301. Information security policies, procedures, and standards; guidelines for effective information security management
Author: / Thomas R. Peltier,Peltier
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Computer security,Data protection
Classification :
QA
76
.
9
.
A25P46
2002


302. Information security : policy, processes, and practices
Author: Straub, Detmar W
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security.,، Data protection.
Classification :
QA
76
.
9
.
I556
2008


303. Information storage and management :
Author: edited by G. Somasundaram, Alok Shrivastava.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer storage devices.,Data protection.,Information storage and retrieval systems.,Computer storage devices.,COMPUTERS-- Database Management-- General.,COMPUTERS-- Desktop Applications-- Databases.,COMPUTERS-- System Administration-- Storage & Retrieval.,Data protection.,Information storage and retrieval systems.,Information storage and retrieval systems.,Information technology.
Classification :
QA76
.
9
.
D3
I54
2009eb


304. Information systems methodology :
Author: ed. by G. Bracchi ...
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Datenverarbeitung.,Informationssystem,Informationssystem.
Classification :
T58
.
6
E339
1978


305. Information technology and educational management in the knowledge society :
Author: edited by Arthur Tatnall, Javier Osorio, Adrie Visscher.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Education-- Data processing, Congresses.,Educational technology, Congresses.,Information technology, Congresses.,Education-- Data processing.,EDUCATION-- Organizations & Institutions.,Educational technology.,Information technology.,Onderwijsmanagement.,Teleleren.
Classification :
LB1028
.
43
.
I337
2004


306. Information technology risk management and compliance in modern organizations.
Author: / Manish Gupta...[et al.]
Library: Central library of medical university of Isfahan (Esfahan)
Subject: Business enterprises-- Computer networks-- Security measures. , Information technology-- Security measures. , Data protection, Computer security, Risk management.
Classification :
HF5548
.
37
.
I5
2018


307. Information technology risk management in enterprise environments
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Business enterprises ; Computer networks ; Security measures. ; Information technology ; Security measures. ; Data protection. ; Computer security. ; Risk management. ;

308. Information technology risk management in enterprise environments :
Author: Jake Kouns, Daniel Minoli.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.,Risk management.

309. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Ilam University Central Library (Ilam)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K68
2010


310. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K68
2010


311. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Library and knowledge management of the management schools of Tehran University (Tehran)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
658
.
478
K88i
2010


312. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Business enterprises--Computer networks--Security measures,Information technology--Security measures,Data protection.,Computer security.,Risk management.
Classification :
HF
,
5548
.
37
,.
K68
,
2010


313. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Farabi Faculty Library, University of Tehran (Qom)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF
5548
.
37
.
K68
2010


314. Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams
Author: / Jake Kouns, Daniel Minoli
Library: Insurance Research Institute Library (Tehran)
Subject: Business enterprises --Computer networks --Security measures,Information technology --Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K6I5
2010


315. Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
Author: / Jake Kouns, Daniel Minoli
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K68
2010


316. Information technology security and risk management
Author: Jill Slay, Andy Koronios
Library: Library of Institute for Research in Fundamental Sciences (Tehran)
Subject: ، Computer security,، Data protection,، Risk management
Classification :
QA
76
.
9
.
A25S58
2006


317. Information technology security & risk management
Author: Slay, Jill
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: ، Computer security,، Data protection,، Risk assessment
Classification :
QA
76
.
9
.
A25
S63
2006


318. Information technology security & risk management
Author: Slay, Jill
Library: Central Library and Documentation Center (Kerman)
Subject: ، Computer security,، Data protection,Security measures ، Information technology
Classification :
QA
76
.
9
.
S3
I55
2006


319. Information technology security and risk management
Author: Slay, Jill
Library: Central Library of Sharif University of Technology (Tehran)
Subject: ، Computer security,، Data protection,، Risk assessment
Classification :
QA
76
.
9
.
A25
.
S585
2006


320. Information warfare
Author: / Daniel Ventre
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Business intelligence,Trade secrets,Information technology, Security measures,Computer security, Management,Data protection
Classification :
HD38
.
7
.
V4713
2009

