81. Security technology, disaster recovery and business continuity
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security ; Congresses. ; Computer networks ; Security measures ; Congresses. ; Computer networks ; Access control ; Congresses. ; Data protection ; Congresses. ;

82. Trust management VII :
Author: Carmen Fernández-Gago [and others] (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
C376
2013


83. Trust, privacy and security in digital business
Author: / Costas Lambrinoudakis, G?�nther Pernul, A Min Tjoa (eds.)
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Public key infrastructure (Computer security)--Congresses,Data transmission systems--Security measures--Congresses,Electronic commerce--Security measures--Congresses,Business enterprises--Computer networks--Security measures--Congresses
Classification :
QA
,
76
.
9
,.
A25
,
T74
,
2007


84. Trusted computing and information security :
Author: Huanguo Zhang, Bo Zhao, Fei Yan (eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures, Congresses.,Computer security, Congresses.,Computer networks-- Security measures.,Computer security.
Classification :
QA76
.
9
.
A25


85. Understanding the insider threat :
Author: Richard C. Brackney, Robert H. Anderson.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- United States, Congresses.,Computer security-- United States, Congresses.,Computers-- Access control-- United States, Congresses.,Electronic information resources-- Access control-- United States, Congresses.,Intelligence service-- Computer networks-- Security measures-- United States.,Intelligence service-- United States-- Data processing.,Computer networks-- Security measures.,Computer security.,Computers-- Access control.,Electronic information resources-- Access control.,Intelligence service-- Computer networks-- Security measures.,Intelligence service-- Data processing.,POLITICAL SCIENCE-- Political Freedom & Security-- General.,POLITICAL SCIENCE-- Political Freedom & Security-- Terrorism.,United States., 7
Classification :
QA76
.
9
.
A25
B696
2004


86. 0203931254 (ebook)
Author: edited by Nancy Snow, Philip M. Taylor.
Library: Library of Islamic Parliament (Tehran)
Subject:

88. xiv, 237 p. :
Author: Chris Johnson & Jolyon Leslie.
Library: Library of Islamic Parliament (Tehran)
Subject:

89. xviii, 5,Intern
Author: Carl F. Goodman. ,Jung Wook Cho.
Library: Library of Islamic Parliament (Tehran)
Subject:
