41. Data privacy
Author: Nataraj Venkataramanan and Ashwin Shriram.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Customer relations.,Data protection.,Management information systems-- Security measures.,Privacy, Right of.

42. Engineering information security
Author: Stuart Jacobs
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computer security,Computer networks, Security measures,Information technology, Security measures,Data protection
Classification :
QA
،
76
.
9
،.
J3
،
2011


43. Engineering information security
Author: / Stuart Jacobs
Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)
Subject: Computer security,Computer networks, Security measures,Information technology, Security measures
Classification :
QA76
.
9
.
A25J325
2011


44. Engineering information security. the application of systems engineering concepts to achieve information assurance
Author: Jacobs, Stuart.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Computer networks- Security measures,، Information technology- Security measures,، Data protection
Classification :
QA
76
.
9
.
A25
J325
2011


45. Enterprise information security and privacy /
Author: C. Warren Axelrod, Jennifer L. Bayuk, Daniel Schutzer, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.,BUSINESS & ECONOMICS-- Corporate Governance.,BUSINESS & ECONOMICS-- Leadership.,BUSINESS & ECONOMICS-- Organizational Development.,BUSINESS & ECONOMICS-- Workplace Culture.,Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.
Classification :
HF5548
.
37
.
E58
2009eb


46. Enterprise information security and privacy
Author: / C. Warren Axelrod, Jennifer L. Bayuk, Daniel Schutzer, editors.
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Business enterprises--Computer networks--Security measures,Information technology--Security measures.,Computer security,Data protection
Classification :
HF
5548
.
37
.
E58
2009


47. Enterprise information security and privacy
Author: / C. Warren Axelrod, Jennifer L. Bayuk, Daniel Schutzer, editors
Library: Library and knowledge management of the management schools of Tehran University (Tehran)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Computer security,Data protection
Classification :
658
.
478
E61
2009


48. Enterprise information systems assurance and system security
Author: / [edited by] Merrill Warkentin and Rayford Vaughn
Library: Library of Campus2 Colleges of Engineering of Tehran University (Tehran)
Subject: Computer security,Computer networks -- Security measures,Management information systems
Classification :
QA
76
.
9
.
A25
E5


49. Enterprise information systems assurance and system security
Author: / [edited by] Merrill Warkentin and Rayford Vaughn
Library: Library of Entrepreneurship (Tehran)
Subject: Computer security,Computer networks -- Security measures,Management information systems
Classification :
QA
76
.
9
.
A25
E545
2006


50. Enterprise information systems assurance and system security: managerial and technical issues
پدیدآورنده :
موضوع : ، Computer security,، Computer networks-- Security measures,، Management information systems
۲ نسخه از این کتاب در ۲ کتابخانه موجود است.
51. Enterprise information systems assurance and system security: managerial and technical issues
Author: / [edited by] Merrill Warkentin and Rayford Vaughn
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computer security,Computer networks,Management information systems,-- Security measures
Classification :
005
.
8
E61
2006


52. Error Correcting Coding and Security for Data Networks
Author: \ G. Kabatiansky, E. Krouk, S. Semenov.
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks-- Security measures.,Error-correcting codes (Information theory)
Classification :
QA
76
.
9
.
K32E7
2005
E-Book
,


53. Error correcting coding and security for data networks
Author: / G. Kabatiansky, E. Krouk, S. Semenov
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Error-correcting codes (Information theory)
Classification :
QA
,
76
.
9
,.
A25
,
K315
,
2005


54. #Error correcting coding and security for data networks
Author: #G. Kabatiansky, E. Krouk, S. Semenov
Library: Central Library of Esfehan University of Technology (Esfahan)
Subject: Computer networks- Security measures ،Error-correcting codes )Information theory(
Classification :
#
QA
،#.
A25
,
K315


55. Error correcting coding and security for data networks :analysis of the superchannel concept
Author: Kabatiansky, G.
Library: Library of Niroo Research Institue (Tehran)
Subject: Security measures ، Computer networks,، Error-correcting codes )Information theory(
Classification :
QA
76
.
9
.
A25K315
2005


56. Error correcting coding and security for data networks: analysis of the superchannel concept
Author: Kabatiansky, G.
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Security measures ، Computer networks,، Error-correcting codes )Information theory(
Classification :
QA
76
.
9
.
A25
K315


57. Formal models and techniques for analyzing security protocols
Author: edited by Veronique Cortier and Steve Kremer
Library: Central Library of Hamedan University of Technology (Hamedan)
Subject: ، Computer security,Access control ، Computers,Security measures ، Computer networks,Access control ، Electronic information resources
Classification :
QA
76
.
9
.
A25
F6563


58. Formal models and techniques for analyzing security protocols /
Author: edited by Véronique Cortier and Steve Kremer
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,Electronic information resources-- Access control
Classification :
QA76
.
9
.
A25
F654
2011


59. Foundations of communications electronic warfare
Author: Richard A. Poisel,Title
Library: Central Library of Imam Khomeini International University of Qazvin (Qazvin)
Subject: Military telecommunication,Information warfare,Computer networks- Security measures,Electronics in military engineering
Classification :
UG
.
P64
590
2008


60. Foundations of communications electronic warfare
Author: Poisel, Richard.
Library: Central Library and Documentation Center (Kerman)
Subject: ، Military telecommunication,، Information warfare,، Computer networks - Security measures,، Electronics in military engineering
Classification :
UG
590
.
P64
2008

