11. BL,BL
Author: / Marshall G.S. Hodgson. ,20090530 0
Library: Library of Islamic Parliament (Tehran)
Subject:

12. 20090601 ,Includes bibliographical references and index. 0
Author: 20090602 ,20090602 0
Library: Library of Islamic Parliament (Tehran)
Subject:

13. Information assurance and security ethics in complex systems
Author: / [edited by]Melissa Jane Dar
Library: Insurance Research Institute Library (Tehran)
Subject: Computer security,Data protection,Privacy, Right of,Information technology, Security measures
Classification :
QA76
.
9
.
I5
2011


14. Information assurance architecture /
Author: Keith D. WIllett.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Communication systems-- Management.,Computer networks-- Security measures.,Computer security.,Data protection.,Information resources management.,Information technology-- Management.,Business enterprises-- Communication systems-- Management.,Computer networks-- Security measures.,Computer security.,Data protection.,Information resources management.,Information technology-- Management.
Classification :
QA76
.
9
.
A25
W5487
2008


15. Information security a manager's guide to thwarting data thieves and hackers
Author: / Philip Alexander
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Business enterprises , Computer networks , Security measures,Information technology , Security measures,Computer security,Data protection
Classification :
HF5548
.
37
.
A44
2008


16. Make a shield from wisdom :
Author: 20090507 0
Library: Library of Islamic Parliament (Tehran)
Subject:

18. Privacy protection for e-services /[edited by] George Yee.
Author:
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Electronic commerce--Security measures.,Computer security,Data protection,Privacy, Right of.
Classification :
HF
5548
.
37
.
P753
2006

