1. A business guide to information security :
Author: Alan Calder
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures,Computer security,Data protection,Information resources management-- Security measures,Information technology-- Security measures
Classification :
QA76
.
9
.
A25
C34188
2005


2. A practical guide to managing information securit
Author: / Steve Purser
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Management,Data protection.
Classification :
QA
,
76
.
9
,.
A25
,
P88
,
2004eb


3. A practical guide to managing information security
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Management. ; Data protection. ;

4. Business Continuity Management :
Author: Stefan Spörrer.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Crisis management.,Data protection.,Emergency management-- Planning.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer networks-- Security measures.,Crisis management.,Data protection.,Emergency management-- Planning.
Classification :
HD49


5. Cognitive hack : the new battleground in cybersecurity... the human mind
Author: Bone, James
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Data protection,، Computer security,، Risk management,Security measures ، Business enterprises
Classification :
HF
5548
.
37
.
B66C6


6. Cyber-security and global information assuranc
Author: / Kenneth J. Knapp, editor
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Information technology--Security measures,Computer security--Management,Cyberspace--Security measures,Data protection.,Computer networks--Security measures
Classification :
QA
,
76
.
9
,.
A25
,
C918
,
2009


7. Cyber-security and global information assurance
Author: / Kenneth J. Knapp, editor
Library: Insurance Research Institute Library (Tehran)
Subject: Information technology, Security measures,Computer security, Management,Cyberspace, Security measures,Data protection,Computer networks, Security measures
Classification :
QA76
.
9
.
C9
2009


8. Cyber-security and global information assurance :
Author: Kenneth J. Knapp [editor].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Cyberspace-- Security measures.,Data protection.,Information technology-- Security measures.,Computer networks-- Security measures.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25
C918
2009eb


9. Cyber-security and global information assurance: threat analysis and response solutions
Author: Kenneth J. Knapp, editor
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Security measures ، Information technology,Management ، Computer security,Security measures ، Cyberspace,، Data protection,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
C918


10. Data privacy
Author: Nataraj Venkataramanan and Ashwin Shriram.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Customer relations.,Data protection.,Management information systems-- Security measures.,Privacy, Right of.

11. Digital privacy in the marketplace :
Author: George R. Milne
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Consumer protection,Data protection,Information resources management-- Security measures,Internet-- Access control,Teleshopping-- Security measures
Classification :
QA76
.
9
.
A25
M5824
2015


12. Disaster recovery: principles and practices
Author: Wells, April J.
Library: Central Library of Sharif University of Technology (Tehran)
Subject: Handbooks, manuals, etc ، Emergency management,Handbooks, manuals, etc ، Crisis management,Handbooks, manuals, etc ، Computer security,Handbooks, manuals, etc ، Data protection,Handbooks, manuals, etc ، Data recovery )Computer science(-- Planning,Handbooks, manuals, etc ، Business planning
Classification :
HD
49
.
W46
2006


13. Handbook of information security management
Author: / Micki Krause, Harold F. Tipton, editors
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security- Management- Handbooks, manuals, etc,Data protection- Handbooks, manuals, etc
Classification :
QA76
.
9
.
A25
,
H36
1998


14. Handbook of information security management
Author: / Micki Krause, Harold F. Tipton, editors
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security- Management- Handbooks, manuals, etc,Data protection- Handbooks, manuals, etc
Classification :
QA76
.
9
.
A25
,
H36
1998


15. Implementing the ISO/IEC 27001 information security management system standard
Author: Edward Humphreys,Title
Library: Central Library of Imam Khomeini International University of Qazvin (Qazvin)
Subject: Computer security- Management- Standards,Computer networks- Security measures- Standards,Data protection- Standards,Information technology- Standards
Classification :
QA
.
A25
,
H855
76
.
9
2007


16. Implementing the ISO/IEC 27001 information security management system standard
Author: Edward Humphreys
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computer security -- Management -- Standards,Computer networks -- Security measures -- Standards,Data protection -- Standards,Information technology -- Standards
Classification :
QA
،
76
.
9
،.
A25
,
H855
،
2007


17. Implementing the ISO/IEC 27001 information security management system standard
Author: Humphreys, Edward.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Management - Standards ، Computer security,Security measures - Standards ، Computer networks,Standards ، Data protection,Standards ، Information technology
Classification :
QA
76
.
9
.
A25
H855
2007


18. Information Security Management Handbook
Author: / Harold F Tipton, Micki Krause
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Management -- Handbooks, manuals, etc,Data protection -- Handbooks, manuals, etc,کامپیوترها - ایمنی اطلاعات - مدیریت - دستنامهها,حفاظت اطلاعات - دستنامهها
Classification :
QA76
,.
9
.
T5
2003


19. Information security for managers
Author: Caelli, William
Library: Central Library and Documentation Center (Kerman)
Subject: Management ، Computer security - United States,Management ، Data protection - United States
Classification :
HF
5548
.
37
.
C34
1989

