• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۱۴ پاسخ غیر تکراری از ۱۴ پاسخ تکراری در مدت زمان ۰,۴۱ ثانیه یافت شد.

1. Cyber-security and global information assuranc

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Kenneth J. Knapp, editor

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Information technology--Security measures,Computer security--Management,Cyberspace--Security measures,Data protection.,Computer networks--Security measures

Classification :
QA
,
76
.
9
,.
A25
,
C918
,
2009

2. Cyber-security and global information assurance

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Kenneth J. Knapp, editor

Library: Insurance Research Institute Library (Tehran)

Subject: Information technology, Security measures,Computer security, Management,Cyberspace, Security measures,Data protection,Computer networks, Security measures

Classification :
QA76
.
9
.
C9
2009

3. Cyber-security and global information assurance: threat analysis and response solutions

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Kenneth J. Knapp, editor

Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)

Subject: Security measures ، Information technology,Management ، Computer security,Security measures ، Cyberspace,، Data protection,Security measures ، Computer networks

Classification :
QA
76
.
9
.
A25
C918

4. Implementing the ISO/IEC 27001 information security management system standard

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Edward Humphreys

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: Computer security -- Management -- Standards,Computer networks -- Security measures -- Standards,Data protection -- Standards,Information technology -- Standards

Classification :
QA
،
76
.
9
،.
A25
,
H855
،
2007

5. Information security governance :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Krag Brotby

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security-- Management,Data protection,Information technology-- Security measures

Classification :

6. Information security governance. a practical development and implementation approach

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Brotby, W. Krag

Library: Library of Razi Metallurgical Research Center (Tehran)

Subject: ، Data protection,، Computer security- Management,، Information technology- Security measures

Classification :
HF
5548
.
37
.
B76
2009

7. Information security governance: a practical development and implementation approach

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Brotby, W. Krag

Library: Central Library and Documentation Center (Golestan)

Subject: ، Data protection,Management ، Computer security,Security measures ، Information technology

Classification :
HF
5548
.
37
.
B76
I54

8. Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Kouns, Jake.,Jake Kouns, Daniel Minoli

Library: Library and Documentation Center of Kurdistan University (Kurdistan)

Subject: ، Business enterprises, Computer networks, Security measures,، Information technology, Security measures,، Data protection,، Computer security,، Risk management

Classification :
HF
5548
.
37
.
K68
2010

9. Network Scanning Cookbook /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Jetty, Sairam.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.

Classification :

10. Penetration testing fundamentals /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Chuck Easttom.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security)

Classification :
TK5105
.
59

11. The Executive guide to information security: threats, challenges, and solutions

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Mark Egan with Tim Mather

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection

Classification :
HF
،
5548
.
32
،.
E325
،
2005

12. The chief information security officer

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Barry L. Kouns, Jake Kouns.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business-- Data processing-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.

Classification :

13. security and global information assurance :-Cyber

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Information technology ; Security measures ; Computer security ; Management ; Cyberspace ; Security measures ; Data protection ; Computer networks ; Security measures ;

Classification :

14. مدیریت اطلاعات و امنیت

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / ان.سی. آستانا و آنجالی نیرمال,آس‍ت‍هان‍ا,Asthana

Library: National Library and Archives of Islamic Republic of Iran (Tehran)

Subject: تکنولوژی اطلاعات,Information technology,نظام‌های اطلاعاتی مدیریت,Management information systems,شبکه‌های کامپیوتری,Computer networks,حفاظت داده‌ها,Data protection, -- مدیریت, -- Management, -- تدابیر ایمنی, -- Security measures

Classification :
‏‫‬‭
HD
۳۰
/
۲ ‏‫‬‭
/
آ
۴۶
م
۴ ۱۳۹۴
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival