141. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Ilam University Central Library (Ilam)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K68
2010


142. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Central Library and Documents Center of Tehran University (Tehran)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K68
2010


143. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Library and knowledge management of the management schools of Tehran University (Tehran)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
658
.
478
K88i
2010


144. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Business enterprises--Computer networks--Security measures,Information technology--Security measures,Data protection.,Computer security.,Risk management.
Classification :
HF
,
5548
.
37
,.
K68
,
2010


145. Information technology risk management in enterprise environments
Author: / Jake Kouns, Daniel Minoli
Library: Farabi Faculty Library, University of Tehran (Qom)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF
5548
.
37
.
K68
2010


146. Information technology risk management in enterprise environments : a review of industry practices and a practical guide to risk management teams
Author: / Jake Kouns, Daniel Minoli
Library: Insurance Research Institute Library (Tehran)
Subject: Business enterprises --Computer networks --Security measures,Information technology --Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K6I5
2010


147. Information technology risk management in enterprise environments a review of industry practices and a practical guide to risk management teams
Author: / Jake Kouns, Daniel Minoli
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Business enterprises, Computer networks, Security measures,Information technology, Security measures,Data protection,Computer security,Risk management
Classification :
HF5548
.
37
.
K68
2010


148. Information technology security and risk management
Author: edited by Stephen C. Wingreen, Amelia Samandari.
Library: Central library and document university of Kurdistan (Kurdistan)
Subject: Computer security.,Information technology,Security measures.,Information technology.

149. Information technology security & risk management
Author: Slay, Jill
Library: Central Library and Documentation Center (Kerman)
Subject: ، Computer security,، Data protection,Security measures ، Information technology
Classification :
QA
76
.
9
.
S3
I55
2006


150. Information technology, security techniques, code of practice for information security management = Technologies de l'information, techniques de sécurité, code de pratique pour la gestion de sécurité d'information.
Author: International Organization for Standardization.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer security -- Standards.,Information technology -- Security measures -- Standards.
Classification :
QA76
.
9
.
A25
I584
9999


152. Make a shield from wisdom :
Author: 20090507 0
Library: Library of Islamic Parliament (Tehran)
Subject:

153. Management of information security
Author: Michael E. Whitman, Herbert J. Mattord
Library: Central Library and Document Center of Shahid Madani University of Azarbayjan (East Azarbaijan)
Subject: Computer networks, Security measures,Computer security,Management information systems, Security measures
Classification :
TK
,
5105
.
59
,.
W5356
,
2008


154. Management of information security /
Author: Michael E. Whitman, Herbert J. Mattord.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures-- Management.,Computer security-- Management.,Computer security.,Information technology-- Security measures.,Computer security-- Management.,Computer security.,Computersicherheit,Information technology-- Security measures.,Kryptologie,Risikomanagement
Classification :
TK5105
.
59
.
W45
2019


155. Management of information security /Michael E. Whitman, Herbert J. Mattord.
Author: / Michael E. Whitman, Herbert J. Mattord.
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer networks--Security measures,Computer security,Management information systems--Security measures.
Classification :
TK
5105
.
59
.
W54
2008


156. Managing the human factor in information security :
Author: David Lacey.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer crimes-- Prevention.,Electronic data processing departments-- Security measures.,Industries-- Security measures.,Information technology-- Security measures.,Management-- Employee participation.,Management information systems-- Human factors.,BUSINESS & ECONOMICS-- Corporate Governance.,BUSINESS & ECONOMICS-- Leadership.,BUSINESS & ECONOMICS-- Organizational Development.,BUSINESS & ECONOMICS-- Workplace Culture.,Computer crimes-- Prevention.,Electronic data processing departments-- Security measures.,Industries-- Security measures.,Information technology-- Security measures.,Informatique.,Management-- Employee participation.,Management information systems-- Human factors.,Protection des données.,Sécurité.
Classification :
HF5548
.
37
.
L33
2009eb


157. Managing the unmanageable : systematic downloading of electronic resources by library users / Gayle Baker, Carol Tenopir -- Library/vendor relations : the APA experience / Linda Beebe -- Managing customer relationships : a book vendor point-of-
Author: Sam Brooks, David H. Carlson, editors.
Library: Library of Islamic Parliament (Tehran)
Subject:

158. Modern Buddhist cultures -- The cultural practices of Buddhist modernity -- Shanghai Buddhism -- Vegetarian identities --
Author: Francesca Tarocco.
Library: Library of Islamic Parliament (Tehran)
Subject:

159. Network Scanning Cookbook /
Author: Jetty, Sairam.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.,Computer networks-- Security measures.,Computer security-- Management.,Data protection.,Information technology-- Security measures.
