1. A business guide to information security :
Author: Alan Calder
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures,Computer security,Data protection,Information resources management-- Security measures,Information technology-- Security measures
Classification :
QA76
.
9
.
A25
C34188
2005


2. A management approach to data base applications
Author: / david avison, christine cuthbertson
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Database management,Computer security- United States,United States.- Privacy Act of 1974
Classification :
QC100
.
A857
2002


3. A practical guide to managing information securit
Author: / Steve Purser
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Management,Data protection.
Classification :
QA
,
76
.
9
,.
A25
,
P88
,
2004eb


4. A practical guide to managing information security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Management. ; Data protection. ;

5. A practical guide to managing information security /
Author: Steve Purser.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management.,BUSINESS & ECONOMICS-- Corporate Governance.,BUSINESS & ECONOMICS-- Leadership.,BUSINESS & ECONOMICS-- Organizational Development.,BUSINESS & ECONOMICS-- Workplace Culture.,Computer Science.,Computer security-- Management.,Engineering & Applied Sciences.
Classification :
QA76
.
9
.
A25
P88
2004eb


6. A practical guide to managing information security
Author: / Steve Purser
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security- Management
Classification :
QA76
.
9
.
A25
,
P88
2004


7. A practical guide to managing information security
Author: Purser, Steve
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Management ، Computer security
Classification :
QA
76
.
9
.
A25P87


8. A practical guide to managing information security
Author: / Steve Purser
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security- Management
Classification :
QA76
.
9
.
A25
,
P88
2004


9. AVIEN malware defense guide for the Enterpris
Author: / David Harley ... [et al.]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures,Computer security--Management,Computer viruses.,Malware (Computer software)
Classification :
QA
,
76
.
9
,.
A873
,
2007


10. AVIEN malware defense guide for the Enterprise /
Author: David Harley [and others] ; foreword by Robert S. Vibert.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Computer viruses.,Computer networks-- Security measures.,Computer security-- Management.,Computer viruses.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
A873
2007eb


11. AVIEN malware defense guide for the Enterprise
Author: / David Harley ... [et al.]
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security- Management,Computer networks- Security measures,Computer viruses
Classification :
QA76
.
9
.
A25
,
A873
2007


12. AVIEN malware defense guide for the Enterprise
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Management. ; Computer networks ; Security measures. ; Computer viruses. ;

13. Access to online resources :
Author: by Kristina Botyriute.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Collection management (Libraries),Computer networks-- Security measures.,Database security.,Electronic information resources-- Access control.,Electronic information resources-- Management.,Computer Security.,Information Services.,Internet.,Collection management (Libraries),Computer networks-- Security measures.,Database security.,Electronic information resources-- Access control.,Library & information sciences.
Classification :
Z695
.
24


14. Advances in cybersecurity management
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Management. ;

15. Advances in human factors in cybersecurity :
Author: editors: Tareq Ahram and Waldemar Karwowski.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computational intelligence, Congresses.,Computer security, Congresses.,Human-computer interaction, Congresses.,Management information systems, Congresses.,User interfaces (Computer systems), Congresses.,Computational intelligence.,Computer security.,COMPUTERS-- General.,Human-computer interaction.,Management information systems.,User interfaces (Computer systems)
Classification :
QA76
.
9
.
A25


16. Advances in information security management & small systems security
Author: edited by Jan H.P. Eloff [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security -- Management -- Congresses.,Computer security -- Management.

17. Advances in intelligent information systems
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Expert systems (Computer science) ; Artificial intelligence. ; Computer security. ; Knowledge management. ;

18. Advances in intelligent information systems
Author: / Zbigniew W. Ras and Li-Shiang Tsay (Eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Expert systems (Computer science),Artificial intelligence.,Computer security.,Knowledge management.
Classification :
QA
,
76
.
76
,.
E95
,
A35
,
2010


19. Advances in intelligent information systems
Author:
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Artificial intelligence,، Computer security,، Knowledge management
Classification :
Q
335
.
A383
2010


20. Big data analytics in cybersecurity
Author: edited by Onur Savas, Julia Deng.
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security.,Big data.,Database security.,Computer networks,Information technology,Security measures.,Management.
Classification :
QA76
.
9
.
A25
B538
2017

