• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۳ پاسخ غیر تکراری از ۳ پاسخ تکراری در مدت زمان ۰,۶۷ ثانیه یافت شد.

1. Building a hipaa-compliant cybersecurity program :using Nist 800-30 and CSF to secure protected health information

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Eric C. Thompson

Library: Library of Razi Metallurgical Research Center (Tehran)

Subject: ، Informatik

Classification :
QA
76
.
15
.
B34
2017

2. Cleavage, Connection and Conflict in Rural, Urban and Contemporary Asia

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Tim Bunnell, D. Parthasarathy, Eric C. Thompson

Library: Central library and document university of Kurdistan (Kurdistan)

Subject: ANTHROPOLOGY,SOCIOLOGY

Classification :

3. Cybersecurity incident response :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Eric C. Thompson.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer crimes.,Computer security-- Management.,Computer crimes.,Computer security-- Management.

Classification :
QA76
.
9
.
A25
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival