441. The disaster recovery handbook: a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets
Author: Wallace, Michael
Library: Central Library and Information Center of Ferdowsi University of Mashhad (Khorasan Razavi)
Subject: Handbooks, manuals, etc ، Emergency management,Handbooks, manuals, etc ، Crisis management,Handbooks, manuals, etc ، Computer security,Handbooks, manuals, etc ، Data protection,Planning - Handbooks, manuals, etc ، Data recovery )Computer science(,Handbooks, manuals, etc ، Business planning
Classification :
HD
49
.
W36
2007


442. <The> economic impacts of terrorist attacks /
Author: edited by Harry W. Richardson, Peter
Library: Library of Islamic Parliament (Tehran)
Subject:

443. <The> executive guide to information Security
Author: / Mark Egan
Library: Library and knowledge management of the management schools of Tehran University (Tehran)
Subject: Data protection.,Computer security.,Information technology-Security measures
Classification :
005
.
8
E28e


444. The information systems security officer's guide :
Author: Gerald L. Kovacich.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Data protection.,Protection de l'information (Informatique),Sécurité informatique.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Data protection.
Classification :
QA76
.
9
.
A25
K68
2003eb


445. The official (ISC)² CISSP CBK reference /
Author: John Warsinkse ; with Mark Graff, Kevin Henry, Christopher Hoover, Ben Malisow, Sean Murphy, C. Paul Oakes, George Pajari, Jeff T. Parker, David Seidl, Mike Vasquez.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Administrative agencies-- Information resources management-- Security measures-- United States-- Examinations, Study guides.,Computer networks-- Security measures-- Examinations, Study guides.,Computers-- Access control-- Examinations, Study guides.,Telecommunications engineers-- Certification-- United States.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Computer networks-- Security measures-- Examinations.,Telecommunications engineers-- Certification.,United States., 7
Classification :
TK5105
.
59


446. The security risk assessment handbook a complete guide for performing security risk assessments
Author: / Douglas J. Landoll
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Business , Data processing , Security measures,Computer security,Data protection,Risk assessment
Classification :
HF5548
.
37
.
L358
2006


447. The traditional problem of evil: suffering and evil actions -- Another problem of evil: divine hiddenness -- Miracles as a problem of evil -- The ignorance defense -- Identifying, interpreting, and certifying revelation -- Should God's power be understood as omnipotence? -- A process Christian theism and the problems of evil. 0
Author: James A. Keller.
Library: Library of Islamic Parliament (Tehran)
Subject:

448. TortoiseSVN 1.7 beginner's guide :
Author: Lesley Harrison.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: TortoiseSVN.,TortoiseSVN.,TortoiseSVN.,Computer software-- Development.,Open source software.,Computer software-- Development.,COMPUTERS-- Programming-- Open Source.,COMPUTERS-- Software Development & Engineering-- General.,COMPUTERS-- Software Development & Engineering-- Tools.,Open source software.
Classification :
QA76
.
76
.
D47
H37
2011eb


449. Toward a safer and more secure cyberspace /
Author: Committee on Improving Cybersecurity Research in the United States, Computer Science and Telecommunications Board, Division on Engineering and Physical Sciences, National Research Council of the National Academies ; Seymour E. Goodman and Herbert S. Lin, editors.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Cyberterrorism-- Prevention.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.,Cyberterrorism-- Prevention.
Classification :
QA76
.
9
.
A25
T695
2007eb


450. Tribe of Hackers :
Author: Marcus J. Carey & Jennifer Jin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,Computers.,Data protection.,Risk management.,Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,COMPUTERS-- Security-- Cryptography.,Computers.,Data protection.,Risk management.
Classification :
HF5548
.
37
C37
2019eb


451. Tribe of hackers :
Author: Marcus J, Carey and Jennifer Jin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,Data protection.,Risk management.,Business enterprises-- Security measures.,Computer networks-- Security measures.,Computer security.,Data protection.,Risk management.

452. Trust management VII :
Author: Carmen Fernández-Gago [and others] (Eds.).
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks -- Security measures -- Congresses.,Computer security -- Congresses.,Data encryption (Computer science) -- Congresses.
Classification :
QA76
.
9
.
A25
C376
2013


453. Understanding business /
Author: William Nickels, University of Maryland, College Park, James M. McHugh, Saint Louis CC Forest Park, Susan M. McHugh, Saint Louis CC Forest Park.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business-- Vocational guidance.,Business.,Industrial management.,Business-- Vocational guidance.,Business.,Industrial management.
Classification :
HD31
.
2
.
N53
2019


454. Understanding cyber risk :
Author: Thomas R. Koehler.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Business intelligence.,Computer crimes-- Prevention.,Data protection.,BUSINESS & ECONOMICS-- Industrial Management.,BUSINESS & ECONOMICS-- Management Science.,BUSINESS & ECONOMICS-- Management.,BUSINESS & ECONOMICS-- Organizational Behavior.,Business enterprises-- Computer networks-- Security measures.,Business intelligence.,Computer crimes-- Prevention.,Data protection.
Classification :
HF5548
.
37
.
K64
2018


455. Understanding forensics in IT
Author: / With NIIT
Library: Central Library and Archive Center of shahid Beheshti University (Tehran)
Subject: Computer security,Data protection,-- Management
Classification :
658
.
0558
U55
2005


456. Upgrading and repairing PCs /
Author: Scott Mueller
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Microcomputers-- Equipment and supplies,Microcomputers-- Maintenance and repair,Microcomputers-- Upgrading
Classification :
TK7887
.
M84
2012


457. Wireless sensor networks :
Author: Shuang-Hua Yang
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Wireless sensor networks.,Circuits and Systems.,Communications Engineering, Networks.,Computer Communication Networks.,Engineering.,Information Systems Applications (incl. Internet)
Classification :
TK7872
.
D48


459. 300 best jobs without a four-year degree /
Author: Michael Farr and Laurence Shatkin.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Employment forecasting.,Job hunting.,Vocational guidance.,BUSINESS & ECONOMICS-- Careers-- General.,Employment forecasting.,Job hunting.,Vocational guidance.
Classification :
HF5381
.
F4562
2009eb

