1. A business guide to information security. how to protect your company's IT assets, reduce risks and understand the law
Author: Calder, Alan
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Information technology- Security measures,، Data protection,، Business- Data processing- Security measures
Classification :
QA
76
.
9
.
A25
C34188
2005


2. Security strategy
Author: / Bill Stackpole and Eric Oksendahl
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security.,Information technology--Security measures,Data protection.,Business--Data processing--Security measures

3. Security strategy
Author: Bill Stackpole and Eric Oksendahl
Library: Library and Information Center of Ayatollah Imani of Salman Farsi University (Fars)
Subject: Computer security,Information technology, Security measures,Data protection,Business, Data processing, Security measures
Classification :
QA
76
,.
9
.
S78S4
2011


4. Security strategy: <from requirements to reality>
Author: / Bill Stackpole and Eric Oksendahl
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computer security,Information technology,Data protection,Business,-- Security measures,-- Data processing -- Security measures
Classification :
005
.
8
S775S
2011


5. The chief information security officer
Author: Barry L. Kouns, Jake Kouns.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.
