541. The Executive guide to information security: threats, challenges, and solutions
Author: Mark Egan with Tim Mather
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection
Classification :
HF
،
5548
.
32
،.
E325
،
2005


542. The NICE cyber security framework :
Author: Izzat Alsmadi.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25


543. The Practice of Network Security Monitoring :
Author: by Richard Bejtlich.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Electronic countermeasures.
Classification :
TK
5105
.
59
.
B436
2013


544. The art of enterprise information architecture
Author: / Mario Godinez ... [et al.]
Library: Farabi Faculty Library, University of Tehran (Qom)
Subject: Information technology, Management,Management information systems,Business enterprises, Computer networks, Security measures,Information technology, Security measures
Classification :
HD
30
.
2
.
A77
2010


545. The art of enterprise information architecture :
Author: Mario Godinez [and others].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Information technology-- Management.,Information technology-- Security measures.,Management information systems.,Business & Economics.,Business enterprises-- Computer networks-- Security measures.,Business enterprises-- Computer networks-- Security measures.,Computer Science.,Engineering & Applied Sciences.,Information technology-- Management.,Information technology-- Management.,Information technology-- Security measures.,Information technology-- Security measures.,Management information systems.,Management information systems.,Management Theory.,Management.
Classification :
HD30
.
2
.
A77
2010


546. The art of enterprise information architecture. a systems-based approach for unlocking business insight
Author: Mario Godinez ... ]et al.[
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Information technology- Management,، Management information systems,، Business enterprises- Computer networks- Security measures,، Information technology- Security measures
Classification :
HD
30
.
2
.
A77
2010


547. The basics of information security
Author: Jason Andress.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Information resources management.

548. The basics of information security : understanding the fundamentals of InfoSec in theory and practice
Author: Andress, Jason.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,Security measures ، Computer networks,، Information resources management
Classification :
QA
76
.
9
.
A25
A5453
2011


549. The business case for network security
Author: / Catherine Paquet, Warren Saxe
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management
Classification :
TK5105
.
59
.
P37
2005


550. The business case for network security
Author: / Catherine Paquet, Warren Saxe
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management
Classification :
TK5105
.
59
.
P37
2005


551. The information systems security officer's guide :
Author: Dr. Gerald L. Kovaich
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures,Computer security

552. The official (ISC)² CISSP CBK reference /
Author: John Warsinkse ; with Mark Graff, Kevin Henry, Christopher Hoover, Ben Malisow, Sean Murphy, C. Paul Oakes, George Pajari, Jeff T. Parker, David Seidl, Mike Vasquez.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Administrative agencies-- Information resources management-- Security measures-- United States-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations, Study guides.,Computers-- Access control-- Examinations, Study guides.,Telecommunications engineers-- Certification-- United States.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer networks-- Security measures-- Examinations.,Telecommunications engineers-- Certification.,United States., 7
Classification :
TK5105
.
59


