321. IT security management
Author: / Alberto Partida, Diego Andina
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computer security, Management,Business enterprises, Computer networks, Security measures
Classification :
QA76
.
9
.
A25
,
P383
2010


322. IT security management IT securiteers - setting up an IT security function
Author: / Alberto Partida, Diego Andina
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer security, Management,Business enterprises, Computer networks, Security measures
Classification :
QA76
.
9
.
A25P383
2010


323. IT security management : IT securiteers -- setting up an IT security function
Author: Alberto Partida, Diego Andina
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: Management ، Computer security,Computer networks -- Security measures ، Business enterprises
Classification :
QA
76
.
9
.
A25P37


324. Identity and access management
Author: Ertem Osmanoglu
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security,Computers-- Access control,False personation-- Prevention
Classification :
QA76
.
9
.
A25
O783
2013


325. Impacts and risk assessment of technology for Internet security :
Author: / by Charles A. Shoniregun
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Internet , Security measures,Business enterprises , Computer networks , Security measures,Risk management
Classification :
E-BOOK

326. Impacts and risk assessment of technology for Internet security
Author: by Charles A. Shoniregun.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer networks-- Security measures.,Internet-- Security measures.,Risk management.

327. Impacts and risk assessment of technology for Internet security enabled information small-medium enterprises (TEISMES)
Author: / by Charles A. Shoniregun
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer networks , Security measures,Internet , Security measures,Business enterprises , Computer networks , Security measures,Risk management
Classification :
TK5105
.
59
.
S537
2005


328. Implementing SSH
Author: / Himanshu Dwivedi
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: UNIX Shells,Computer networks- Security measures,Data encryption (Computer science)
Classification :
QA76
.
76
.
O63
,
D895
2004


329. Implementing the ISO/IEC 27001 information security management system standard
Author: / Edward Humphreys
Library: Central Library of Imam Khomeini International University of Qazvin (Qazvin)
Subject: Computer security- Management- Standards,Computer networks- Security measures- Standards,Data protection- Standards,Information technology- Standards
Classification :
QA76
.
9
.
A25
,
H855
2007


330. Implementing the ISO/IEC 27001 information security management system standard
Author: Edward Humphreys
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Computer security -- Management -- Standards,Computer networks -- Security measures -- Standards,Data protection -- Standards,Information technology -- Standards
Classification :
QA
،
76
.
9
،.
A25
,
H855
،
2007


331. Implementing the ISO/IEC 27001 information security management system standard
Author: Humphreys, Edward.
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Management - Standards ، Computer security,Security measures - Standards ، Computer networks,Standards ، Data protection,Standards ، Information technology
Classification :
QA
76
.
9
.
A25
H855
2007


332. 20090601 ,Includes bibliographical references and index. 0
Author: 20090602 ,20090602 0
Library: Library of Islamic Parliament (Tehran)
Subject:

333. Includes bibliographical references and index. 0
Author: Seán Duffy, editor ; associate editors, Ailbhe MacShamhráin, James Moynes.
Library: Library of Islamic Parliament (Tehran)
Subject:

334. Includes bibliographical references (p. 49-51). 0,B
Author: Zeren Tanındı. ,/ Katie Normington.
Library: Library of Islamic Parliament (Tehran)
Subject:

335. Includes bibliographical references (p. 375) and index. 0
Author: Brian M. Fagan.
Library: Library of Islamic Parliament (Tehran)
Subject:

336. Includes bibliographical references (p. 225-231) and index. 0
Author: Andrew Green.
Library: Library of Islamic Parliament (Tehran)
Subject:

337. Includes index. 0
Author: Bruce Mazlish.
Library: Library of Islamic Parliament (Tehran)
Subject:

338. Information Systems Security :
Author: Sushil Jajodia, Chandan Mazumdar (editions.)
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses,Computer security, Congresses,Data encryption (Computer science), Congresses,Data protection, Congresses
Classification :
QA76
.
9
.
A25
I25
2011


339. Information Technology -- New Generations :
Author: Shahram Latifi, editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science, Congresses.,Electrical engineering.,Information technology, Congresses.,Algorithms & data structures.,Computer science.,Computer security.,COMPUTERS-- Computer Literacy.,COMPUTERS-- Computer Science.,COMPUTERS-- Data Processing.,COMPUTERS-- Hardware-- General.,COMPUTERS-- Information Technology.,COMPUTERS-- Machine Theory.,COMPUTERS-- Reference.,Electrical engineering.,Information retrieval.,Information technology.
Classification :
QA75
.
5


340. Information assurance :
Author: [edited by] Yi Qian [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Reliability.,Computer networks-- Security measures.,Computer security.,Computer networks-- Reliability.,Computer networks-- Reliability.,Computer networks-- Security measures.,Computer networks-- Security measures.,Computer security.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
TK5105
.
59
.
I5247
2008eb

