41. Information security management handbook
Author: / Harold F. Tipton, Micki Krause, editors
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security- Management Handbooks, manuals, etc,Data protection Handbooks, manuals, etc
Classification :
QA76
.
9
.
A25
,
I54165
2003


42. Information security management handbook
Author: / Harold F. Tipton, Micki Krause, [editors]
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security- Management Handbooks, manuals, etc,Data protection Handbooks, manuals, etc
Classification :
QA76
.
9
.
A25
,
I54165
2007


43. Information security management handbook
Author: / Harold F. Tipton, Micki Krause, editors
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security- Management Handbooks, manuals, etc,Data protection Handbooks, manuals, etc
Classification :
QA76
.
9
.
A25
,
I54165
2003


44. Information security management handbook /
Author: Harold F. Tipton, Micki Krause, [editors].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management, Handbooks, manuals, etc.,Data protection, Handbooks, manuals, etc.,Protection de l'information (Informatique),Securité informatique.

45. Information security management handbook /
Author: Harold F. Tipton, Micki Krause, editors
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management, Handbooks, manuals, etc,Data protection, Handbooks, manuals, etc,Computer security-- Management, Handbooks, manuals, etc,Data protection, Handbooks, manuals, etc
Classification :
QA76
.
9
.
A25
I54165
2003


46. Information security management handbook [electronic resource]
Author: / Micki Krause, Harold F. Tipton, editors
Library: Imam Reza International University library and information center (Khorasan Razavi)
Subject: Computer security--Management--Handbooks, manuals, etc,Data protection--Handbooks, manuals, etc
Classification :
EB
,
QA76
.
9
.
A25
,
H36
2000

47. Information security management handbook, v. 3
Author: / Edited by Harold F. Tipton, Micki Krause
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer security--Management,Data protection
Classification :
QA
76
.
9
.
I55
2009


48. Information security management handbook vol.7
Author: edited by Richard O Hanley, James S. Tiller
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: Handbooks, manuals, etc ، Computer security - Management,Handbooks, manuals, etc ، Data protection
Classification :
QA76
.
9
.
A25


49. Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
Author: Kouns, Jake.,Jake Kouns, Daniel Minoli
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Business enterprises, Computer networks, Security measures,، Information technology, Security measures,، Data protection,، Computer security,، Risk management
Classification :
HF
5548
.
37
.
K68
2010


50. Information technology security and risk management
Author: Slay, Jill
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Data protection,، Risk management
Classification :
QA
76
.
9
.
A25S58
2006


51. Kali Linux Cookbook - Second Edition.
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Kali Linux.,Kali Linux.,Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security)
Classification :
QA76
.
9
.
A25
.
S385
2017eb


52. Managing an information security and privacy awareness and training program /
Author: Rebecca Herold.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management.,Data protection-- Management.,BUSINESS & ECONOMICS / Commerce,BUSINESS & ECONOMICS / Human Resources & Personnel Management,BUSINESS & ECONOMICS-- Corporate Governance.,BUSINESS & ECONOMICS-- Leadership.,BUSINESS & ECONOMICS-- Organizational Development.,BUSINESS & ECONOMICS-- Workplace Culture.,Computer security-- Management.,COMPUTERS / Information Technology
Classification :
QA76
.
9
.
A25
H46
2005eb


53. Managing an information security and privacy awareness and training program
Author: / Rebecca Herold
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computer security,Data protection,-- Management,-- Management
Classification :
658
.
478
H561M
2011


54. Managing an information security and privacy awareness and training program
Author: Herold, Rebecca
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Management ، Computer security,Management ، Data protection
Classification :
QA
76
.
9
.
A25H47
2011


55. Managing an information security and privacy awareness and training program
Author: / Rebecca Herold
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security--Management,Data protection--Management
Classification :
QA76
.
9
.
A25
,
H46
2011


56. Metasploit Penetration Testing Cookbook :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Computers-- Access control.,Data protection.,Information technology-- Security measures.,Computer networking & communications.,Computer networks-- Security measures.,Computer security-- Management.,Computer security.,Computers-- Access control.,Computers-- Networking-- Security.,Computers-- Security-- General.,Computers-- System Administration-- General.,Data protection.,Information technology-- Security measures.,Network security.
Classification :
QA76
.
9
.
A25
.
T459
2018eb


57. Network Scanning Cookbook /
Author: Jetty, Sairam.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.

58. Official (ISC)2 guide to the ISSMP CBK
Author: edited by Harold F. Tipton
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management-- Examinations, Study guides,Data protection-- Examinations, Study guides,Electronic data processing departments-- Security measures-- Examinations, Study guides,Electronic data processing personnel-- Certification
Classification :
QA76
.
9
.
A25
O344
2012


59. Penetration testing fundamentals /
Author: Chuck Easttom.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security),Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Penetration testing (Computer security)
Classification :
TK5105
.
59


60. Principles of computer security CompTIA security+ and beyond lab manual
Author: / Vincent Nestler ... [et al.]
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer security --Management --Handbooks, manuals, etc,Data protection --Handbooks, manuals, etc,COMPUTERS / Certification Guides / General
Classification :
QA
76
.
9
.
A2
C6
2011

