41. Cisco security bible
Author: / Rajesh Kumar Sharma
Library: University of Tabriz Library, Documentation and Publication Center (East Azarbaijan)
Subject: Computer networks- Security measures,Computer networks- Management
Classification :
TK5105
.
59
.
S52
2002


42. Cognitive hack : the new battleground in cybersecurity... the human mind
Author: Bone, James
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Data protection,، Computer security,، Risk management,Security measures ، Business enterprises
Classification :
HF
5548
.
37
.
B66C6


43. Collaboration with cloud computing
Author: Ric Messier ; technical editor, Allan Konar
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing,Computer crimes-- Prevention,Computer security,Information technology-- Management,Information technology-- Security measures
Classification :
QA76
.
9
.
A25
M4864
2014


44. Collaboration with cloud computing : security, social media, and unified communications
Author: Messier, Ric
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Security measures ، Information technology,Management ، Information technology,، Cloud computing,، Computer security,Prevention ، Computer crimes
Classification :
QA
76
.
9
.
A25M47


45. Computer Information Systems and Industrial Management
Author: \ Khalid Saeed, Władysław Homenda (eds.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer networks -- Congresses.,Computer networks -- Security measures -- Congresses.,Database management -- Congresses.,شبکه های کامپیوتری - کنگره ها.,شبکه های کامپیوتری - اقدامات امنیتی - کنگره ها,مدیریت پایگاه داده - کنگره ها
Classification :
QA
164
.
C657
2015
E-Book
,


46. Computer and cyber security :
Author: edited by Dr. Brij B. Gupta, National Institute of Technology Kurukshetra, Haryana, India ; Dr. Dharma P. Agrawal, University of Cincinnati, USA ; Dr. Haoxiang Wang, GoPerception Laboratory & Cornell University, USA.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,BUSINESS & ECONOMICS-- Production & Operations Management.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Operating Systems-- General.
Classification :
QA76
.
9
.
A25
C626
2019eb


47. Computer information systems and industrial management
Author: / Agostino Cortesi ... [et al.] (eds.
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks--Congresses,Computer networks--Security measures--Congresses,Database management--Congresses
Classification :
TK5105
.
5
.
I58
2012


48. Computer information systems and industrial management :
Author: Khalid Saeed, Rituparna Chaki, Agostino Cortesi, Sławomir Wierzchoń (eds.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer networks, Congresses,Database management, Congresses
Classification :
TK5105
.
5
.
I58
2013


49. Computer security handbook
Author: Elbra, R. A.
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Electronic data processing departments-- Security measures,، Business-- Data processing-- Security measures,، Computer security-- Management
Classification :
HF
5548
.
37
.
E43
1992


50. Cyber-security and global information assuranc
Author: / Kenneth J. Knapp, editor
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Information technology--Security measures,Computer security--Management,Cyberspace--Security measures,Data protection.,Computer networks--Security measures
Classification :
QA
,
76
.
9
,.
A25
,
C918
,
2009


51. Cyber-security and global information assurance
Author: / Kenneth J. Knapp, editor
Library: Insurance Research Institute Library (Tehran)
Subject: Information technology, Security measures,Computer security, Management,Cyberspace, Security measures,Data protection,Computer networks, Security measures
Classification :
QA76
.
9
.
C9
2009


52. Cyber-security and global information assurance :
Author: Kenneth J. Knapp [editor].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Cyberspace-- Security measures.,Data protection.,Information technology-- Security measures.,Computer networks-- Security measures.,Computer security-- Management.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25
C918
2009eb


53. Cyber-security and global information assurance: threat analysis and response solutions
Author: Kenneth J. Knapp, editor
Library: Central Library and Documents Center of Industrial University of Khaje Nasiredin Toosi (Tehran)
Subject: Security measures ، Information technology,Management ، Computer security,Security measures ، Cyberspace,، Data protection,Security measures ، Computer networks
Classification :
QA
76
.
9
.
A25
C918


54. Cyber terrorism
Author: / by Joseph F. Gustin
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer crimes- Prevention,Cyberterrorism- Prevention,Computer security,Facility management
Classification :
HV6773
.
G87
2004


55. Cyber terrorism
Author: / by Joseph F. Gustin
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer crimes- Prevention,Cyberterrorism- Prevention,Computer security,Facility management
Classification :
HV6773
.
G87
2004


56. Cybersecurity incident response :
Author: Eric C. Thompson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Computer security-- Management.,Computer crimes.,Computer security-- Management.
Classification :
QA76
.
9
.
A25


57. Data and Applications Security and Privacy XXIX
Author: \ Pierangela Samarati (Ed.)
Library: Library of Foreign Languages and Islamic Sources (Qom)
Subject: Computer security -- Congresses.,Computer networks -- Security measures -- Congresses.,Database management.,کامپیوترها -- ایمنی اطلاعات -- کنگرهها ,شبکههای کامپیوتری -- تدابیر ایمنی -- کنگرهها ,پایگاههای اطلاعاتی -- مدیریت
Classification :
QA
76
.
9
.
A25D32
2015
E-Book
,


58. Data mining and machine learning in cybersecurity
Author: Dua, Sumeet.
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: ، Data mining,، Machine learning,، Computer security,، Computers- Database Management - Data Mining,، Computers- Software Development & Engineering-Systems Analysis & Design,، Computers -Security - General
Classification :
QA
76
.
9
.
D343
D825
2011


59. Data privacy
Author: Nataraj Venkataramanan and Ashwin Shriram.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Customer relations.,Data protection.,Management information systems-- Security measures.,Privacy, Right of.

60. Database and applications security
Author:
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Database security.,Database management,Computer security
Classification :
QA
76
.
9
.
D314
T47
2005

