• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
  • ورود / ثبت نام
تعداد ۳۳۰ پاسخ غیر تکراری از ۳۳۹ پاسخ تکراری در مدت زمان ۰,۳۶ ثانیه یافت شد.

281. The CIO's guide to information security incident management /

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Eur Ing Matthew W.A. Pemble, Wendy F. Goucher.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Data protection.,BUSINESS & ECONOMICS-- Production & Operations Management.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Security-- General.,Data protection.

Classification :
QA76
.
9
.
A25
P46
2019

282. The CISM prep guide

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Ronald L. Krutz, Russell Dean Vines

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Electronic data processing personnel- Certification,Computer security- Management- Examinations Study guides

Classification :
QA76
.
3
.
K79
2003

283. The CISM prep guide : mastering the five domains of information security management

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Krutz, Ronald L.

Library: Library of Razi Metallurgical Research Center (Tehran)

Subject: Certification ، Electronic data processing personnel,Study guides ، Computer security - Management Examinations

Classification :
QA
76
.
3
.
K79
2003

284. The CISO's transformation :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer security ; Management. ;

Classification :

285. The Executive guide to information security: threats, challenges, and solutions

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Mark Egan with Tim Mather

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection

Classification :
HF
،
5548
.
32
،.
E325
،
2005

286. The NICE cyber security framework :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer security ; Management. ;

Classification :

287. The Science and Technology of Counterterrorism

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Carl S. Young.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Risk management.,Security systems.,Terrorism-- Prevention.

Classification :

288. The art of enterprise information architecture

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Mario Godinez ... [et al.]

Library: Farabi Faculty Library, University of Tehran (Qom)

Subject: Information technology, Management,Management information systems,Business enterprises, Computer networks, Security measures,Information technology, Security measures

Classification :
HD
30
.
2
.
A77
2010

289. The art of enterprise information architecture :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Mario Godinez [and others].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business enterprises-- Computer networks-- Security measures.,Information technology-- Management.,Information technology-- Security measures.,Management information systems.,Business & Economics.,Business enterprises-- Computer networks-- Security measures.,Business enterprises-- Computer networks-- Security measures.,Computer Science.,Engineering & Applied Sciences.,Information technology-- Management.,Information technology-- Management.,Information technology-- Security measures.,Information technology-- Security measures.,Management information systems.,Management information systems.,Management Theory.,Management.

Classification :
HD30
.
2
.
A77
2010

290. The art of enterprise information architecture. a systems-based approach for unlocking business insight

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Mario Godinez ... ]et al.[

Library: Library of Razi Metallurgical Research Center (Tehran)

Subject: ، Information technology- Management,، Management information systems,، Business enterprises- Computer networks- Security measures,، Information technology- Security measures

Classification :
HD
30
.
2
.
A77
2010

291. The basics of information security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Jason Andress.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Information resources management.

Classification :

292. The basics of information security : understanding the fundamentals of InfoSec in theory and practice

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Andress, Jason.

Library: Library of Razi Metallurgical Research Center (Tehran)

Subject: ، Computer security,Security measures ، Computer networks,، Information resources management

Classification :
QA
76
.
9
.
A25
A5453
2011

293. The best damn IT security management book perio

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Bryan Cunningham...[et al]

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer security--Management

Classification :
QA
,
76
.
9
,.
A25
,
B486
,
2007eb

294. The best damn IT security management book period

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer security ; Management. ;

Classification :

295. The book of PF :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: by Peter N.M. Hansteen

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: OpenBSD (Electronic resource),Computer networks-- Management,Firewalls (Computer security),TCP/IP (Computer network protocol)

Classification :
TK5105
.
585
.
H385
2015

296. The business case for network security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Catherine Paquet, Warren Saxe

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management

Classification :
TK5105
.
59
.
P37
2005

297. The business case for network security

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: / Catherine Paquet, Warren Saxe

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management

Classification :
TK5105
.
59
.
P37
2005

298. The chief information security officer

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Barry L. Kouns, Jake Kouns.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Business-- Data processing-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.

Classification :

299. The complete book of data anonymization :

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author: Balaji Raghunathan.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer security.,Data protection.,Database management.,Database security.

Classification :
QA76
.
9
.
A25
.
R338
2013

300. The disaster recovery handbook

  • اطلاعات استناد دهی
  • BibTex (Only for Users)
  • RIS (Only for Users)
  • Endnote (Only for Users)
  • Refer (Only for Users)
  • Mark (Only for Users)

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Emergency management ; Handbooks, manuals, etc. ; Crisis management ; Handbooks, manuals, etc. ; Computer security ; Handbooks, manuals, etc. ; Data protection ; Handbooks, manuals, etc. ; Data recovery (Computer science) ; Planning ; Handbooks, manuals,

Classification :
  • »
  • 17
  • 16
  • 15
  • 14
  • 13
  • 12
  • 11
  • ...
  • 4
  • 3
  • 2
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival