• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۵ پاسخ غیر تکراری از ۵ پاسخ تکراری در مدت زمان ۰,۳۶ ثانیه یافت شد.

1. A business guide to information security. how to protect your company's IT assets, reduce risks and understand the law

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Calder, Alan

Library: Library of Razi Metallurgical Research Center (Tehran)

Subject: ، Computer security,، Information technology- Security measures,، Data protection,، Business- Data processing- Security measures

Classification :
QA
76
.
9
.
A25
C34188
2005

2. Security strategy

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Bill Stackpole and Eric Oksendahl

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer security.,Information technology--Security measures,Data protection.,Business--Data processing--Security measures

Classification :

3. Security strategy

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Bill Stackpole and Eric Oksendahl

Library: Library and Information Center of Ayatollah Imani of Salman Farsi University (Fars)

Subject: Computer security,Information technology, Security measures,Data protection,Business, Data processing, Security measures

Classification :
QA
76
,.
9
.
S78S4
2011

4. Security strategy: <from requirements to reality>

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Bill Stackpole and Eric Oksendahl

Library: Central Library and Archive Center of shahid Beheshti University (Tehran)

Subject: Computer security,Information technology,Data protection,Business,-- Security measures,-- Data processing -- Security measures

Classification :
005
.
8
S775S
2011

5. The chief information security officer

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Barry L. Kouns, Jake Kouns.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business-- Data processing-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.

Classification :
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival