1. Building a hipaa-compliant cybersecurity program :using Nist 800-30 and CSF to secure protected health information
Author: Eric C. Thompson
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Informatik
Classification :
QA
76
.
15
.
B34
2017


2. Cleavage, Connection and Conflict in Rural, Urban and Contemporary Asia
Author: Tim Bunnell, D. Parthasarathy, Eric C. Thompson
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: ANTHROPOLOGY,SOCIOLOGY

3. Cybersecurity incident response :
Author: Eric C. Thompson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes.,Computer security-- Management.,Computer crimes.,Computer security-- Management.
Classification :
QA76
.
9
.
A25

