341. Information assurance architecture
Author: / Keith D. WIllett
Library: Insurance Research Institute Library (Tehran)
Subject: Computer security,Computer networks, Security measures,Information resources management,Information technology, Management,Business enterprises, Communication systems, Management,Data protection
Classification :
QA76
.
9
.
W3I5
2008


342. Information assurance architecture
Author: / Keith D. WIllett
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security.,Computer networks--Security measures,Information resources management.,Information technology--Management,Business enterprises--Communication systems--Management,Data protection.
Classification :
QA76
.
9
.
A25
,
W5487
2008


343. Information assurance architecture /
Author: Keith D. WIllett.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Communication systems-- Management.,Computer networks-- Security measures.,Computer security.,Data protection.,Information resources management.,Information technology-- Management.,Business enterprises-- Communication systems-- Management.,Computer networks-- Security measures.,Computer security.,Data protection.,Information resources management.,Information technology-- Management.
Classification :
QA76
.
9
.
A25
W5487
2008


344. Information assurance architecture
Author: / Keith D. WIllett
Library: Library and knowledge management of the management schools of Tehran University (Tehran)
Subject: Computer security,Computer networks, Security measures,Information resources management,Information technology, Management,Business enterprises, Communication systems, Management,Data protection
Classification :
005
.
8
W713i
2008


345. Information assurance architecture
Author: / Keith D. Willett
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computer security,Computer networks,Information resources management,Information technology,Business enterprises,Data protection,-- Security measures,-- Management,-- Communication systems -- Management
Classification :
005
.
8
W713I
2008


346. Information security and digital forensics :
Author: Dasun Weerasinghe (Ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Investigation, Congresses.,Computer networks-- Access control, Congresses.,Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Internet-- Security measures, Congresses.,Computer crimes-- Investigation.,Computer networks-- Access control.,Computer networks-- Security measures.,Computer security.,Informatique.,Internet-- Security measures.
Classification :
QA76
.
9
.
A25
I584
2010


347. Information security in research and business :
Author: edited by Louise Yngström, Jan Carlsen.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business -- Data processing -- Security measures -- Congresses.,Business -- Data processing -- Security measures.,Computer security -- Congresses.
Classification :
QA76
.
9
.
A25
E358
1997


348. Information security management metrics :a definitive guide to effective security monitoring and measurement
Author: Brotby, W. Krag.
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: Security measures ، Information technology,، Computer security,Computer networks Security measures ، Business enterprises,، Data protection
Classification :
HD
30
.
2
.
B78
2009


349. Information technology risk management and compliance in modern organizations.
Author: / Manish Gupta...[et al.]
Library: Central library of medical university of Isfahan (Esfahan)
Subject: Business enterprises-- Computer networks-- Security measures. , Information technology-- Security measures. , Data protection, Computer security, Risk management.
Classification :
HF5548
.
37
.
I5
2018


350. Information technology risk management in enterprise environments
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Business enterprises ; Computer networks ; Security measures. ; Information technology ; Security measures. ; Data protection. ; Computer security. ; Risk management. ;

351. Information technology risk management in enterprise environments :
Author: Jake Kouns, Daniel Minoli.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.,Risk management.

352. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Ilam University Central Library (Ilam)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K68
2010


353. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K68
2010


354. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Library and knowledge management of the management schools of Tehran University (Tehran)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
658
.
478
K88i
2010


355. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Business enterprises--Computer networks--Security measures,Information technology--Security measures,Data protection.,Computer security.,Risk management.
Classification :
HF
,
5548
.
37
,.
K68
,
2010


356. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Farabi Faculty Library, University of Tehran (Qom)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF
5548
.
37
.
K68
2010


357. Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams
Author: / Jake Kouns, Daniel Minoli
Library: Insurance Research Institute Library (Tehran)
Subject: Business enterprises --Computer networks --Security measures,Information technology --Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K6I5
2010


358. Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
Author: / Jake Kouns, Daniel Minoli
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K68
2010


359. Innovative security solutions for information technology and communications :
Author: Jean-Louis Lanet, Cristian Toma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Information technology-- Security measures, Congresses.,Computer networks-- Security measures.,Computer security.,Information technology-- Security measures.
Classification :
QA76
.
9
.
A25


360. Intelligent computing & optimization /
Author: Pandian Vasant, Ivan Zelinka, Gerhard-Wilhelm Weber, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence, Congresses.,Computer networks-- Security measures, Congresses.,Artificial Intelligence (incl. Robotics).,Computational Intelligence.,Artificial intelligence.,Artificial intelligence.,Computer networks-- Security measures.,COMPUTERS / General
Classification :
Q334

