• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۸۲ پاسخ غیر تکراری از ۸۹ پاسخ تکراری در مدت زمان ۰,۴۱ ثانیه یافت شد.

41. Information security management handbook

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Harold F. Tipton, Micki Krause, editors

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer security- Management Handbooks, manuals, etc,Data protection Handbooks, manuals, etc

Classification :
QA76
.
9
.
A25
,
I54165
2003

42. Information security management handbook

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Harold F. Tipton, Micki Krause, [editors]

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer security- Management Handbooks, manuals, etc,Data protection Handbooks, manuals, etc

Classification :
QA76
.
9
.
A25
,
I54165
2007

43. Information security management handbook

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Harold F. Tipton, Micki Krause, editors

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer security- Management Handbooks, manuals, etc,Data protection Handbooks, manuals, etc

Classification :
QA76
.
9
.
A25
,
I54165
2003

44. Information security management handbook /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Harold F. Tipton, Micki Krause, [editors].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security-- Management, Handbooks, manuals, etc.,Data protection, Handbooks, manuals, etc.,Protection de l'information (Informatique),Securité informatique.

Classification :

45. Information security management handbook /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Harold F. Tipton, Micki Krause, editors

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security-- Management, Handbooks, manuals, etc,Data protection, Handbooks, manuals, etc,Computer security-- Management, Handbooks, manuals, etc,Data protection, Handbooks, manuals, etc

Classification :
QA76
.
9
.
A25
I54165
2003

46. Information security management handbook [electronic resource]

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Micki Krause, Harold F. Tipton, editors

Library: Imam Reza International University library and information center (Khorasan Razavi)

Subject: Computer security--Management--Handbooks, manuals, etc,Data protection--Handbooks, manuals, etc

Classification :
EB
,
QA76
.
9
.
A25
,
H36
2000

47. Information security management handbook, v. 3

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Edited by Harold F. Tipton, Micki Krause

Library: Campus International Library of Kish University of Tehran (Hormozgan)

Subject: Computer security--Management,Data protection

Classification :
QA
76
.
9
.
I55
2009

48. Information security management handbook vol.7

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by Richard O Hanley, James S. Tiller

Library: Library and Documentation Center of Kurdistan University (Kurdistan)

Subject: Handbooks, manuals, etc ، Computer security - Management,Handbooks, manuals, etc ، Data protection

Classification :
QA76
.
9
.
A25

49. Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Kouns, Jake.,Jake Kouns, Daniel Minoli

Library: Library and Documentation Center of Kurdistan University (Kurdistan)

Subject: ، Business enterprises, Computer networks, Security measures,، Information technology, Security measures,، Data protection,، Computer security,، Risk management

Classification :
HF
5548
.
37
.
K68
2010

50. Information technology security and risk management

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Slay, Jill

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: ، Computer security,، Data protection,، Risk management

Classification :
QA
76
.
9
.
A25S58
2006

51. Kali Linux Cookbook - Second Edition.

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Kali Linux.,Kali Linux.,Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security)

Classification :
QA76
.
9
.
A25
.
S385
2017eb

52. Managing an information security and privacy awareness and training program /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Rebecca Herold.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security-- Management.,Data protection-- Management.,BUSINESS & ECONOMICS / Commerce,BUSINESS & ECONOMICS / Human Resources & Personnel Management,BUSINESS & ECONOMICS-- Corporate Governance.,BUSINESS & ECONOMICS-- Leadership.,BUSINESS & ECONOMICS-- Organizational Development.,BUSINESS & ECONOMICS-- Workplace Culture.,Computer security-- Management.,COMPUTERS / Information Technology

Classification :
QA76
.
9
.
A25
H46
2005eb

53. Managing an information security and privacy awareness and training program

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Rebecca Herold

Library: Central Library and Archive Center of shahid Beheshti University (Tehran)

Subject: Computer security,Data protection,-- Management,-- Management

Classification :
658
.
478
H561M
2011

54. Managing an information security and privacy awareness and training program

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Herold, Rebecca

Library: Library of Institute for Research in Fundamental Sciences (Tehran)

Subject: Management ، Computer security,Management ، Data protection

Classification :
QA
76
.
9
.
A25H47
2011

55. Managing an information security and privacy awareness and training program

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Rebecca Herold

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer security--Management,Data protection--Management

Classification :
QA76
.
9
.
A25
,
H46
2011

56. Metasploit Penetration Testing Cookbook :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Management.,Computers-- Access control.,Data protection.,Information technology-- Security measures.,Computer networking & communications.,Computer networks-- Security measures.,Computer security-- Management.,Computer security.,Computers-- Access control.,Computers-- Networking-- Security.,Computers-- Security-- General.,Computers-- System Administration-- General.,Data protection.,Information technology-- Security measures.,Network security.

Classification :
QA76
.
9
.
A25
.
T459
2018eb

57. Network Scanning Cookbook /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Jetty, Sairam.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.

Classification :

58. Official (ISC)2 guide to the ISSMP CBK

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: edited by Harold F. Tipton

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security-- Management-- Examinations, Study guides,Data protection-- Examinations, Study guides,Electronic data processing departments-- Security measures-- Examinations, Study guides,Electronic data processing personnel-- Certification

Classification :
QA76
.
9
.
A25
O344
2012

59. Penetration testing fundamentals /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Chuck Easttom.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security)

Classification :
TK5105
.
59

60. Principles of computer security CompTIA security+ and beyond lab manual

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Vincent Nestler ... [et al.]

Library: Campus International Library of Kish University of Tehran (Hormozgan)

Subject: Computer security --Management --Handbooks, manuals, etc,Data protection --Handbooks, manuals, etc,COMPUTERS / Certification Guides / General

Classification :
QA
76
.
9
.
A2
C6
2011
  • »
  • 5
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival