161. Application security in the ISO 27001 environment
Author: Vinod, Vasudevan
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,Reliability ، Computer software,Computer networks Security measures Standards ، Business enterprises,Management Standards ، Computer security
Classification :
QA
76
.
64
.
V56
2008


162. Applied Decision-Making :
Author: editors, Mauricio A. Sanchez, Leocundo Aguilar, Manuel Castañón-Puga and Antonio Rodríguez.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Decision making-- Mathematical models.,Decision making-- Simulation methods, Case studies.,Decision making-- Mathematical models.,Decision making-- Simulation methods.,SCIENCE-- System Theory.,TECHNOLOGY & ENGINEERING-- Operations Research.
Classification :
QA279
.
4


163. Applied information security :
Author: David Basin, Patrick Schaller, Michael Schläpfer.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Data encryption (Computer science),Data protection.
Classification :
QA76
.
9
.
A25
B37
2011


164. Artificial Intelligence and Security :
Author: edited by Xingming Sun, Zhaoqing Pan, Elisa Bertino.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Artificial intelligence, Congresses.,Cloud computing-- Security measures, Congresses.,Artificial intelligence.
Classification :
QA76
.
9
.
A25
I23
2019


167. BL
Author: edited by Susan E. Israel, Gerald G. Duffy.
Library: Library of Islamic Parliament (Tehran)
Subject:

171. BL
Author: Seán Duffy, editor ; associate editors, Ailbhe MacShamhráin, James Moynes.
Library: Library of Islamic Parliament (Tehran)
Subject:

172. BL
پدیدآورنده : edited by Thomas J. Biersteker and Sue E. Eckert.
موضوع :
۲ نسخه از این کتاب در ۱ کتابخانه موجود است.
174. BL,Archives and archivists : key collaborators in the digital lbirary / William E. Landis, Robin L. Chandler -- Committing to memory : a project to publish and preserve California local history digital resources / Adrian L. Turner -- Technologically enhanced archival collections : using the buddy system / Dayna Holz -- California cultures : implementing a model for virtual collections / Genie Guerard, Robin L. Chandler -- The importance of user-centered design : exploring findings and methods / Rosalie Lack -- How and why of user studies : RLG's RedLightGreen as a case study / Merrilee Proffitt -- From horse-drawn wagon to hot rod : the University of California's digital image service experience / Maureen A. Burns -- Archiving web sites for preservation and access : MODS, METS and MINERVA / Rebecca Guenther, Leslie Myrick -- Video preservation and digital reformatting : pain and possibility / Jerome McDonough, Mona Jimenez -- Digital archiving and preservation : technologies and processes for a trusted repository / Ronald Jantz, Michael Giarlo -- The complexities of digital resources : collection boundaries and management responsibilities / Joan
Author: Philip Mattar, editor in chief. ,William E. Landis, Robin L. Chandler, editors.
Library: Library of Islamic Parliament (Tehran)
Subject:

175. BL,BL
Author: / Marshall G.S. Hodgson. ,20090530 0
Library: Library of Islamic Parliament (Tehran)
Subject:

176. BL,Federal government information policy and the electronic federal depository library / William Sudduth -- The impact of technology on managing access to electronic government information in libraries / Amy West -- Digital preservation of electronic government information / Grace-Ellen McCrann -- Electronic government spatial information : issues, challenges, and opportunities / Linda Zellmer -- Providing access to e-government information to diverse populations / Marianne Mason -- Reaching out to youth with electronic government information / Karen Russ and Sarah Zegenbein -- Collection development : handling electronic government information through the Federal Depository Library Program and beyond / Hui Hua Chua -- United States Government Printing Office practices for cataloging electronic resources / John A. Stevenson -- Bibliographic control and processing of electronic government information in libraries / Elaine Winske -- Integrating online government documents into library reference services / Grace-Ellen McCrann -- Government information instruction in the information literacy environment / Barbara Miller and Barbara J. Mann -- Digital preservation of electronic government information :
Author: 20090530 ,edited by Andrea M. Morrison for the Government Documents Round Table.
Library: Library of Islamic Parliament (Tehran)
Subject:

177. Big data analytics in cybersecurity
Author: edited by Onur Savas, Julia Deng.
Library: Library of College of Science University of Tehran (Tehran)
Subject: Computer security.,Big data.,Database security.,Computer networks,Information technology,Security measures.,Management.
Classification :
QA76
.
9
.
A25
B538
2017


178. Big data analytics in cybersecurity /
Author: edited by Onur Savas, Julia Deng.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Big data.,Computer networks-- Security measures.,Computer security.,Database security.,Information technology-- Management.,Big Data,Big data.,Computer networks-- Security measures.,Computer security.,Database security.,Datenanalyse,Datensicherung,Information technology-- Management.
Classification :
QA76
.
9
.
A25
B54
2017


179. Breaches of contracts and claims by third parties / Stephen Waddams -- Policy issues in defective property cases / Stephen Todd -- Defective structures and economic loss in the United States : law and policy / David F. Partlett -- Harm screening under negligence law / Israel Gilead -- Acts ,Notre Dame, Ind. :
Author: edited by Jason W. Neyers, Erika Chamberlain and Stephen G. A. Pitel. ,Alexandra Cuffel.
Library: Library of Islamic Parliament (Tehran)
Subject:

180. Building virtual pentesting labs for advanced penetration testing :
Author: Kevin Cardwell.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Testing.,Computers-- Access control.,Computer networks-- Monitoring.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.
Classification :
TK5105
.
59

