21. Big data analytics in cybersecurity /
Author: edited by Onur Savas, Julia Deng.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Big data.,Computer networks-- Security measures.,Computer security.,Database security.,Information technology-- Management.,Big Data,Big data.,Computer networks-- Security measures.,Computer security.,Database security.,Datenanalyse,Datensicherung,Information technology-- Management.
Classification :
QA76
.
9
.
A25
B54
2017


22. Building a comprehensive IT security program :
Author: Jeremy Wittkop
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management.,Information technology-- Security measures-- Management.
Classification :
HD30
.
2


23. Building a comprehensive IT security program :
Author: Jeremy Wittkop
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management,Information technology-- Security measures-- Management
Classification :
HD30
.
2


24. Building a corporate culture of security
Author: John Sullivant.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Corporate culture.,Corporations-- Security measures.,Emergency management-- Planning.

25. Business Continuity Management :
Author: Stefan Spörrer.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Crisis management.,Data protection.,Emergency management-- Planning.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer networks-- Security measures.,Crisis management.,Data protection.,Emergency management-- Planning.
Classification :
HD49


26. Business continuity and disaster recovery for infosec managers
Author: Rittinghouse, John W.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Business -- Data processing -- Security measures,، Crisis management,، Computer networks -- Security measures.,، Information resources management
Classification :
HF
5548
.
37
.
R58
2005


27. Business continuity and disaster recovery for infosec managers /
Author: John W. Rittinghouse, James F. Ransome
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures,Computer networks-- Security measures,Crisis management,Information resources management
Classification :
HF5548
.
37
.
R58
2005


28. Business continuity and disaster recovery planning for IT professionals /
Author: Susan Snedaker, Chris Rima.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures.,Computer networks-- Security measures.,Crisis management.,Electronic data processing departments-- Security measures.,Management information systems-- Security measures.
Classification :
HF5548
.
37
.
S67
2013


29. Business continuity & disaster recovery for IT professionals /
Author: Susan Snedaker.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures.,Computer networks-- Security measures.,Crisis management.,Electronic data processing departments-- Security measures.,Management information systems-- Security measures.,BUSINESS & ECONOMICS-- Corporate Governance.,BUSINESS & ECONOMICS-- Leadership.,BUSINESS & ECONOMICS-- Organizational Development.,BUSINESS & ECONOMICS-- Workplace Culture.,Business-- Data processing-- Security measures.,Business-- Data processing-- Security measures.,Computer networks-- Security measures.,Computer networks-- Security measures.,Crisis management.,Crisis management.,Databescherming.,Electronic data processing departments-- Security measures.,Electronic data processing departments-- Security measures.,Management information systems-- Security measures.,Risk management.
Classification :
HD
.
S67
2007eb


30. Business data networks and security /
Author: Raymond R. Panko, University of Hawai'i at Mānoa, Julia L. Panko, Weber State University.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer networks-- Management.,Computer networks-- Security measures.,Computer security.,Business enterprises-- Computer networks-- Security measures.,Computer networks-- Management.,Computer networks-- Security measures.,Computer security.,Computersicherheit,Datensicherung,Rechnernetz
Classification :
HD30
.
37
.
P36
2019


31. CCNA security study guide :
Author: Troy McMillan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cisco IOS.,Cisco IOS.,Computer networks-- Security measures-- Examinations, Study guides.,Routing (Computer network management)-- Examinations, Study guides.,Telecommunication-- Switching systems-- Examinations, Study guides.,Telecommunications engineers-- Certification.,Computer networks-- Security measures-- Examinations.,COMPUTERS-- Security-- General.,COMPUTERS-- Security-- Networking.,COMPUTERS-- Security-- Online Safety & Privacy.,Telecommunication-- Switching systems-- Examinations.,Telecommunications engineers-- Certification.
Classification :
TK5105
.
59


32. CIS
Author: / David L. Cannon
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer networks--Security measures--Examinations--Study guides,Management information systems--Auditing--Examinations--Study guides
Classification :
QA
,
76
.
3
,.
C3445
,
2008eb


33. CISA Certified Information Systems Auditor. study guide
Author: Cannon, David L.,2691-
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer networks, Security measures, Examinations, Study guides,، Management information systems, Auditing, Examinations, Study guides
Classification :
QA
76
.
3
.
C3445
2006


34. CISM review manual 2014.
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security-- Management-- Examinations, Study guides.,Electronic data processing personnel-- Certification.,Personal de procesamiento electrónico de datos-- Certificación.,Seguridad informática-- Administración-- Exámenes, Guías de estudio.,Electronic data processing personnel-- Certification.
Classification :
QA76
.
9
.
A25
C57
2013


35. CISO compass :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Management. ; Information networks ; Security measures. ; Information technology ; Security measures. ;

36. CISO compass :
Author: Todd Fitzgerald.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,BUSINESS & ECONOMICS-- Management.,Business enterprises-- Computer networks-- Security measures.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Security-- General.
Classification :
TK5105
.
59


37. CISO leadership :
Author: edited by Todd Fitzgerald, Micki Krause.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Management.,Computer security-- Management.,BUSINESS & ECONOMICS-- Corporate Governance.,BUSINESS & ECONOMICS-- Leadership.,BUSINESS & ECONOMICS-- Organizational Development.,BUSINESS & ECONOMICS-- Workplace Culture.,Computer networks-- Management.,Computer security-- Management.
Classification :
HD
E385
2008eb

38. Cisco ASA configuration
Author: Richard A. Deal
Library: Library of Urmia University of Technology (West Azarbaijan)
Subject: Computer networks, Security measures,Firewalls (Computer security),Software configuration management,Computer input-output equipment
Classification :
TK
,
5105
.
59
,.
D429
,
2009


39. Cisco Security bible
Author: Rajesh Kumar Sharma
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computer networks -- Security measures,Computer networks -- Management
Classification :
TK
،
5105
.
59
،.
S52
،
2002


40. Cisco security bible
Author: Sharma, Rajesh Kumar
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer networks -- Security measures,Management ، Computer networks
Classification :
TK
5105
.
59
.
S47C5

