• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۸۲ پاسخ غیر تکراری از ۸۹ پاسخ تکراری در مدت زمان ۰,۴۱ ثانیه یافت شد.

1. A business guide to information security :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Alan Calder

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business-- Data processing-- Security measures,Computer security,Data protection,Information resources management-- Security measures,Information technology-- Security measures

Classification :
QA76
.
9
.
A25
C34188
2005

2. A practical guide to managing information securit

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Steve Purser

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer security--Management,Data protection.

Classification :
QA
,
76
.
9
,.
A25
,
P88
,
2004eb

3. A practical guide to managing information security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer security ; Management. ; Data protection. ;

Classification :

4. Business Continuity Management :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Stefan Spörrer.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Crisis management.,Data protection.,Emergency management-- Planning.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer networks-- Security measures.,Crisis management.,Data protection.,Emergency management-- Planning.

Classification :
HD49

5. Cognitive hack : the new battleground in cybersecurity... the human mind

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Bone, James

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Data protection,، Computer security,، Risk management,Security measures ، Business enterprises

Classification :
HF
5548
.
37
.
B66C6

6. Cyber-security and global information assuranc

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Kenneth J. Knapp, editor

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Information technology--Security measures,Computer security--Management,Cyberspace--Security measures,Data protection.,Computer networks--Security measures

Classification :
QA
,
76
.
9
,.
A25
,
C918
,
2009

7. Cyber-security and global information assurance

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Kenneth J. Knapp, editor

Library: Insurance Research Institute Library (Tehran)

Subject: Information technology, Security measures,Computer security, Management,Cyberspace, Security measures,Data protection,Computer networks, Security measures

Classification :
QA76
.
9
.
C9
2009

8. Cyber-security and global information assurance :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Kenneth J. Knapp [editor].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Management.,Cyberspace-- Security measures.,Data protection.,Information technology-- Security measures.,Computer networks-- Security measures.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.,Information technology-- Security measures.

Classification :
QA76
.
9
.
A25
C918
2009eb

9. Cyber-security and global information assurance: threat analysis and response solutions

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Kenneth J. Knapp, editor

Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)

Subject: Security measures ، Information technology,Management ، Computer security,Security measures ، Cyberspace,، Data protection,Security measures ، Computer networks

Classification :
QA
76
.
9
.
A25
C918

10. Data privacy

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Nataraj Venkataramanan and Ashwin Shriram.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Customer relations.,Data protection.,Management information systems-- Security measures.,Privacy, Right of.

Classification :

11. Digital privacy in the marketplace :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: George R. Milne

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security,Consumer protection,Data protection,Information resources management-- Security measures,Internet-- Access control,Teleshopping-- Security measures

Classification :
QA76
.
9
.
A25
M5824
2015

12. Disaster recovery: principles and practices

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Wells, April J.

Library: Central Library of Sharif University of Technology (Tehran)

Subject: Handbooks, manuals, etc ، Emergency management,Handbooks, manuals, etc ، Crisis management,Handbooks, manuals, etc ، Computer security,Handbooks, manuals, etc ، Data protection,Handbooks, manuals, etc ، Data recovery )Computer science(-- Planning,Handbooks, manuals, etc ، Business planning

Classification :
HD
49
.
W46
2006

13. Handbook of information security management

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Micki Krause, Harold F. Tipton, editors

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer security- Management- Handbooks, manuals, etc,Data protection- Handbooks, manuals, etc

Classification :
QA76
.
9
.
A25
,
H36
1998

14. Handbook of information security management

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Micki Krause, Harold F. Tipton, editors

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer security- Management- Handbooks, manuals, etc,Data protection- Handbooks, manuals, etc

Classification :
QA76
.
9
.
A25
,
H36
1998

15. Implementing the ISO/IEC 27001 information security management system standard

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Edward Humphreys,Title

Library: Central Library of Imam Khomeini International University of Qazvin (Qazvin)

Subject: Computer security- Management- Standards,Computer networks- Security measures- Standards,Data protection- Standards,Information technology- Standards

Classification :
QA
.
A25
,
H855
76
.
9
2007

16. Implementing the ISO/IEC 27001 information security management system standard

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Edward Humphreys

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: Computer security -- Management -- Standards,Computer networks -- Security measures -- Standards,Data protection -- Standards,Information technology -- Standards

Classification :
QA
،
76
.
9
،.
A25
,
H855
،
2007

17. Implementing the ISO/IEC 27001 information security management system standard

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Humphreys, Edward.

Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)

Subject: Management - Standards ، Computer security,Security measures - Standards ، Computer networks,Standards ، Data protection,Standards ، Information technology

Classification :
QA
76
.
9
.
A25
H855
2007

18. Information Security Management Handbook

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Harold F Tipton, Micki Krause

Library: Library of Foreign Languages and Islamic Sources (Qom)

Subject: Computer security -- Management -- Handbooks, manuals, etc,Data protection -- Handbooks, manuals, etc,کامپیوترها - ایمنی اطلاعات - مدیریت - دستنامه‌ها,حفاظت اطلاعات - دستنامه‌ها

Classification :
QA76
,.
9
.
T5
2003

19. Information security for managers

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Caelli, William

Library: Central Library and Documentation Center (Kerman)

Subject: Management ، Computer security - United States,Management ، Data protection - United States

Classification :
HF
5548
.
37
.
C34
1989

20. Information security governance :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Krag Brotby

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security-- Management,Data protection,Information technology-- Security measures

Classification :
  • »
  • 5
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival