• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۱۷۳ پاسخ غیر تکراری از ۱۷۶ پاسخ تکراری در مدت زمان ۰,۴۱ ثانیه یافت شد.

41. Data privacy

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Nataraj Venkataramanan and Ashwin Shriram.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Customer relations.,Data protection.,Management information systems-- Security measures.,Privacy, Right of.

Classification :

42. Engineering information security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Stuart Jacobs

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: Computer security,Computer networks, Security measures,Information technology, Security measures,Data protection

Classification :
QA
،
76
.
9
،.
J3
،
2011

43. Engineering information security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Stuart Jacobs

Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)

Subject: Computer security,Computer networks, Security measures,Information technology, Security measures

Classification :
QA76
.
9
.
A25J325
2011

44. Engineering information security. the application of systems engineering concepts to achieve information assurance

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Jacobs, Stuart.

Library: Library of Razi Metallurgical Research Center (Tehran)

Subject: ، Computer security,، Computer networks- Security measures,، Information technology- Security measures,، Data protection

Classification :
QA
76
.
9
.
A25
J325
2011

45. Enterprise information security and privacy /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: C. Warren Axelrod, Jennifer L. Bayuk, Daniel Schutzer, editors.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.,BUSINESS & ECONOMICS-- Corporate Governance.,BUSINESS & ECONOMICS-- Leadership.,BUSINESS & ECONOMICS-- Organizational Development.,BUSINESS & ECONOMICS-- Workplace Culture.,Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.

Classification :
HF5548
.
37
.
E58
2009eb

46. Enterprise information security and privacy

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / C. Warren Axelrod, Jennifer L. Bayuk, Daniel Schutzer, editors.

Library: Campus International Library of Kish University of Tehran (Hormozgan)

Subject: Business enterprises--Computer networks--Security measures,Information technology--Security measures.,Computer security,Data protection

Classification :
HF
5548
.
37
.
E58
2009

47. Enterprise information security and privacy

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / C. Warren Axelrod, Jennifer L. Bayuk, Daniel Schutzer, editors

Library: Library and knowledge management of the management schools of Tehran University (Tehran)

Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Computer security,Data protection

Classification :
658
.
478
E61
2009

48. Enterprise information systems assurance and system security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / [edited by] Merrill Warkentin and Rayford Vaughn

Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)

Subject: Computer security,Computer networks -- Security measures,Management information systems

Classification :
QA
76
.
9
.
A25
E5

49. Enterprise information systems assurance and system security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / [edited by] Merrill Warkentin and Rayford Vaughn

Library: Library of Entrepreneurship (Tehran)

Subject: Computer security,Computer networks -- Security measures,Management information systems

Classification :
QA
76
.
9
.
A25
E545
2006

50. Enterprise information systems assurance and system security: managerial and technical issues

پدیدآورنده :

موضوع : ، Computer security,، Computer networks-- Security measures,، Management information systems

۲ نسخه از این کتاب در ۲ کتابخانه موجود است.

51. Enterprise information systems assurance and system security: managerial and technical issues

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / [edited by] Merrill Warkentin and Rayford Vaughn

Library: Central Library and Archive Center of shahid Beheshti University (Tehran)

Subject: Computer security,Computer networks,Management information systems,-- Security measures

Classification :
005
.
8
E61
2006

52. Error Correcting Coding and Security for Data Networks

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: \ G. Kabatiansky, E. Krouk, S. Semenov.

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Computer networks-- Security measures.,Error-correcting codes (Information theory)

Classification :
QA
76
.
9
.
K32E7
2005
E-Book
,

53. Error correcting coding and security for data networks

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / G. Kabatiansky, E. Krouk, S. Semenov

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer networks--Security measures,Error-correcting codes (Information theory)

Classification :
QA
,
76
.
9
,.
A25
,
K315
,
2005

54. #Error correcting coding and security for data networks

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)

Author: #G. Kabatiansky, E. Krouk, S. Semenov

Library: Central Library of Esfehan University of Technology (Esfahan)

Subject: Computer networks- Security measures ،Error-correcting codes )Information theory(

Classification :
#
QA
،#.
A25
,
K315

55. Error correcting coding and security for data networks :analysis of the superchannel concept

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Kabatiansky, G.

Library: Library of Niroo Research Institue (Tehran)

Subject: Security measures ، Computer networks,، Error-correcting codes )Information theory(

Classification :
QA
76
.
9
.
A25K315
2005

56. Error correcting coding and security for data networks: analysis of the superchannel concept

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Kabatiansky, G.

Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)

Subject: Security measures ، Computer networks,، Error-correcting codes )Information theory(

Classification :
QA
76
.
9
.
A25
K315

57. Formal models and techniques for analyzing security protocols

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by Veronique Cortier and Steve Kremer

Library: Central Library of Hamedan University of Technology (Hamedan)

Subject: ، Computer security,Access control ، Computers,Security measures ، Computer networks,Access control ، Electronic information resources

Classification :
QA
76
.
9
.
A25
F6563

58. Formal models and techniques for analyzing security protocols /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by Véronique Cortier and Steve Kremer

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Electronic information resources-- Access control

Classification :
QA76
.
9
.
A25
F654
2011

59. Foundations of communications electronic warfare

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Richard A. Poisel,Title

Library: Central Library of Imam Khomeini International University of Qazvin (Qazvin)

Subject: Military telecommunication,Information warfare,Computer networks- Security measures,Electronics in military engineering

Classification :
UG
.
P64
590
2008

60. Foundations of communications electronic warfare

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Poisel, Richard.

Library: Central Library and Documentation Center (Kerman)

Subject: ، Military telecommunication,، Information warfare,، Computer networks - Security measures,، Electronics in military engineering

Classification :
UG
590
.
P64
2008
  • »
  • 9
  • 8
  • 7
  • 6
  • 5
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival