology risk management in enterprise environments

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Jake Kouns, Daniel Minoli

Library: Ilam University Central Library (Ilam)

Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management

Classification :
HF5548
.
37
.
K68
2010

86. Information technology risk management in enterprise environments

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Jake Kouns, Daniel Minoli

Library: Central Library and Documents Center of Tehran University (Tehran)

Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management

Classification :
HF5548
.
37
.
K68
2010

87. Information technology risk management in enterprise environments

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Jake Kouns, Daniel Minoli

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Business enterprises--Computer networks--Security measures,Information technology--Security measures,Data protection.,Computer security.,Risk management.

Classification :
HF
,
5548
.
37
,.
K68
,
2010

88. Information technology risk management in enterprise environments

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Jake Kouns, Daniel Minoli

Library: Library and knowledge management of the management schools of Tehran University (Tehran)

Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management

Classification :
658
.
478
K88i
2010

89. Information technology risk management in enterprise environments

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Jake Kouns, Daniel Minoli

Library: Farabi Faculty Library, University of Tehran (Qom)

Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management

Classification :
HF
5548
.
37
.
K68
2010

90. Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Jake Kouns, Daniel Minoli

Library: Insurance Research Institute Library (Tehran)

Subject: Business enterprises --Computer networks --Security measures,Information technology --Security measures,Data protection,Computer security,Risk management

Classification :
HF5548
.
37
.
K6I5
2010

91. Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Kouns, Jake.,Jake Kouns, Daniel Minoli

Library: Library and Documentation Center of Kurdistan University (Kurdistan)

Subject: ، Business enterprises, Computer networks, Security measures,، Information technology, Security measures,، Data protection,، Computer security,، Risk management

Classification :
HF
5548
.
37
.
K68
2010

92. Instant Netcat starter

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: K.C. Yerrid

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Data protection,TCP/IP (Computer network protocol)

Classification :
TK5105
.
59
.
Y47
2013

93. International CIIP handbook 2006 :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Isabelle Abele-Wigert and Myriam Dunn ; series editors, Andreas Wenger and Victor Mauer.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures-- Government policy.,Data protection-- Government policy.,Information policy.,Information superhighway-- Government policy.,National security.,Security, International.,Computer networks-- Security measures-- Government policy.,Data protection-- Government policy.,Information policy.,Information superhighway-- Government policy.,National security.,Security, International.

Classification :

94. Introduction to computer and network security :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Richard R. Brooks, Clemson University, South Carolina, USA

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Computer security,Data encryption (Computer science),Data protection

Classification :
QA76
.
9
.
A25
B7745
2014

95. Introduction to hardware security and trust

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Mohammad Tehranipoor

Library: Central Library of Hamedan University of Technology (Hamedan)

Subject: ، Computer security,، Computer input-output equipment,، Data protection,Security measures ، Computer networks,Security measures ، Information technology,، Computer input-output equipment,Security measures ، Computer networks

Classification :
QA
76
.
9
.
I58

96. Kali Linux Cookbook - Second Edition.

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Kali Linux.,Kali Linux.,Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25
.
S385
2017eb

97. LAN times guide to security and data integrity

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Farley, Marc.

Library: Central Library of Amirkabir University of Technology (Tehran)

Subject: Local area networks )Computer networks( - Security measures , Computer security , Data protection

Classification :
TK
5105
.
59
.
F37
1996

98. LAN times guide to security and data integrity

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Marc Farley, Tom Stearns, and Jeffrey Hsu

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Local area networks (Computer networks)- Security measures,Computer security,Data protection

Classification :
TK5105
.
59
.
F37
1996

99. Mastering network security /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Chris Brenton

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Computer security,Data protection

Classification :
QA76
.
9
.
A25
B757
1998

100. Metasploit Penetration Testing Cookbook :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Management.,Computers-- Access control.,Data protection.,Information technology-- Security measures.,Computer networking & communications.,Computer networks-- Security measures.,Computer security-- Management.,Computer security.,Computers-- Access control.,Computers-- Networking-- Security.,Computers-- Security-- General.,Computers-- System Administration-- General.,Data protection.,Information technology-- Security measures.,Network security.

Classification :
QA76
.
9
.
A25
.
T459
2018eb
  • »
  • 7
  • 6
  • 5
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival