121. Handbook of research on security considerations in cloud computing /
Author: Kashif Munir, Mubarak S. Al-Mutairi, and Lawan A. Mohammed, editors
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Cloud computing-- Security measures, Handbooks, manuals, etc
Classification :
QA76
.
585
.
H3646
2015


122. Hands-on security in DevOps :
Author: Tony Hsu.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Access control.,Computer networks-- Security measures.,Information technology-- Management.,Computer networks-- Access control.,Computer networks-- Security measures.,COMPUTERS-- Security-- General.,Information technology-- Management.
Classification :
HD30
.
2


123. Holistic approach to quantum cryptography in cyber security
Author: edited Shashi Bhushan... [et al.].
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Data encryption (Computer science),Computer networks,Quantum cryptography.,Security measures.,Risk Analysis Assessment.

124. How do rogue nations threaten human rights? -- North Korea represses freedom / Kay Seok -- Iran violates women's rights / Sam Brownback -- Sudanese government engages in genocide / Human Rights Watch -- United States violates human rights worldwide / Vernon Coleman -- Rogue nations undermine the United Nations' mission to promote human rights / Joseph Loconte -- U.S. invasions have not spread democracy in the Middle East / Phyllis Bennis -- How should the global community respond to rogue nations? -- Preemptive force is sometimes necessary to contain rogue nations / National Review -- Preemptive force threatens efforts to contain rogue states / Ivan Eland -- Missile defense system is necessary to protect against rogue nations / Dennis Ross -- Missile defense system is unnecessary / Gwynne Dyer -- Promoting globalization will reduce the threat posed by rogue states / Banning N. Garrett, Dennis M. Sherman -- Globalization
Author: Louise Gerdes, book editor.
Library: Library of Islamic Parliament (Tehran)
Subject:

125. IT compliance and control
Author: / James J. DeLuccia
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks- Security measures,Computer networks- Standards,Information technology- Management
Classification :
TK5105
.
875
.
D45
2008


126. IT risk management guide :
Author: Gerard Blokdijk, Claire Engle & Jackie Brewster.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises -- Computer networks -- Security measures -- Handbooks, manuals, etc.,Computer security -- Management -- Handbooks, manuals, etc.,Electronic data processing departments -- Security measures -- Handbooks, manuals, etc.
Classification :
HF5548
.
37
G473
2008


127. IT security risk control management :
Author: Raymond Pompon.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security.,Information technology-- Security measures-- Management.
Classification :
QA76
.
9
.
A25


128. IT security risk control management :
Author: Raymond Pompon
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security,Information technology-- Security measures-- Management
Classification :
QA76
.
9
.
A25


129. Impacts and risk assessment of technology for Internet security :
Author: / by Charles A. Shoniregun
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer networks , Security measures,Internet , Security measures,Business enterprises , Computer networks , Security measures,Risk management
Classification :
E-BOOK

130. Impacts and risk assessment of technology for Internet security
Author: by Charles A. Shoniregun.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer networks-- Security measures.,Internet-- Security measures.,Risk management.

131. Impacts and risk assessment of technology for Internet security enabled information small-medium enterprises (TEISMES)
Author: / by Charles A. Shoniregun
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer networks , Security measures,Internet , Security measures,Business enterprises , Computer networks , Security measures,Risk management
Classification :
TK5105
.
59
.
S537
2005


132. 20090601 ,Includes bibliographical references and index. 0
Author: 20090602 ,20090602 0
Library: Library of Islamic Parliament (Tehran)
Subject:

133. Includes bibliographical references (p. 49-51). 0,B
Author: Zeren Tanındı. ,/ Katie Normington.
Library: Library of Islamic Parliament (Tehran)
Subject:

134. Includes bibliographical references (p. 375) and index. 0
Author: Brian M. Fagan.
Library: Library of Islamic Parliament (Tehran)
Subject:

135. Includes bibliographical references (p. 225-231) and index. 0
Author: Andrew Green.
Library: Library of Islamic Parliament (Tehran)
Subject:

136. Information assurance architecture /
Author: Keith D. WIllett.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Communication systems-- Management.,Computer networks-- Security measures.,Computer security.,Data protection.,Information resources management.,Information technology-- Management.,Business enterprises-- Communication systems-- Management.,Computer networks-- Security measures.,Computer security.,Data protection.,Information resources management.,Information technology-- Management.
Classification :
QA76
.
9
.
A25
W5487
2008


137. Information security in research and business :
Author: edited by Louise Yngström, Jan Carlsen.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business -- Data processing -- Security measures -- Congresses.,Business -- Data processing -- Security measures.,Computer security -- Congresses.
Classification :
QA76
.
9
.
A25
E358
1997


138. Information technology risk management and compliance in modern organizations.
Author: / Manish Gupta...[et al.]
Library: Central library of medical university of Isfahan (Esfahan)
Subject: Business enterprises-- Computer networks-- Security measures. , Information technology-- Security measures. , Data protection, Computer security, Risk management.
Classification :
HF5548
.
37
.
I5
2018


139. Information technology risk management in enterprise environments
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Business enterprises ; Computer networks ; Security measures. ; Information technology ; Security measures. ; Data protection. ; Computer security. ; Risk management. ;

140. Information technology risk management in enterprise environments :
Author: Jake Kouns, Daniel Minoli.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Business enterprises-- Computer networks-- Security measures.,Computer security.,Data protection.,Information technology-- Security measures.,Risk management.
