421. Sicherheit in Informationssystemen :
Author: herausgegeben von Heiko Lippold, Paul Schmitz, Heinrich Kersten.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer science.,Data protection.
Classification :
QA76
.
9
.
A25
H473
1991


422. Smart blockchain :
Author: Meikang Qiu (ed.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Blockchains (Databases), Congresses.,Blockchains (Databases)
Classification :
QA76
.
9
.
D32


423. Solving Cyber Risk :
Author:
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,BUSINESS & ECONOMICS-- Insurance-- Risk Assessment & Management.,Computer security.,Data protection.
Classification :
QA76
.
9
.
A25
C577
2018


424. Stabilization, safety, and security of distributed systems :
Author: Xavier Défago, Franck Petit, Vincent Villainches
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security, Congresses,Electronic data processing-- Distributed processing-- Safety measures, Congresses,Self-stabilization (Computer science), Congresses
Classification :
QA76
.
9
.
S54
S67
2011


425. Statistical techniques for network security :
Author: Yun Wang.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
TK5105
.
59
.
W36
2009eb


426. Techniques and applications for advanced information privacy and security :
Author: Hamid R. Nemati, editor.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Electronic commerce-- Security measures.,Information technology-- Security measures.,Computer security.,Data protection.,Electronic commerce-- Security measures.,Information technology-- Security measures.
Classification :
HF5548
.
37
.
T43
2009


427. The CIO's guide to information security incident management /
Author: Eur Ing Matthew W.A. Pemble, Wendy F. Goucher.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,BUSINESS & ECONOMICS-- Production & Operations Management.,Computer security.,COMPUTERS-- Information Technology.,COMPUTERS-- Security-- General.,Data protection.
Classification :
QA76
.
9
.
A25
P46
2019


428. The Executive guide to information security: threats, challenges, and solutions
Author: Mark Egan with Tim Mather
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: Electric commerce -- security measures,Business enterprises -- computer networks -- security measures,Information technology -- security measures,Internet -- security measures,Computer security -- Management,Data Protection
Classification :
HF
،
5548
.
32
،.
E325
،
2005


429. The Practice of Network Security Monitoring :
Author: by Richard Bejtlich.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Electronic countermeasures.
Classification :
TK
5105
.
59
.
B436
2013


430. The Role of Norms and Electronic Institutions in Multi-Agent Systems :
Author: by Javier Vázquez-Salceda.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject:
Classification :
QA76
.
76
.
I58
B953
2004


431. The business case for network security
Author: / Catherine Paquet, Warren Saxe
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management
Classification :
TK5105
.
59
.
P37
2005


432. The business case for network security
Author: / Catherine Paquet, Warren Saxe
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer networks- Security measures,Computer security,Computer security United States- Management,Data protection,Data protection- Management
Classification :
TK5105
.
59
.
P37
2005


433. The chief information security officer
Author: Barry L. Kouns, Jake Kouns.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Data processing-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.

434. The complete book of data anonymization :
Author: Balaji Raghunathan.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Database management.,Database security.
Classification :
QA76
.
9
.
A25
.
R338
2013


435. The digital consumer technology handbooka comprehensive guide to devices, standards, future directions, and programmable logic solutions. [CD]
Author: / by Amit Dhir
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Digital electronics -- Handbooks, manuals, etc,Household electronics -- Handbooks, manuals, etc,Electronic books
Classification :
TK7868
.
D5D4782004eb


436. The disaster recovery handbook
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Emergency management ; Handbooks, manuals, etc. ; Crisis management ; Handbooks, manuals, etc. ; Computer security ; Handbooks, manuals, etc. ; Data protection ; Handbooks, manuals, etc. ; Data recovery (Computer science) ; Planning ; Handbooks, manuals,

437. The disaster recovery handbook :
Author: Michael Wallace, Lawrence Webber.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business planning, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Crisis management, Handbooks, manuals, etc.,Data protection, Handbooks, manuals, etc.,Data recovery (Computer science)-- Planning, Handbooks, manuals, etc.,Emergency management, Handbooks, manuals, etc.
Classification :
HD49
.
W36
2011


438. The disaster recovery handbook :
Author: Michael Wallace, Lawrence Webber.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business planning, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Crisis management, Handbooks, manuals, etc.,Data protection, Handbooks, manuals, etc.,Data recovery (Computer science), Handbooks, manuals, etc.,Emergency management, Handbooks, manuals, etc.
Classification :
HD49
.
W36
2011


439. The disaster recovery handbook
Author: / Michael Wallace, Lawrence Webber
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Emergency management--Handbooks, manuals, etc,Crisis management--Handbooks, manuals, etc,Computer security--Handbooks, manuals, etc,Data protection--Handbooks, manuals, etc,Data recovery (Computer science)--Planning--Handbooks, manuals, etc,Business planning--Handbooks, manuals, etc
Classification :
HD
,
49
,.
W36
,
2011


440. The disaster recovery handbook :
Author: Michael Wallace and Lawrence Webber.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business planning, Handbooks, manuals, etc.,Computer security, Handbooks, manuals, etc.,Crisis management, Handbooks, manuals, etc.,Data protection, Handbooks, manuals, etc.,Data recovery (Computer science)-- Planning, Handbooks, manuals, etc.,Emergency management, Handbooks, manuals, etc.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Business planning.,Computer security.,Crisis management.,Data protection.,Emergency management.
Classification :
HD49