553. The roots of reading comprehension instruction / P. David Pearson -- The development of children's reading comprehension / Scott G. Paris and Ellen E. Hamilton -- In search of the "simple view" of reading comprehension / James V. Hoffman -- Identifying and describing constructively responsive comprehension strategies in new and traditional forms of reading / Peter Afflerbach and Byeong-Young Cho -- Helping readers make sense of print : research that supports a whole language pedagogy / Kenneth S. Goodman and Yetta M. Goodman -- The role of cognitive flexibility in reading comprehension : past, present, and future / Kelly B. Cartwright -- Ways of meaning making : sociocultural perspectives on reading comprehension / James Gavelek and Patrick Bresnahan -- Transactional theory and critical theory in reading comprehension / James S. Damico, Gerald Campano, and Jerome C. Harste -- Grounding reading comprehension in the neuroscience literatures / George G. Hruby -- Text comprehension : a retrospective, perspective, and prospective / Emily Fox and Patricia A. Alexander -- Disciplinary comprehension / Cynthia Shanahan -- The agency and artistry of meaning makers within and across digital spaces / Robert J. Tierney -- Comprehension and computer technology : past results, current knowledge, and future promises / Michael L. Kamil and Helen Kim Chou -- Motivation and reading comprehension / Samuel D. Miller and Beverly S. Faircloth -- Vocabulary and reading comprehension : the nexus of meaning / James F. Baumann -- Cognitive strategy instruction / Janice A. Dole, Jeffery D. Nokes, and Dina Drits -- Metacognitive processes and reading comprehension / Linda Baker and Lisa Carter Beall -- Self-regulated comprehension / Dixie D. Massey -- Formal and informal measures of reading comprehension / Lauren Leslie and Joanne Caldwell -- Assessing comprehension of young children / Katherine A. Dougherty Stahl -- Approaches to teaching reading comprehension / Taffy E. Raphael ... [et al.] -- Comprehension and discussion of text / Janice F. Almasi and Keli Garas-York -- Comprehension instruction in kindergarten through grade three / Cathy Collins Block and Jan Lacina -- Developing higher order comprehension in the middle grades / Ruth Wharton-McDonald and Shannon Swiger -- Improving adolescent comprehension : developing comprehension strategies in the content areas / Mark W. Conley -- Comprehension difficulties among struggling readers / Richard L. Allington and Ann McGill-Franzen -- Reading comprehension and diversity in historical perspective : literacy, power, and native Hawaiians / Kathryn H. Au and Julie Kaomea -- Culturally relevant pedagogy and reading comprehension / Colleen M. Fairbanks ... [et al.] -- Reading comprehension and English language learners / Kathryn Prater -- Family literacy and reading comprehension / Patricia A. Edwards and Jennifer D. Turner -- Improving comprehension instruction through quality professional development / Misty Sailors -- Public policy and the future of reading comprehension research / Cathy Roller -- Where to from here? : themes, trends, and questions / Gerald G. Duffy ... [et al.]. 0
Author: edited by Susan E. Israel, Gerald G. Duffy.
Library: Library of Islamic Parliament (Tehran)
Subject:

554. The state of the art in intrusion prevention and detection
Author: edited by Al-Sakib Khan Pathan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures.,Computer security.,Computers -- Access control.
Classification :
QA76
.
9
.
A25
E358
9999


555. The superpowers -- "The Arabs are coming!" -- "Jihad!" -- The co-opted caliphate and the stumbling Jihad -- The year 711 -- Picking up the pieces after Rome -- The myth of Poitiers -- The fall and rise of the Umayyads -- Saving the popes -- An empire of force and faith -- Carolingian Jihads: Roncesvalles and Saxony -- The great mosque -- The first Europe, briefly -- Equipoise--delicate and doomed -- Disequilibrium Pelayo's revenge -- Knowledge transmitted, rationa
Author: David Levering Lewis.
Library: Library of Islamic Parliament (Tehran)
Subject:

556. Toward a safer and more secure cyberspace /
Author: Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Cyberterrorism-- Prevention.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Cyberterrorism-- Prevention.
Classification :
QA76
.
9
.
A25
T695
2007eb


557. Transactions on large-scale data- and knowledge-centered systems XXXVII /
Author: edited by Abdelkader Hameurlain, Roland Wagner.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data mining, Congresses.,Database management, Congresses.,Artificial intelligence.,Artificial intelligence.,Computer networks.,Computer science.,Computer security.,Computer security.,Computers-- Database Management-- Data Mining.,Computers-- Hardware-- Network Hardware.,Computers-- Intelligence (AI) & Semantics.,Computers-- Operating Systems-- General.,Computers-- Security-- General.,Computers-- Software Development & Engineering-- General.,Data mining.,Data mining.,Network hardware.,Operating systems (Computers),Operating systems.,Software engineering.,Software Engineering.
Classification :
QA76
.
9
.
A25


558. Transactions on large-scale data- and knowledge-centered systems XXXVIII :
Author: Abdelkader Hameurlain, Roland Wagner, Sven Hartmann, Hui Ma (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Data mining, Congresses.,Database management, Congresses.,Computer networks-- Security measures.,Computer security.,Data mining.,Database management.
Classification :
QA76
.
9
.
A25


559. Transformational security awareness :
Author: Perry Carpenter.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,BUSINESS & ECONOMICS-- Production & Operations Management.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Operating Systems-- General.
Classification :
QA76
.
9
.
A25
C37
2019eb

