1. Cyber-security and global information assuranc
Author: / Kenneth J. Knapp, editor
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Information technology--Security measures,Computer security--Management,Cyberspace--Security measures,Data protection.,Computer networks--Security measures
Classification :
QA
,
76
.
9
,.
A25
,
C918
,
2009


2. Cyber-security and global information assurance
Author: / Kenneth J. Knapp, editor
Library: Insurance Research Institute Library (Tehran)
Subject: Information technology, Security measures,Computer security, Management,Cyberspace, Security measures,Data protection,Computer networks, Security measures
Classification :
QA76
.
9
.
C9
2009


3. Cyber-security and global information assurance: threat analysis and response solutions
Author: Kenneth J. Knapp, editor
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Security measures ، Information technology,Management ، Computer security,Security measures ، Cyberspace,، Data protection,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
C918


4. Implementing the ISO/IEC 27001 information security management system standard
Author: Edward Humphreys
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computer security -- Management -- Standards,Computer networks -- Security measures -- Standards,Data protection -- Standards,Information technology -- Standards
Classification :
QA
،
76
.
9
،.
A25
,
H855
،
2007


5. Information security governance :
Author: Krag Brotby
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management,Data protection,Information technology-- Security measures

6. Information security governance. a practical development and implementation approach
Author: Brotby, W. Krag
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Data protection,، Computer security- Management,، Information technology- Security measures
Classification :
HF
5548
.
37
.
B76
2009


7. Information security governance: a practical development and implementation approach
Author: Brotby, W. Krag
Library: Central Library and Documentation Center (Golestan)
Subject: ، Data protection,Management ، Computer security,Security measures ، Information technology
Classification :
HF
5548
.
37
.
B76
I54


8. Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
Author: Kouns, Jake.,Jake Kouns, Daniel Minoli
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Business enterprises, Computer networks, Security measures,، Information technology, Security measures,، Data protection,، Computer security,، Risk management
Classification :
HF
5548
.
37
.
K68
2010


9. Network Scanning Cookbook /
Author: Jetty, Sairam.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.

10. Penetration testing fundamentals /
Author: Chuck Easttom.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security)
Classification :
TK5105
.
59


11. The Executive guide to information security: threats, challenges, and solutions
Author: Mark Egan with Tim Mather
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection
Classification :
HF
،
5548
.
32
،.
E325
،
2005


12. The chief information security officer
Author: Barry L. Kouns, Jake Kouns.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.

13. security and global information assurance :-Cyber
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Information technology ; Security measures ; Computer security ; Management ; Cyberspace ; Security measures ; Data protection ; Computer networks ; Security measures ;

14. مدیریت اطلاعات و امنیت
Author: / ان.سی. آستانا و آنجالی نیرمال,آستهانا,Asthana
Library: National Library and Archives of Islamic Republic of Iran (Tehran)
Subject: تکنولوژی اطلاعات,Information technology,نظامهای اطلاعاتی مدیریت,Management information systems,شبکههای کامپیوتری,Computer networks,حفاظت دادهها,Data protection, -- مدیریت, -- Management, -- تدابیر ایمنی, -- Security measures
Classification :
HD
۳۰
/
۲
/
آ
۴۶
م
۴ ۱۳۹۴
