281. The CIO's guide to information security incident management /
Author: Eur Ing Matthew W.A. Pemble, Wendy F. Goucher.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,BUSINESS & ECONOMICS-- Production & Operations Management.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Security-- General.,Data protection.
Classification :
QA76
.
9
.
A25
P46
2019


282. The CISM prep guide
Author: / Ronald L. Krutz, Russell Dean Vines
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Electronic data processing personnel- Certification,Computer security- Management- Examinations Study guides
Classification :
QA76
.
3
.
K79
2003


283. The CISM prep guide : mastering the five domains of information security management
Author: Krutz, Ronald L.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Certification ، Electronic data processing personnel,Study guides ، Computer security - Management Examinations
Classification :
QA
76
.
3
.
K79
2003


284. The CISO's transformation :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Management. ;

285. The Executive guide to information security: threats, challenges, and solutions
Author: Mark Egan with Tim Mather
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection
Classification :
HF
،
5548
.
32
،.
E325
،
2005


286. The NICE cyber security framework :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Management. ;

287. The Science and Technology of Counterterrorism
Author: Carl S. Young.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Risk management.,Security systems.,Terrorism-- Prevention.

288. The art of enterprise information architecture
Author: / Mario Godinez ... [et al.]
Library: Farabi Faculty Library, University of Tehran (Qom)
Subject: Information technology, Management,Management information systems,Business enterprises, Computer networks, Security measures,Information technology, Security measures
Classification :
HD
30
.
2
.
A77
2010


289. The art of enterprise information architecture :
Author: Mario Godinez [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Information technology-- Management.,Information technology-- Security measures.,Management information systems.,Business & Economics.,Business enterprises-- Computer networks-- Security measures.,Business enterprises-- Computer networks-- Security measures.,Computer Science.,Engineering & Applied Sciences.,Information technology-- Management.,Information technology-- Management.,Information technology-- Security measures.,Information technology-- Security measures.,Management information systems.,Management information systems.,Management Theory.,Management.
Classification :
HD30
.
2
.
A77
2010


290. The art of enterprise information architecture. a systems-based approach for unlocking business insight
Author: Mario Godinez ... ]et al.[
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Information technology- Management,، Management information systems,، Business enterprises- Computer networks- Security measures,، Information technology- Security measures
Classification :
HD
30
.
2
.
A77
2010


291. The basics of information security
Author: Jason Andress.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Information resources management.

292. The basics of information security : understanding the fundamentals of InfoSec in theory and practice
Author: Andress, Jason.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,Security measures ، Computer networks,، Information resources management
Classification :
QA
76
.
9
.
A25
A5453
2011


293. The best damn IT security management book perio
Author: / Bryan Cunningham...[et al]
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security--Management
Classification :
QA
,
76
.
9
,.
A25
,
B486
,
2007eb


294. The best damn IT security management book period
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Management. ;

295. The book of PF :
Author: by Peter N.M. Hansteen
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: OpenBSD (Electronic resource),Computer networks-- Management,Firewalls (Computer security),TCP/IP (Computer network protocol)
Classification :
TK5105
.
585
.
H385
2015


296. The business case for network security
Author: / Catherine Paquet, Warren Saxe
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management
Classification :
TK5105
.
59
.
P37
2005


297. The business case for network security
Author: / Catherine Paquet, Warren Saxe
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management
Classification :
TK5105
.
59
.
P37
2005


298. The chief information security officer
Author: Barry L. Kouns, Jake Kouns.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.

299. The complete book of data anonymization :
Author: Balaji Raghunathan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Database management.,Database security.
Classification :
QA76
.
9
.
A25
.
R338
2013


300. The disaster recovery handbook
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Emergency management ; Handbooks, manuals, etc. ; Crisis management ; Handbooks, manuals, etc. ; Computer security ; Handbooks, manuals, etc. ; Data protection ; Handbooks, manuals, etc. ; Data recovery (Computer science) ; Planning ; Handbooks, manuals,
